Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

A Ransomware Cyberattack Struck Atlanta, Georgia

A Ransomware Cyberattack Struck Atlanta, Georgia

Ransomware doesn’t discriminate with its targets, as the city of Atlanta, Georgia now knows so painfully well. The city became the target of a ransomware attack that crippled many of its critical system workflows. The municipal government suffered from one of the most advanced and sustained attacks in recent memory.

The culprits behind the attack, the hacker group SamSam, are known for meticulously selecting targets that they are fairly confident will pay up when faced with a ransomware attack. Even the mayor of Atlanta was intimidated enough by the attack as to compare it to a kidnapping or hostage situation. Access to important data, files, and applications hung in the balance, and the downtime caused by this incident led to considerable trouble for countless government officials and citizens. Technology has become such an integral part of running governments and businesses that even the slightest issue could have echoing repercussions, so you can imagine the shock and horror in the wake of this ransomware attack.

Even more horrific is the ransom demanded by the hackers that exceeded $51,000 in Bitcoin. Ransomware is known for locking down files and waiting for a payment from the victims before unlocking them. This particular strain of ransomware replaces the names of all affected files with the phrase “I’m sorry” and demands that the ransom be paid in a week.

By working with the technicians at Dell SecureWorks, Atlanta is back on its feet, but not without suffering considerably from the ransomware attack. It’s not clear if Atlanta will pay up for the release of its data, and confidentiality agreements mean that Dell SecureWorks will not reveal any information about their relationship to the attack. But one thing is painfully clear in the wake of such destruction: trying to pay the problem away can be just the beginning of ransomware issues.

For example, if you pay a ransomware developer for the safe return of your files, you might be funding further attacks on other victims. This is counter-productive to the security-minded culture of the business environment. Instead, it’s better to take preventative measures such as implementing data backup and disaster recovery, as well as identifying threats before they have a chance to become a problem. If you are ever struck by a ransomware attack, it’s better to reach out to an IT provider before committing to any payments to hackers. It’s better to try just about any alternative before investing in something that isn’t even a guaranteed fix.

To improve network security and enable preventative solutions, reach out to Central Technology Solutions. Our trained and trusted technicians will work toward ensuring your network is airtight. To learn more, reach out to us at 1-844-237-4300.

Reduce Your Technology Headaches Go with Managed I...
Power Off, or Leave It On?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, November 18 2018

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Best Practices Technology Cloud Business Computing Email Privacy Malware Hackers Hosted Solutions IT Services Internet Productivity Managed IT Services Outsourced IT Network Security IT Support Data Software Data Backup Business Mobile Devices Computer Microsoft Ransomware Tech Term Innovation Productivity Backup Data Recovery Business Continuity Hardware Smartphone Google Managed Service Provider Internet of Things Cloud Computing Small Business Disaster Recovery Windows 10 Data Management Android Managed IT Social Media User Tips Communication Artificial Intelligence Remote Monitoring Efficiency Browser Encryption BYOD VoIP Windows Smartphones IT Support Facebook Paperless Office Risk Management Save Money Mobile Device Phishing Cybersecurity App Workplace Tips Business Management Recovery Government Saving Money Unified Threat Management Mobile Device Management Bandwidth Collaboration Applications Firewall Server Gmail Robot BDR Network Upgrade Virtualization Project Management Document Management Hosted Solution Website Infrastructure Wi-Fi Apps Vulnerability Content Filtering Passwords Compliance Money Data storage Bring Your Own Device SaaS Going Green Telephone Systems Vendor Management Office 365 Windows 10 Big Data Password Chrome Holiday Tip of the week Automation Analytics Remote Computing Healthcare Antivirus Employer-Employee Relationship Politics Work/Life Balance Apple Help Desk Customer Relationship Management Customer Service Data loss Data Security Router Virtual Reality Managed Service Two-factor Authentication Training Computing Miscellaneous communications Regulations File Sharing Office IT Service Wireless IT Management Unified Communications Computers Managed IT Services Files Storage Google Drive YouTube Quick Tips Scam WiFi Settings How To Samsung Tech Support VPN Business Growth Digital Payment Patch Management Chromebook Remote Monitoring and Management Administration Flexibility LiFi Avoiding Downtime Mobile Computing Education Websites Identity Theft Licensing Virtual Private Network Social Remote Workers Hacker The Internet of Things Network Management IT solutions Wireless Technology Legal Assessment Business Technology Upgrades Maintenance How To Twitter IoT Information Smart Technology Server Management Sports Uninterrupted Power Supply Machine Learning Mobility End of Support Health Budget Tablet Internet Exlporer Information Technology Word Blockchain Monitors HIPAA Printing Mouse Redundancy Outlook Users Microsoft Office Alert Mobile Security Spam Private Cloud IT Budget Permissions Shortcut Nanotechnology Identities Proactive Legislation IT Technicians Mobile Data eWaste Read Only Downtime Cables Cabling SharePoint Firefox Staff Managed Services Provider Break Fix Social Networking Personal Information Enterprise Content Management Finance Unified Threat Management Hotspot Safety Employee-Employer Relationship Black Friday Heating/Cooling Roanoke — Central Technology Solutions IT Consulting Google Wallet Dark Data WannaCry Fraud Screen Reader Hard Drives Google Docs Point of Sale Time Management Mirgation Networking Management Hacking Motherboard Wires Human Error Downloads Augmented Reality Humor Notifications Cost Management E-Commerce Dark Web Vulnerabilities Authentication Sync User Error Language Backups Virtual Desktop Black Market Connectivity Telephony Cyber Monday Servers technology services provider Data Breach Drones Public Cloud Smart Tech Solid State Drive Writing Emoji WPA3 Law Enforcement Software as a Service Migration Deep Learning Enterprise Resource Planning Bookmarks Disaster Data Warehousing Trending Network Congestion Permission Travel Operations Current Events Hard Drive Features Botnet Computer Repair Geography Authorization Mobile Device Managment Software Tips Computing Infrastructure Mail Merge Technology Assurance Group ’s 18 Technology Laws Alt Codes Automobile Computer Care VoIP Net Neutrality Sponsor Cryptocurrency Retail Cortana Fleet Tracking Gadget Technology Tips Touchscreen Chatbots Techology Physical Security Mobile Favorites Microsoft Excel Modem Display Test Multi-Factor Security Consultation Wearable Technology Lenovo Marketing 3D Printing Cache Electronic Health Records Buisness High-Speed Internet Employees Printer Alerts Address Hacks Gadgets Processors Star Wars Monitoring GPS Distributed Denial of Service Statistics Annual Convention Typing Company Culture Conferencing Digital Obstacle Bitcoin Asset Tracking Comparison Identity Disaster Resistance Best Practice Office Tips Supercomputer Search Cookies Operating System Update MSP Crowdsourcing Meetings Google Calendar Superfish Unsupported Software Virus Recycling Cyberattacks Electronic Medical Records Development Zero-Day Threat G Suite History Access Control Cooperation Utility Computing Consulting Tracking Managed IT Service Bluetooth San Diego Managing Stress Instant Messaging Google Maps Spyware Course Windows 8 Save Time Social Engineering USB OneNote Taxes Specifications Proactive IT Hard Disk Drive Webcam Backup and Disaster Recovery IT Consultant Error Printers Cybercrime Emergency CrashOverride Web Server Cameras Regulation Motion Sickness Administrator CCTV RMM Relocation