(403) 210-2927    Get SUPPORT

OnSite I.T. Blog

Ransomware Attack Strikes Atlanta

Ransomware Attack Strikes Atlanta

Ransomware can target all kinds of entities, but one of the most devastating attacks in recent memory was launched against Atlanta, Georgia earlier this year. Atlanta suffered from an incredibly sustained and powerful ransomware attack that disabled much of the municipal government.

The attack itself has been linked to a sinister group that pays particularly close attention to its targets. The mayor of Atlanta, Keisha Lance Bottoms, has compared the ransomware attack to a kidnapping situation. Without access to important data, files, and applications, residents and government officials had trouble going about their daily lives in a somewhat normal fashion. It’s crazy to think that technology has become so ingrained in society that functions shut down so comprehensively when an infrastructure is affected in a negative way; but the fact of the matter is that governments rely heavily on technology, and when it doesn’t work as intended, there are a lot of repercussions.

Looking to Atlanta as an example, ransomware locks up files with the intention of releasing them upon receiving a payment, or ransom. The particular strain of ransomware that hit Atlanta, called SamSam, replaced the names of affected files with “I’m sorry” and encrypted them until the ransom has been paid. If the victims don’t pay up within a week, the files will be lost forever. The hackers responsible are known for choosing targets that are most likely to pay up--even with the rather gratuitous fees that total upward of $51,000 in Bitcoin.

Together with technicians from Dell SecureWorks, the officials of Atlanta got the city back on its feet, but not without suffering from considerable operational deficiencies in the interim. It’s not clear why or how Atlanta was hit by this attack, but due to the confidentiality agreements between Dell SecureWorks and Atlanta, we will not find out anytime soon. One thing is clear, however, and it’s that the distinction between paying the ransom and trying to resolve the problems is an issue that cannot be taken lightly. While the mayor of Atlanta hasn’t said one way or the other if they will be paying the ransom, we know that there are many elements to this decision that can’t be taken lightly.

If your business is hit by ransomware, it might be tempting to make the problem disappear by simply paying those who have hurt you. In some cases, it could cost your business considerably less to do so. However, you need to think about the other side of things as well. By paying ransomware developers for the safe return of your files, you are funding further attacks that could potentially target other businesses just like yours. The good news is that Atlanta did exactly what they were supposed to do by contacting IT professionals to assist with the recovery process. It’s better to try everything possible before submitting to the humiliation of paying hackers for your data back - after all, there is also no guarantee that the hackers responsible will hold up their end of the deal even if you do pay.

If you are ever struck with ransomware, OnSite I.T. wants to help. To learn more, call us today at (403) 210-2927.

Tip of the Week: How to Pick the Best Wireless Hea...
Is it Better to Shut Off Your Computer, or Just Pu...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, October 15 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security Tech Term Privacy Cybersecurity Smartphones Cloud Internet Malware Hardware Passwords Communication Browser Android Productivity User Tips Efficiency Hosted Solutions Wi-Fi Communications Microsoft Data Small Business Managed IT services Google Ransomware Saving Money Network Mobile Devices VoIP Email Business Intelligence Mobile Device Software Business Management Applications Windows 10 Employer-Employee Relationship Workplace Tips Users Innovation Backup IT Support Blockchain Social Media Collaboration Government Managed IT Service Data Management Computers Analytics Wireless Charging Automation Cortana Managed IT Services Tech Terms Computer Information Networking Cost Management Data Backup Artificial Intelligence Data Protection Smartphone IT Services Marketing Hackers Virtual Assistant Phishing Bandwidth Data Breach Internet of Things Patch Management Compliance VPN Excel BDR Miscellaneous Router Virtualization Gmail Cloud Computing Remote Computing Business Save Money Data recovery Wireless Outsourced IT Streaming Media Dark Web Specifications Value HP Websites Apple Telecommuting Ink Reporting Twitter Knowledge G Suite HIPAA Data loss Remote Monitoring and Management Technology Tips Unified Communications Authentication Maintenance Troubleshooting Law Enforcement Telephony Downloads Error Conferencing Document Management iPhone Workers PowerPoint Medical IT IT budget Inventory Bring Your Own Device Hard Drive Virus Internet Explorer Analysis Business Technology RAM Authorization Lead Generation Tip of the week Update Apps Safety Voice over IP Trends Online Shopping Network Attached Storage Office Database Amazon Paperless Office Dongle Millennials Sports SaaS Mobile Security Environment Hybrid Cloud Processors Antivirus Threat Managed Service Physical Security Backup and Disaster Recovery Microsoft Office Microsoft Teams Machine Learning Gadgets User Tip File Sharing Holiday A.I. Touchscreen Password Content Filtering Cybercrime Digital GDPR Operating System Big Data e-waste Cables Vulnerability Staff Printing Laptop SSD Office 365 Sales Company Culture eCommerce Movies Microsoft Office 365 Settings Tactics Plug-In Edge Chrome Connectivity Storage IT Management Hard Drives Comparison disposal Voice over Internet Protocol Spyware How To Paper Facebook Tablet Managing Stress WannaCry Telecommute User Security Access Control Battery Server Management Spam Server Proactive IT Printers Mobile Device Management Windows 10 Public Speaking Presentation Two-factor Authentication Lithium-ion battery Augmented Reality Managed Service Provider Wireless Technology 5G Tech Support IBM Hiring/Firing Hacker The Internet of Things Productivity Fun Quick Tips Budget Outlook Competition Customer Relationship Management IP Address Remote Monitoring Website Customer Service Disaster Recovery Mobile Office Upgrade Regulation Domains Search Alert