Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

65 Bitcoin Ransom Paid by Florida City

65 Bitcoin Ransom Paid by Florida City

65 of any currency doesn’t seem like a lot of money, but when you are dealing in the cryptocurrency Bitcoin, it adds up quick. One city on Florida’s Atlantic coast is finding that out the hard way after getting hit with a ransomware that stymied the city of 35,000 government’s ability to function. Let’s take a look at the situation that made the city’s leaders agree to pay hundreds of thousands of dollars to scammers.

A few weeks ago, an unwitting employee of the city of Riviera Beach, a small city just up the coast from West Palm Beach, clicked on a file that wasn’t supposed to be clicked on and it ended up locking large portions of their municipal computing infrastructure. When the initial report came to the City Council, they decided it was high time that they updated their computers and approved to spend nearly $1 million to update all municipal computers. Only then were they told that new hardware is all well and good, but paying to upgrade their computers isn’t going to get their access to data back. 

The only way that was going to happen is by giving over to the hackers demands. They were simple: produce 65 Bitcoin, and the files will be decrypted. Since after the ransomware was deployed, the city email system was unavailable and its 911 dispatchers didn’t have access to computing systems that are necessary for prompt emergency response, the city council acted quickly as to avoid a long, drawn-out situation that could potentially cost the city millions. 

Ransomware victims: Atlanta, GA; Newark, NJ; and Sarasota, FL, had been examples of cities that refused to pay ransoms only to see costs of recovery soar. Currently, the FBI, the Department of Homeland Security, and the U.S. Secret Service are all working on the case.

Typically, we’ve advised ransomware victims not to pay the ransom, since it provides the hackers the resources they need to continue conducting acts of cybercrime. It’s been mentioned repeatedly by IT professionals and cybercrime experts that there is no guarantee that hackers will stay true to their word and decrypt the files once the ransom has been paid. 

Ransomware is a major and continuously-developing problem for municipalities and businesses, alike. For more information about ransomware, subscribe to our blog, or give us a call at 1-844-237-4300.

Our Top 7 List of IT Myths and Wild Conspiracies
Tip of the Week: Working Around Windows’ Restore P...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, May 29 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.centraltechnologysolutions.com/

