(403) 210-2927    Get SUPPORT

OnSite I.T. Blog

Ransomware Attack Strikes Atlanta

Ransomware Attack Strikes Atlanta

Ransomware can target all kinds of entities, but one of the most devastating attacks in recent memory was launched against Atlanta, Georgia earlier this year. Atlanta suffered from an incredibly sustained and powerful ransomware attack that disabled much of the municipal government.

The attack itself has been linked to a sinister group that pays particularly close attention to its targets. The mayor of Atlanta, Keisha Lance Bottoms, has compared the ransomware attack to a kidnapping situation. Without access to important data, files, and applications, residents and government officials had trouble going about their daily lives in a somewhat normal fashion. It’s crazy to think that technology has become so ingrained in society that functions shut down so comprehensively when an infrastructure is affected in a negative way; but the fact of the matter is that governments rely heavily on technology, and when it doesn’t work as intended, there are a lot of repercussions.

Looking to Atlanta as an example, ransomware locks up files with the intention of releasing them upon receiving a payment, or ransom. The particular strain of ransomware that hit Atlanta, called SamSam, replaced the names of affected files with “I’m sorry” and encrypted them until the ransom has been paid. If the victims don’t pay up within a week, the files will be lost forever. The hackers responsible are known for choosing targets that are most likely to pay up--even with the rather gratuitous fees that total upward of $51,000 in Bitcoin.

Together with technicians from Dell SecureWorks, the officials of Atlanta got the city back on its feet, but not without suffering from considerable operational deficiencies in the interim. It’s not clear why or how Atlanta was hit by this attack, but due to the confidentiality agreements between Dell SecureWorks and Atlanta, we will not find out anytime soon. One thing is clear, however, and it’s that the distinction between paying the ransom and trying to resolve the problems is an issue that cannot be taken lightly. While the mayor of Atlanta hasn’t said one way or the other if they will be paying the ransom, we know that there are many elements to this decision that can’t be taken lightly.

If your business is hit by ransomware, it might be tempting to make the problem disappear by simply paying those who have hurt you. In some cases, it could cost your business considerably less to do so. However, you need to think about the other side of things as well. By paying ransomware developers for the safe return of your files, you are funding further attacks that could potentially target other businesses just like yours. The good news is that Atlanta did exactly what they were supposed to do by contacting IT professionals to assist with the recovery process. It’s better to try everything possible before submitting to the humiliation of paying hackers for your data back - after all, there is also no guarantee that the hackers responsible will hold up their end of the deal even if you do pay.

If you are ever struck with ransomware, OnSite I.T. wants to help. To learn more, call us today at (403) 210-2927.

Tip of the Week: How to Pick the Best Wireless Hea...
Is it Better to Shut Off Your Computer, or Just Pu...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, January 21 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security User Tips Tech Term Productivity Privacy Smartphones Internet Cybersecurity Malware Efficiency Cloud Hardware Android Microsoft Communication Mobile Device Browser IT Support Wi-Fi Network Email Ransomware Data Passwords Small Business Google Users Innovation Internet of Things Backup Data Backup Saving Money Hosted Solutions Wireless Business Management Communications Mobile Devices Collaboration Managed IT services IT Services Applications Software Windows 10 Data recovery Holiday Networking Workplace Tips Outsourced IT Business Intelligence Social Media Business Managed IT Services VoIP Cloud Computing Smartphone Information Blockchain Employer-Employee Relationship Marketing Hackers Tech Terms Miscellaneous Remote Computing Compliance Artificial Intelligence Government Managed IT Service Connectivity Cortana Virtual Assistant Bandwidth Access Control Password Mobility Computer VPN BDR Data Protection Remote Monitoring and Management Apps Medical IT Phishing Cost Management Save Money Microsoft Office Data Breach Data Management Patch Management Excel Computers Virtualization Gmail Analytics Router Wireless Charging Automation Managed Service Word Document Management Office 365 A.I. Touchscreen Chrome Cybercrime Hard Drives Comparison GDPR How To IT budget Inventory e-waste Cables Tablet Business Continuity Hard Drive Virus Server Upgrade Company Culture User Security Profitability Lead Generation Printing Wearables Paperless Office Dongle Movies Microsoft Office 365 Online Shopping Network Attached Storage Tactics Plug-In Specifications Storage Apple Telecommuting Mobile Security Spam disposal Voice over Internet Protocol Knowledge Certification Processors Antivirus Paper Physical Security Backup and Disaster Recovery Managing Stress Eliminating Downtime Machine Learning Healthcare Digital Law Enforcement Telephony Proactive IT Conferencing Staff Streaming Media Dark Web iPhone Workers Operating System Value Vulnerability Ink Reporting Tip of the week Laptop SSD G Suite Business Technology BYOD Edge Unified Communications Authentication Voice over IP Troubleshooting Settings Maintenance Office Spyware Downloads Error Millennials IT Management Training Safety PowerPoint User Tip Facebook Bring Your Own Device Wireless Internet WannaCry Telecommute Content Filtering RAM Authorization File Sharing Update Battery Server Management Internet Explorer Analysis HP Websites Trends Gadgets Database Amazon Security Cameras Sports SaaS Twitter Environment Hybrid Cloud Sales Help Desk HIPAA Data loss Technology Tips Big Data Microsoft Teams eCommerce Outlook Threat Website Customer Service Search Mobile Office Domains Disaster Recovery Regulation Windows 10 Mobile Device Management Public Speaking Printers Alert Presentation Two-factor Authentication Managed Service Provider Lithium-ion battery Data Security Augmented Reality Hiring/Firing Wireless Technology 5G Tech Support IBM Fun Personal Information The Internet of Things Productivity Hacker Budget Remote Monitoring Competition Customer Relationship Management Quick Tips IP Address