Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

65 Bitcoin Ransom Paid by Florida City

65 Bitcoin Ransom Paid by Florida City

65 of any currency doesn’t seem like a lot of money, but when you are dealing in the cryptocurrency Bitcoin, it adds up quick. One city on Florida’s Atlantic coast is finding that out the hard way after getting hit with a ransomware that stymied the city of 35,000 government’s ability to function. Let’s take a look at the situation that made the city’s leaders agree to pay hundreds of thousands of dollars to scammers.

A few weeks ago, an unwitting employee of the city of Riviera Beach, a small city just up the coast from West Palm Beach, clicked on a file that wasn’t supposed to be clicked on and it ended up locking large portions of their municipal computing infrastructure. When the initial report came to the City Council, they decided it was high time that they updated their computers and approved to spend nearly $1 million to update all municipal computers. Only then were they told that new hardware is all well and good, but paying to upgrade their computers isn’t going to get their access to data back. 

The only way that was going to happen is by giving over to the hackers demands. They were simple: produce 65 Bitcoin, and the files will be decrypted. Since after the ransomware was deployed, the city email system was unavailable and its 911 dispatchers didn’t have access to computing systems that are necessary for prompt emergency response, the city council acted quickly as to avoid a long, drawn-out situation that could potentially cost the city millions. 

Ransomware victims: Atlanta, GA; Newark, NJ; and Sarasota, FL, had been examples of cities that refused to pay ransoms only to see costs of recovery soar. Currently, the FBI, the Department of Homeland Security, and the U.S. Secret Service are all working on the case.

Typically, we’ve advised ransomware victims not to pay the ransom, since it provides the hackers the resources they need to continue conducting acts of cybercrime. It’s been mentioned repeatedly by IT professionals and cybercrime experts that there is no guarantee that hackers will stay true to their word and decrypt the files once the ransom has been paid. 

Ransomware is a major and continuously-developing problem for municipalities and businesses, alike. For more information about ransomware, subscribe to our blog, or give us a call at 1-844-237-4300.

Our Top 7 List of IT Myths and Wild Conspiracies
Tip of the Week: Working Around Windows’ Restore P...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, September 18 2019