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Productivity Cloud Privacy Data Hosted Solutions Network Security IT Services Data Backup Email Malware Internet Hackers Software Efficiency IT Support Outsourced IT Innovation Microsoft Business Mobile Devices Computer Productivity Data Recovery Managed IT Services Hardware Business Continuity IT Support Google Upgrade Small Business Cloud Computing Ransomware Backup Cybersecurity Tech Term Communication Collaboration User Tips Phishing Managed IT Services Disaster Recovery Business Management Workplace Tips Managed Service Provider Windows 10 Smartphones VoIP Internet of Things Smartphone Android Data Management Social Media Paperless Office Remote Monitoring Managed Service communications Mobile Device Facebook Encryption Managed IT Windows Save Money Quick Tips Artificial Intelligence Network Office 365 Browser Server Windows 10 BDR Miscellaneous Saving Money Virtualization Help Desk Wi-Fi BYOD Holiday Risk Management Passwords Mobile Device Management Windows 7 App Compliance Business Technology Government Health Document Management Healthcare Vendor Management Automation Apps Password Training Avoiding Downtime Firewall Employer-Employee Relationship Big Data Laptops Applications Robot Users Chrome Bring Your Own Device Bandwidth Unified Threat Management Going Green Remote Work Microsoft Office Recovery Gmail Analytics Tip of the week Scam Processor Mobility Project Management Antivirus Information File Sharing Apple Infrastructure SaaS Data loss Vulnerability Money Telephone Systems Data Security Computing Data storage Two-factor Authentication Office Hosted Solution Website Computers Wireless Storage Blockchain IT Management Redundancy Content Filtering Settings OneDrive Flexibility Machine Learning Customer Service IoT Gadgets VPN Virtual Reality Tablet Social Customer Relationship Management Meetings Files Virtual Private Network Company Culture Unified Communications RMM Software as a Service Router Regulations IT Service Maintenance Downtime Politics Budget Proactive Information Technology Work/Life Balance Operating System Printing Access Control Remote Computing Chromebook Co-Managed IT Mobile Security Business Growth Hard Drive Sports Professional Services Managed Services Mobile Computing Hacker Patch Management Electronic Health Records Upgrades Time Management Networking Monitoring Dark Web Twitter Solid State Drive Employees Augmented Reality Wireless Technology Legal Current Events Display Recycling The Internet of Things Spam Network Management Utility Computing Consulting WiFi Private Cloud Assessment YouTube End of Support Smart Technology Tech Support How To Server Management Monitors Social Network Net Neutrality Electronic Medical Records Uninterrupted Power Supply Managed Services Provider Administration Digital Payment Alert Consultation Bitcoin Covid-19 File Management Education Websites Identity Theft LiFi Employee-Employer Relationship Management Mouse Internet Exlporer Licensing Remote Monitoring and Management Outlook Word Search Payment Cards IT solutions How To Samsung HIPAA Google Drive Cooperation Remote Workers Specifications Spyware Course Enterprise Resource Planning Bookmarks Mobile Device Managment Software Tips Proactive IT WPA3 Financial Windows Server Shortcut Google Wallet Features Telephone Permissions Nanotechnology Automobile Computer Care Notifications Permission Video Conferencing Legislation IT Technicians Gadget Break Fix Social Networking Marketing Black Market Firefox Hard Drives Geography Google Docs Authorization Wireless Internet Business Telephone Outsource IT SharePoint Staff Black Friday Roanoke — Central Technology Solutions GPS Writing Emoji Mobile Favorites Manufacturing Optimization Unified Threat Management Hotspot Buisness Heating/Cooling IT Consulting Fleet Tracking Humor Procurement Security Cameras User Management Network Congestion WannaCry Cache Drones Transportation Mobile VoIP Fraud Screen Reader Backups Test Biometric Mirgation Star Wars Virtual Assistant Vendor Motherboard Supercomputer High-Speed Internet Employer/Employee Relationships IT Assessment Laptop Downloads Crowdsourcing Computer Repair Deep Learning Hacking Cyber Monday technology services provider Tracking Retail Cortana Conferencing Hard Disk Drives Virtual Machines User Error Language G Suite History Physical Security Servers Data Breach Asset Tracking Remote Worker Batteries Taxes Alt Codes Cyberattacks Cyber security Smart Tech Google Maps 3D Printing MSP Projects Gamification Migration Trending Wasting Time Smart Devices Data Warehousing IT Budget Processors Cryptocurrency Development Zero-Day Threat Proactive Maintenance Digitize Remote Working Operations Disaster Technology Assurance Group ’s 18 Mail Merge Managing Stress Instant Messaging Solid State Drives Credit Cards Computing Infrastructure Cabling Office Tips Technology Laws OneNote ROI Update VoIP Typing Sponsor eWaste Read Only Teamwork Unsupported Software Virus Touchscreen Hacks Techology Tech Terms Return on Investment Technology Tips Chatbots Best Practice Database Sensors Microsoft Excel Modem Lenovo Cables Backup and Disaster Recovery Database Management Shadow IT Multi-Factor Security Wearable Technology Point of Sale Distributed Denial of Service Annual Convention Social Engineering USB Address Enterprise Content Management Finance Options Holidays Printer Alerts Cybercrime Statistics Notes Virtual Desktop Telephony Digital Obstacle Shared resources Windows Server 2008 Sync Mobile Data Disaster Resistance Theft Active Directory Comparison Identity Cost Management E-Commerce Voice over Internet Protocol Cookies Public Cloud Windows 8 Superfish Wires Save Time Human Error GDPR Outsourcing Google Calendar Law Enforcement PowerPoint Value of Managed Services Managed IT Service San Diego Botnet Safety Identities Vulnerabilities Authentication 5G IT Mobile Office Travel Dark Data Personal Information Bluetooth Connectivity Hard Disk Drive Cameras Motion Sickness CCTV Administrator Regulation Relocation Emergency CrashOverride Students Webcam IT Consultant Error Printers Web Server