Alltech IT Solutions Blog

This Florida City Will Pay 65 Bitcoins to Get Files Back

This Florida City Will Pay 65 Bitcoins to Get Files Back

Florida’s Atlantic coast is a destination for millions of visitors each year. One visitor is costing a coastal city a pretty penny. Riviera Beach, a small city just north of West Palm Beach, has been hit with a major ransomware attack. Today, we’ll tell you how it came to be that the small beach city would make dubious history by paying what is the largest ransomware payout in the short history of these attacks.

Inundated with ransomware for the past three weeks after one city employee clicked on a malicious link, the Riviera Beach’s city council voted unanimously to pay the 65 Bitcoin price tag to get their systems and data unencrypted. This was after they had already voted to spend almost $1 million to buy all new hardware. The city council believed that after the situations that have played out in other municipalities--where millions of dollars were spent avoiding ransomware payments--that their best recourse to recover their data was to pay the hacker’s demands. 

The problems started almost immediately after a city employee fell for a phishing email. The city email system was unavailable, and its 911 dispatchers didn’t have access to computing systems that are necessary for prompt emergency response. This led to large sections of the city’s computing infrastructure becoming unavailable.

Previous instances where ransomware victimized municipal computing infrastructure, like SamSam attacks in Atlanta, GA; Newark, NJ; and Sarasota, FL, had been so devastating to the workings of their local governments that Riviera Beach’s council had plenty of information to make their decision by. The FBI, The Department of Homeland Security, and the U.S. Secret Service are all investigating the Riviera Beach attack, but for now, no answers are available.

Typically, it is advised that ransomware victims do not pay the ransom, since it provides the experience and resources to hackers to continue to conduct acts of cybercrime; and, because there is no guarantee that hackers will stay true to their word and decrypt the files once the ransom has been paid. 

Ransomware is a growing problem for municipalities and businesses, alike. For more information about ransomware, and the litany of threats facing your network each day, subscribe to our blog.  

All You Need to Know Before Buying a Computer, Par...
Cloud Resources Can Be Costly
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, June 06 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.alltechits.com/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Apps Physical Security OneNote Emoji Websites VPN Wireless Solid State Drive Paperless Office HP WhatsApp eCommerce How To Email Entertainment Analytics GDPR CrashOverride Going Green Patch Management Workers Computer Care Cleaning Internet of Things Humor Save Money Lead Generation HIPAA Processor Mobile Security Security Data loss Business Continuity Webcam Telecommuting Specifications Printer Smartphones Shadow IT Social Network Memes Facebook VoIp Cloud Law Enforcement News Alerts Tech Term Telephony Current Events User Security Plug-In Update Employee-Employer Relationship Threats Managed IT Human Resources Firewall Business Technology Risk Management Healthcare Mobility Holiday Multi-Factor Authentication Printing Knowledge Business Computing Remote Workers Recovery Co-Managed IT Gmail Hosted Solution Hiring/Firing Dongle Google Printer Server Automobile Error Shortcut Upgrade Windows Hosted Desktop Tablet Virtual Reality Tech Support Cybercrime Scams Document Management Information Technology Customer Service Computer Managed IT Services Taskbar Mobile Blockchain Batteries Access Search Display Data Management Connectivity Browser Business Cabling Worker Mobile Office Hybrid Cloud IT Support Vulnerability Artificial Intelligence Medical IT Software Internet WannaCry Authentication Laptop Phone System SSD Trends Internet Explorer Thank You Alert Apple Spam Downloads Comparison Mobile Device Employer-Employee Relationship Training Staff Copy Safety Remote Backup User Tip Data Breach Settings Samsung Operating System Big Data Network Attached Storage instant Messaging VoIP Printers Credit Cards Users Holidays Virtualization Security Cameras Tip of the week Data Spam Blocking Managed Services Provider Server Management Two-factor Authentication Mobile Device Management SaaS Windows Server 2008 R2 Customer Relationship Management Regulation Proactive IT Telephone Systems Edge Wi-Fi Windows 10 iPhone Microsoft RAM Electronic Health Records Movies Managed IT Service Collaboration Online Shopping Travel Excel Remote Monitoring Gaming Console IT budget Sales Cables Employer Employee Relationship Cloud Computing Personal Information Autocorrect Smart Technology Chrome OS Retail Synergy National Security Fleet Management Tactics Business Management Sports Time Management Health Innovation Video Games Efficiency Office Tips Managing Stress Threat Smartphone Video PowerPoint Profiles Virus Productivity Technology Ink Insurance Scam Value Biometrics Google Maps Quick Tips Word Eliminating Downtime Workplace Tips Bitcoin Multi-Factor Security Twitter IT Services Live Streaming Voice over Internet Protocol DDoS Analysis Router Television Congratulations Content Filtering Encryption Server Microsoft Office IT Antivirus IaaS Data Backup Project Management Microsoft Teams Small Business Company Culture Gadgets Remote Monitoring and Management Office 365 Hard Drives Yahoo Millennials Freedom of Information Cost Management File Sharing File Management Virtual Private Network Storage Virtual Assistant Remote Support Paste G Suite Compliance IT Support Best Practices Outlook Cryptocurrency Cybersecurity Employees Email Management disposal Productivity The Internet of Things Windows 7 Vendor Management Ransomware WiFi Hosted Solutions Recycling Tip of the Week Avoiding Downtime Managed Service Provider Politics Unified Threat Management Amazon Social Media Machine Learning Education BYOD Cortana Windows 10 Wearables Certification Phishing Mobile Devices Maintenance Automation Digital Password Data Security Saving Money Applications Disaster Recovery IT Management Business Intelligence Unified Communications Payment Cards Inventory Managed IT Services Vendor Data Recovery Conferencing Battery Emergency Office Budget Dark Web Troubleshooting Chrome Miscellaneous Benchmarks HaaS eWaste Data Protection Touchscreen Wireless Internet Outsourced IT Help Desk Passwords Covid-19 Privacy Backup and Disaster Recovery Google Drive Gadget Files Database Streaming Media Instagram Malware Staffing Network Computers Profitability Authorization Hackers Telecommute Dark Data Management Telephone System Marketing Hacking Financial Reporting Voice over IP Wireless Charging Bandwidth Vulnerabilities Managed Service Scalability Leadership E-Commerce Information Network Security Remote Control Environment Licensing Hacker e-waste Money Hardware Tech Terms Scheduling Spotify Technology Tips Android Botnet Processors Paper Work/Life Balance Access Control Windows XP Payment Communications Government Net Neutrality BDR User Tips Hard Drive A.I. Remote Computing Communication Microsoft Office 365 Networking Bring Your Own Device Spyware Website App Hard Disk Drive Updates Distribution