30 Schools Shut Down In Montana After Cyber Attack

30 Schools Shut Down In Montana After Cyber Attack

Students generally love it when classes are cancelled for whatever reason, but thanks to a cybercriminal group called TheDarkOverlord Solutions, a school in Flathead Valley, Montana was disrupted for an extended period of time. This downtime resulted in a disruption of operations for over 30 schools, as well as the threat to the personal information of countless teachers, students, and administrators due to a ransomware attack.

TheDarkOverlord Solutions also went as far as to make graphic death threats against the children attending the schools, taking advantage of the memory of recent school shootings. This hack resulted from the Columbia Falls district server being targeted, which contained all sorts of personal data belonging to residents of the school district. This includes addresses, medical histories, behavioral history, and other information that’s helpful to cybercriminals. Thanks to these events, 30 schools closed and canceled any weekend activities. When class resumed, there was much more security than before.

TheDarkOverlord Solutions, true to its name, targets individuals that have particularly lucrative data on the line. In July 2017, they were responsible for a major information harvest from healthcare providers which resulted in almost 9.5 million records going up for sale on the black market. These records were reportedly stolen from a clinic, a healthcare provider, and a health insurance provider.

This same group also reached out and made their name known by stealing media from Netflix. The popular series Orange is the New Black was released prior to its actual release date, thumbing the nose of the audio post-production studio that provided a ransom of $50,000. It just goes to show that you can never trust a thief!

Therefore, all signs point toward the Columbia Falls school district to not pay the ransom demanded of them. They made the correct choice by not giving in to the demands of hackers, as there is no reasonable expectation that they will actually hand over their data. If they do decide to pay the ransom, it’s money that’s just going toward funding further ransomware attacks. Plus, if they are willing to pay, it just shows that the tactic actually works.

The best way to stay secure is to protect your organization against all types of threats. To learn more, reach out to Haber Group at 866.625.3560.

Tip of the Week: Closed a Tab Accidentally? Here’s...
Data Security Has to Be A Priority For Your Organi...
 

Comments

Already Registered? Login Here
No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Email Hackers Privacy Malware Business Internet Business Computing Hosted Solutions Computer Microsoft Software Ransomware Google Backup Windows 10 Network Security Android Mobile Devices Smartphone User Tips IT Services Data Management Small Business Hardware Managed IT Services Tech Term Browser Gmail Productivity Windows Facebook Server Business Continuity Saving Money Cloud Computing Internet of Things App Data Business Management Data Recovery Encryption IT Support Remote Monitoring Office 365 Upgrade Phishing Disaster Recovery Smartphones Word Managed Service Provider Efficiency Cybersecurity Artificial Intelligence Office Tips Government Chrome Infrastructure Microsoft Office Outsourced IT Innovation Spam Big Data Productivity Windows 10 Social Media Workplace Tips Tip of the week Data Backup IT Support Money Robot WiFi Avoiding Downtime Settings The Internet of Things Applications Two-factor Authentication Content Filtering Managed IT Services Communication Bandwidth YouTube IT Management communications Miscellaneous Apple Risk Management Analytics Data storage VoIP Vulnerability Employer-Employee Relationship Antivirus Firewall Passwords Customer Service HIPAA Presentation Data Security Safety Data loss Business Technology Printing Network Office Hacker Virtual Private Network Automation Wireless Technology End of Support BYOD Server Management Recovery Computing Hosted Solution Google Drive Password Mobile Security Mouse Vendor Management Website Telephone Systems Save Money Mobile Device LiFi Maintenance Search IBM Virtual Reality Apps Storage Wireless Scam Tablet Paperless Office Administration Hacking Customer Relationship Management SaaS Wi-Fi Outlook Unified Threat Management VPN Monitors Augmented Reality Holiday Access Control Cabling Typing 5G FCC Smart Tech Firefox Service Level Agreement Digital Payment eWaste BDR Servers Deep Learning Undo Humor Halloween Distributed Denial of Service Router Cortana Alerts Network Management Marketing Operating System Comparison Chromebook Hacks Fun Fraud Internet Exlporer Politics Gadgets Application Budget SharePoint Collaboration Cables Managed IT Cryptocurrency Downtime Title II Connectivity Techology Licensing Continuity Google Maps Bring Your Own Device Virtualization sip Scary Stories Managed IT Service Modem Digital Lenovo How To Smart Office Touchscreen IP Address Cybercrime Specifications Compliance Mail Merge Value Tech Support Document Management Unified Threat Management Users Downloads IT Technicians File Sharing Wires Disaster Shortcut Bitcoin Network Congestion Online IoT Computer Care Cooperation Solar Statistics Best Practice telephony Sports Break Fix Cookies Samsung Spyware Superfish Information Technology Knowledge Work Hard Drives Google Docs Mobile Office Black Friday Regulations Address Writing Education Hotspot Professional Services Websites Identity Theft Quick Tips User Error Multi-Factor Security Mirgation Voice over Internet Protocol Uninterrupted Power Supply Patch Management Windows 8 Computers Microsoft Excel Star Wars Training Experience Unified Communications Staff Automobile Business Intelligence Bluetooth Business Growth Dark Web Nanotechnology Google Wallet Optimization Refrigeration Mobile Device Management Running Cable Cyber Monday Social Networking Corporate Profile User Current Events Retail Language USB VoIP Legal Google Calendar Chatbots Solid State Drive Public Speaking Display Virtual Desktop Blockchain Cost Management Printer Wearable Technology Alt Codes Competition Dark Data Buisness Net Neutrality Screen Reader How To Networking Drones Recycling IT service Heating/Cooling Lithium-ion battery Laptop Smart Technology Motherboard Remote Computing WannaCry Going Green Social Engineering IT solutions Computing Infrastructure Dongle Time Management Legislation Identity Hard Disk Drive Social Permissions Assessment Unsupported Software Computer Repair Managing Stress IT Consultant Relocation Processors Cameras Meetings Tracking Mobile Data Health Cleaning Private Cloud Alert CCTV Emoji Webcam Electronic Medical Records Work/Life Balance Error Black Market Point of Sale Mobile Computing Physical Security Travel Domains Law Enforcement Notifications G Suite CrashOverride Upgrades Supercomputer Twitter Botnet Motion Sickness FinTech Gadget Staffing Personal Information Administrator Company Culture Crowdsourcing Taxes 3D Printing Machine Learning IT Budget Web Server Emergency Update GPS