Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

A Ransomware Cyberattack Struck Atlanta, Georgia

A Ransomware Cyberattack Struck Atlanta, Georgia

Ransomware doesn’t discriminate with its targets, as the city of Atlanta, Georgia now knows so painfully well. The city became the target of a ransomware attack that crippled many of its critical system workflows. The municipal government suffered from one of the most advanced and sustained attacks in recent memory.

The culprits behind the attack, the hacker group SamSam, are known for meticulously selecting targets that they are fairly confident will pay up when faced with a ransomware attack. Even the mayor of Atlanta was intimidated enough by the attack as to compare it to a kidnapping or hostage situation. Access to important data, files, and applications hung in the balance, and the downtime caused by this incident led to considerable trouble for countless government officials and citizens. Technology has become such an integral part of running governments and businesses that even the slightest issue could have echoing repercussions, so you can imagine the shock and horror in the wake of this ransomware attack.

Even more horrific is the ransom demanded by the hackers that exceeded $51,000 in Bitcoin. Ransomware is known for locking down files and waiting for a payment from the victims before unlocking them. This particular strain of ransomware replaces the names of all affected files with the phrase “I’m sorry” and demands that the ransom be paid in a week.

By working with the technicians at Dell SecureWorks, Atlanta is back on its feet, but not without suffering considerably from the ransomware attack. It’s not clear if Atlanta will pay up for the release of its data, and confidentiality agreements mean that Dell SecureWorks will not reveal any information about their relationship to the attack. But one thing is painfully clear in the wake of such destruction: trying to pay the problem away can be just the beginning of ransomware issues.

For example, if you pay a ransomware developer for the safe return of your files, you might be funding further attacks on other victims. This is counter-productive to the security-minded culture of the business environment. Instead, it’s better to take preventative measures such as implementing data backup and disaster recovery, as well as identifying threats before they have a chance to become a problem. If you are ever struck by a ransomware attack, it’s better to reach out to an IT provider before committing to any payments to hackers. It’s better to try just about any alternative before investing in something that isn’t even a guaranteed fix.

To improve network security and enable preventative solutions, reach out to Central Technology Solutions. Our trained and trusted technicians will work toward ensuring your network is airtight. To learn more, reach out to us at 1-844-237-4300.

Reduce Your Technology Headaches Go with Managed I...
Power Off, or Leave It On?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, September 18 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Best Practices Cloud Technology Business Computing Privacy Email Malware Hosted Solutions IT Services Productivity Hackers Internet Managed IT Services IT Support Network Security Software Data Outsourced IT Mobile Devices Ransomware Microsoft Data Backup Business Tech Term Backup Computer Innovation Google Data Recovery Internet of Things Hardware Smartphone Cloud Computing Managed Service Provider Business Continuity Small Business Data Management Windows 10 Android Social Media Remote Monitoring Managed IT User Tips Communication Disaster Recovery BYOD Facebook Efficiency Browser Encryption Paperless Office Windows Artificial Intelligence Productivity Smartphones VoIP IT Support Workplace Tips Risk Management Cybersecurity Save Money App Robot Network Business Management Unified Threat Management Saving Money Applications Recovery Upgrade Mobile Device Management Phishing Gmail Firewall Mobile Device Compliance Big Data Telephone Systems Holiday SaaS Money Data storage Government Chrome Bring Your Own Device Going Green Document Management Vendor Management Bandwidth Tip of the week Hosted Solution Website Password Virtualization Server Apps BDR Content Filtering Passwords Infrastructure Wi-Fi Office 365 Miscellaneous Unified Communications Regulations Computing IT Service Windows 10 IT Management Collaboration Work/Life Balance Computers Wireless Storage Automation Project Management Antivirus Employer-Employee Relationship Router Analytics Remote Computing Managed Service Two-factor Authentication Training Data loss Vulnerability File Sharing Data Security Apple Virtual Reality HIPAA communications Twitter How To Blockchain Server Management Legal Files Wireless Technology Mobile Security Uninterrupted Power Supply End of Support Health Healthcare Tech Support Spam Office YouTube Politics WiFi Monitors Budget Word Microsoft Office Alert Managed IT Services Redundancy Information Technology Digital Payment Printing Websites Identity Theft Outlook Quick Tips Scam Administration Mouse Licensing LiFi How To Samsung The Internet of Things Education Google Drive VPN Patch Management Smart Technology Flexibility IT solutions Chromebook Settings IoT Information Customer Relationship Management Avoiding Downtime Help Desk Business Growth Virtual Private Network Customer Service Mobility Mobile Computing Network Management Sports Upgrades Social Assessment Business Technology Internet Exlporer Hacker Tablet Google Calendar Buisness Solid State Drive Recycling Crowdsourcing Mail Merge Gadgets Cookies Computer Repair Deep Learning MSP Supercomputer Technology Laws Utility Computing Consulting G Suite History VoIP Sponsor Managed IT Service San Diego Physical Security Current Events Development Tracking Touchscreen Techology Access Control Cooperation Retail Cortana Specifications 3D Printing Managing Stress Taxes Consultation Lenovo Display Alt Codes OneNote Google Maps Legislation IT Technicians Processors Cryptocurrency eWaste Address Users Permissions Nanotechnology Proactive Private Cloud IT Budget Statistics Managed Services Provider Cabling Digital Obstacle Break Fix Social Networking Office Tips Cables Disaster Resistance SharePoint Staff Search Black Friday Roanoke — Central Technology Solutions Unsupported Software Virus Hacks Enterprise Content Management Superfish Unified Threat Management Hotspot Update Typing Employee-Employer Relationship Downtime Mirgation Bitcoin Management Point of Sale Fraud Screen Reader Electronic Medical Records Best Practice Remote Monitoring and Management Bluetooth Social Engineering USB Operating System Cost Management E-Commerce Spyware Course Dark Web Motherboard Wires Proactive IT Downloads Augmented Reality Shortcut Cyber Monday technology services provider Mobile Data Vulnerabilities Telephony User Error Language Connectivity Remote Workers Sync Software as a Service Migration Windows 8 Save Time Enterprise Resource Planning Law Enforcement Firefox Smart Tech WPA3 Public Cloud Operations Safety Identities Hard Drive Features Travel Data Warehousing Virtual Desktop Dark Data Personal Information Botnet Heating/Cooling IT Consulting Software Tips WannaCry Technology Assurance Group ’s 18 Geography Time Management Networking Maintenance Computing Infrastructure Mobile Device Managment Technology Tips Chatbots Notifications Mobile Gadget Net Neutrality Google Wallet Fleet Tracking Automobile Computer Care Hacking Multi-Factor Security Wearable Technology Black Market Hard Drives Google Docs Cache Electronic Health Records Microsoft Excel Modem Machine Learning Servers Data Breach Monitoring Distributed Denial of Service Annual Convention Humor High-Speed Internet GPS Printer Alerts Writing Emoji Star Wars Comparison Identity Backups Company Culture Marketing Network Congestion Drones Asset Tracking Disaster Trending Cyberattacks Meetings Relocation Read Only Webcam IT Consultant Printers Error Cybercrime Hard Disk Drive Web Server Cameras Emergency Motion Sickness CrashOverride Regulation CCTV Administrator