(403) 210-2927    Get SUPPORT

OnSite I.T. Blog

Ransomware Attack Strikes Atlanta

Ransomware Attack Strikes Atlanta

Ransomware can target all kinds of entities, but one of the most devastating attacks in recent memory was launched against Atlanta, Georgia earlier this year. Atlanta suffered from an incredibly sustained and powerful ransomware attack that disabled much of the municipal government.

The attack itself has been linked to a sinister group that pays particularly close attention to its targets. The mayor of Atlanta, Keisha Lance Bottoms, has compared the ransomware attack to a kidnapping situation. Without access to important data, files, and applications, residents and government officials had trouble going about their daily lives in a somewhat normal fashion. It’s crazy to think that technology has become so ingrained in society that functions shut down so comprehensively when an infrastructure is affected in a negative way; but the fact of the matter is that governments rely heavily on technology, and when it doesn’t work as intended, there are a lot of repercussions.

Looking to Atlanta as an example, ransomware locks up files with the intention of releasing them upon receiving a payment, or ransom. The particular strain of ransomware that hit Atlanta, called SamSam, replaced the names of affected files with “I’m sorry” and encrypted them until the ransom has been paid. If the victims don’t pay up within a week, the files will be lost forever. The hackers responsible are known for choosing targets that are most likely to pay up--even with the rather gratuitous fees that total upward of $51,000 in Bitcoin.

Together with technicians from Dell SecureWorks, the officials of Atlanta got the city back on its feet, but not without suffering from considerable operational deficiencies in the interim. It’s not clear why or how Atlanta was hit by this attack, but due to the confidentiality agreements between Dell SecureWorks and Atlanta, we will not find out anytime soon. One thing is clear, however, and it’s that the distinction between paying the ransom and trying to resolve the problems is an issue that cannot be taken lightly. While the mayor of Atlanta hasn’t said one way or the other if they will be paying the ransom, we know that there are many elements to this decision that can’t be taken lightly.

If your business is hit by ransomware, it might be tempting to make the problem disappear by simply paying those who have hurt you. In some cases, it could cost your business considerably less to do so. However, you need to think about the other side of things as well. By paying ransomware developers for the safe return of your files, you are funding further attacks that could potentially target other businesses just like yours. The good news is that Atlanta did exactly what they were supposed to do by contacting IT professionals to assist with the recovery process. It’s better to try everything possible before submitting to the humiliation of paying hackers for your data back - after all, there is also no guarantee that the hackers responsible will hold up their end of the deal even if you do pay.

If you are ever struck with ransomware, OnSite I.T. wants to help. To learn more, call us today at (403) 210-2927.

Tip of the Week: How to Pick the Best Wireless Hea...
Is it Better to Shut Off Your Computer, or Just Pu...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, August 19 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Tech Term Privacy Business Computing Network Security Smartphones Cybersecurity Hardware Malware Internet Wi-Fi Microsoft Cloud Passwords Communication Communications Android Managed IT services Ransomware Applications Blockchain Backup Employer-Employee Relationship Saving Money Google Social Media IT Support Mobile Devices Business Intelligence Hosted Solutions Email Business Management Data Small Business Software Network Information IT Services Smartphone Windows 10 Innovation Phishing Cost Management Save Money Data recovery User Tips Patch Management Data Breach Productivity Data Management Business Excel Computers Wireless Charging Automation Virtualization Gmail Analytics Wireless Router Networking Tech Terms VoIP Internet of Things Remote Computing Artificial Intelligence Compliance Outsourced IT Data Backup Computer Government Managed IT Service Virtual Assistant Cortana Collaboration VPN Efficiency BDR Browser Data Protection Spyware Cloud Computing Downloads Millennials IT Management Big Data WannaCry Telecommute Users PowerPoint Medical IT User Tip Facebook Office 365 Bring Your Own Device Battery Server Management Internet Explorer Analysis Content Filtering Miscellaneous RAM File Sharing Holiday Database Amazon HP Websites Trends Sales HIPAA Data loss Sports SaaS Twitter Environment Hybrid Cloud Spam Threat Managed Service Technology Tips Microsoft Teams eCommerce Cybercrime Workplace Tips Hard Drives Comparison Document Management A.I. Chrome Cables Tablet Hard Drive Virus GDPR How To IT budget Inventory e-waste Lead Generation Printing Server Company Culture User Security Tactics Plug-In Specifications Paperless Office Dongle Movies Online Shopping Network Attached Storage disposal Voice over Internet Protocol Knowledge Processors Antivirus Connectivity Apple Telecommuting Mobile Security Machine Learning Paper Managed IT Services Physical Security Backup and Disaster Recovery Managing Stress Password Proactive IT Conferencing Digital Bandwidth Apps Safety Law Enforcement Telephony Value Vulnerability Staff Marketing Streaming Media iPhone Workers Operating System Ink Reporting Tip of the week Laptop SSD Hackers Microsoft Office G Suite Business Technology Settings Maintenance Remote Monitoring and Management Office Edge Unified Communications Voice over IP IP Address Error Website Fun Customer Service Remote Monitoring Mobile Office Upgrade Domains Windows 10 Mobile Device Management Search Public Speaking Two-factor Authentication Presentation Lithium-ion battery Storage Augmented Reality Tech Support Regulation Wireless Technology 5G IBM Alert Managed Service Provider Hacker Dark Web The Internet of Things Productivity Gadgets Budget Customer Relationship Management Hiring/Firing Competition