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Business Computing Productivity Hosted Solutions Email IT Services Malware Privacy Network Security Internet Data Hackers Software Data Backup Outsourced IT Productivity Managed IT Services Computer Microsoft Business Innovation IT Support Data Recovery IT Support Ransomware Hardware Mobile Devices Tech Term User Tips Efficiency Small Business Google Backup Cloud Computing Upgrade Business Continuity Managed Service Provider Windows 10 Managed IT Services Collaboration Internet of Things Phishing Smartphone Paperless Office Android Communication Business Management Remote Monitoring Smartphones Disaster Recovery VoIP Workplace Tips Windows 10 Windows Managed IT Save Money Artificial Intelligence Encryption Social Media Data Management communications Browser Server Cybersecurity Office 365 Facebook Help Desk Mobile Device BYOD Saving Money Risk Management Managed Service BDR Passwords Automation App Mobile Device Management Holiday Wi-Fi Document Management Quick Tips Apps Training Business Technology Vendor Management Microsoft Office Gmail Password Recovery Virtualization Analytics Applications Laptops Network Firewall Government Chrome Unified Threat Management Healthcare Employer-Employee Relationship Robot Compliance Bandwidth Bring Your Own Device Going Green Blockchain Information Content Filtering Wireless File Sharing Processor IT Management Big Data Avoiding Downtime Tip of the week Scam Project Management Antivirus Hosted Solution Money Infrastructure Miscellaneous SaaS Website Data storage Telephone Systems Vulnerability Office IT Service Information Technology Access Control Computers Mobility Operating System Printing Windows 7 Storage Tablet RMM Remote Computing Files Settings Customer Service Unified Communications Apple Users Two-factor Authentication Politics Router Social VPN Virtual Reality Work/Life Balance Downtime Customer Relationship Management Computing Data loss Data Security Regulations HIPAA Budget Assessment IoT How To Monitors Bitcoin Server Management IT solutions Cooperation Electronic Medical Records Machine Learning Alert Mobile Security Mouse Employees Consultation Outlook Monitoring Uninterrupted Power Supply Company Culture Professional Services Sports Recycling Google Drive How To Samsung Gadgets Word Business Growth Redundancy Chromebook Dark Web Flexibility Private Cloud Proactive Software as a Service Tech Support The Internet of Things Mobile Computing Hacker Spam Management YouTube Smart Technology Digital Payment Remote Monitoring and Management Upgrades WiFi Maintenance Patch Management Websites Identity Theft Wireless Technology Legal Networking Twitter Net Neutrality Current Events Licensing Remote Workers Virtual Private Network Display Administration End of Support Health LiFi Network Management Education Internet Exlporer Voice over Internet Protocol Google Calendar Typing Geography Authorization GDPR Virtual Desktop Cookies Mobile Device Managment Software Tips Hacks Disaster Trending Office Tips Gadget Best Practice Mobile Favorites Mail Merge Update 5G Managed IT Service San Diego Automobile Computer Care Fleet Tracking Procurement Technology Laws Unsupported Software Virus PowerPoint Value of Managed Services Electronic Health Records VoIP Sponsor OneDrive Specifications Test Touchscreen Techology Windows Server Cache Legislation IT Technicians GPS High-Speed Internet Lenovo Social Engineering USB Permissions Nanotechnology Star Wars Conferencing Address Wireless Internet Break Fix Social Networking Windows 8 Save Time Asset Tracking Statistics Mobile Data Managed Services SharePoint Staff Cyberattacks Digital Obstacle Manufacturing Black Friday Roanoke — Central Technology Solutions Supercomputer Identities MSP Disaster Resistance Security Cameras Marketing User Management Unified Threat Management Hotspot Crowdsourcing Meetings Dark Data Personal Information Transportation Buisness Mirgation Tracking Development Zero-Day Threat Superfish Safety Fraud Screen Reader G Suite History Utility Computing Consulting Search Augmented Reality Taxes Google Wallet Managing Stress Instant Messaging Employer/Employee Relationships Motherboard Google Maps OneNote Bluetooth Virtual Assistant Vendor Downloads eWaste Read Only Spyware Course Hard Disk Drives Cyber Monday technology services provider IT Budget Hard Drives Google Docs Tech Terms Proactive IT Notifications Remote Worker Batteries User Error Language Migration Cables Backup and Disaster Recovery Black Market Projects Smart Tech Cabling Humor Managed Services Provider Shortcut Operations Drones Enterprise Content Management Finance Firefox Writing Emoji Proactive Maintenance Data Warehousing Backups Employee-Employer Relationship Wasting Time Deep Learning Network Congestion Solid State Drives Technology Assurance Group ’s 18 Solid State Drive Theft Heating/Cooling IT Consulting ROI Remote Work Computing Infrastructure Point of Sale Computer Repair Teamwork Technology Tips Chatbots Wires Human Error Time Management Return on Investment Cybercrime Cost Management E-Commerce WannaCry Multi-Factor Security Wearable Technology Telephony Alt Codes Vulnerabilities Authentication Retail Cortana Database Management Microsoft Excel Modem Sync Connectivity Hacking Physical Security Database Enterprise Resource Planning Bookmarks Options Distributed Denial of Service Annual Convention Public Cloud Cryptocurrency WPA3 Financial Servers Data Breach 3D Printing Notes File Management Printer Alerts Law Enforcement Shared resources Comparison Identity Botnet Permission Processors Active Directory Travel Hard Drive Features Cameras Regulation Motion Sickness CCTV Administrator Relocation Webcam Students Hard Disk Drive IT Consultant Smart Devices Printers Error Sensors Emergency CrashOverride Web Server