312-253-4321    Get SUPPORT

Alchetec Blog

A Ransomware Cyberattack Struck Atlanta, Georgia

A Ransomware Cyberattack Struck Atlanta, Georgia

Ransomware doesn’t discriminate with its targets, as the city of Atlanta, Georgia now knows so painfully well. The city became the target of a ransomware attack that crippled many of its critical system workflows. The municipal government suffered from one of the most advanced and sustained attacks in recent memory.

The culprits behind the attack, the hacker group SamSam, are known for meticulously selecting targets that they are fairly confident will pay up when faced with a ransomware attack. Even the mayor of Atlanta was intimidated enough by the attack as to compare it to a kidnapping or hostage situation. Access to important data, files, and applications hung in the balance, and the downtime caused by this incident led to considerable trouble for countless government officials and citizens. Technology has become such an integral part of running governments and businesses that even the slightest issue could have echoing repercussions, so you can imagine the shock and horror in the wake of this ransomware attack.

Even more horrific is the ransom demanded by the hackers that exceeded $51,000 in Bitcoin. Ransomware is known for locking down files and waiting for a payment from the victims before unlocking them. This particular strain of ransomware replaces the names of all affected files with the phrase “I’m sorry” and demands that the ransom be paid in a week.

By working with the technicians at Dell SecureWorks, Atlanta is back on its feet, but not without suffering considerably from the ransomware attack. It’s not clear if Atlanta will pay up for the release of its data, and confidentiality agreements mean that Dell SecureWorks will not reveal any information about their relationship to the attack. But one thing is painfully clear in the wake of such destruction: trying to pay the problem away can be just the beginning of ransomware issues.

For example, if you pay a ransomware developer for the safe return of your files, you might be funding further attacks on other victims. This is counter-productive to the security-minded culture of the business environment. Instead, it’s better to take preventative measures such as implementing data backup and disaster recovery, as well as identifying threats before they have a chance to become a problem. If you are ever struck by a ransomware attack, it’s better to reach out to an IT provider before committing to any payments to hackers. It’s better to try just about any alternative before investing in something that isn’t even a guaranteed fix.

To improve network security and enable preventative solutions, reach out to Alchetec. Our trained and trusted technicians will work toward ensuring your network is airtight. To learn more, reach out to us at 312-253-4321.

Reduce Your Technology Headaches Go with Managed I...
Power Off, or Leave It On?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, July 19 2018

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Malware Business Computing IT Services Productivity Hackers Privacy Managed IT Services Network Security Outsourced IT Email Software Internet Microsoft Ransomware Hosted Solutions Data Backup IT Support Backup Mobile Devices Computer Data Recovery Business Continuity Tech Term Cloud Computing Data Small Business Hardware Google Android Smartphone Data Management Innovation Business Remote Monitoring Managed IT Paperless Office Internet of Things Productivity User Tips BYOD Windows 10 Communication Disaster Recovery Cybersecurity Browser Managed Service Provider Facebook VoIP Mobile Device IT Support Encryption Artificial Intelligence Office 365 Business Management Applications Social Media Smartphones Tip of the week SaaS Document Management Telephone Systems Infrastructure Passwords Compliance Phishing Recovery Holiday Server Save Money Managed IT Services Risk Management Government Efficiency Saving Money Gmail Training App Employer-Employee Relationship Windows Two-factor Authentication Wi-Fi File Sharing Bandwidth Firewall Antivirus Virtualization Data loss Password Going Green Vendor Management Vulnerability Unified Threat Management Data Storage IT Management Regulations Money Project Management BDR Chrome Windows 10 Hosted Solution Word Workplace Tips Data Security Virtual Reality IT Service Robot Work/Life Balance Storage Wireless Collaboration Mobile Device Management Smart Technology Router Assessment Computing HIPAA How To Patch Management Alert Digital Payment Internet Exlporer Automation Monitors Identity Theft Licensing Blockchain IoT Network Redundancy Files Samsung Apps Tablet Network Management The Internet of Things Mobile Security Scam Help Desk Server Management Analytics Microsoft Office Chromebook Flexibility Customer Relationship Management VPN Big Data Uninterrupted Power Supply Twitter Mobility Politics Health Website Bring Your Own Device Maintenance Virtual Private Network Miscellaneous Upgrade Remote Computing Office Outlook Unified Communications Computers Business Technology Upgrades Technology Laws Data Warehousing Emoji Smart Tech Spam Corporate Profile Mail Merge Wearable Technology Enterprise Content Management Unsupported Software Solid State Drive Shortcut Software as a Service IT Solutions Computing Infrastructure Processors Management IT Budget Avoiding Downtime Techology G Suite Cabling Bluetooth Downloads Net Neutrality USB Cost Management Display Digital Lenovo Legal Identity Law Enforcement 3D Printing Heating/Cooling Unified Threat Management Microsoft Excel Connectivity Dark Data Computer Care WannaCry Address Personal Information Vulnerabilities Mobile Data Taxes Hard Disk Drive Technology Tips Alerts Enterprise Resource Planning Social Engineering Time Management Disaster Resistance Distributed Denial of Service Update Modem Augmented Reality Multi-Factor Security Hard Drive Spyware Consultation Superfish Gadget Servers User Error Tech Support IT Technicians Virus Geography Wireless Technology Managed IT Service Cookies IBM Mouse Cooperation Mobile Search Safety Proactive IT Disaster Hacking Google Calendar Black Market Cache Hacker Social Networking Software Tips Printer Permissions Star Wars Network Congestion Gadgets WiFi VoIP Computer Repair Mirgation Crowdsourcing High-Speed Internet Break Fix Nanotechnology Botnet Humor Comparison Staff Notifications Company Culture Apple Touchscreen IT Consulting Trending Legislation Physical Security Hotspot Recycling End of Support How To Quick Tips Networking Black Friday Sports Motherboard Cortana Websites Access Control Fraud Business Growth Utility Computing Communications Education GPS YouTube Migration Development Printing Wires Data Breach Dark Web Screen Reader Machine Learning Office Tips Customer Service Specifications Social Operations Managing Stress Google Maps Travel Language eWaste Supercomputer Google Drive Cyber Monday Mobile Computing Telephony Content Filtering History Statistics SharePoint Healthcare Automobile Tracking Settings Firefox Electronic Medical Records Chatbots Cables Relocation Cleaning Motion Sickness Fun Public Speaking Downtime Private Cloud Presentation Lithium-ion battery Sync Error Staffing Hard Drives 5G IT Consultant Marketing CrashOverride Mobile Device Managment Public Cloud Budget Competition Administrator Cybercrime IP Address Users Emergency Information Technology Hacks Mobile Office Hiring/Firing Domains