Alltech IT Solutions Blog

This Florida City Will Pay 65 Bitcoins to Get Files Back

This Florida City Will Pay 65 Bitcoins to Get Files Back

Florida’s Atlantic coast is a destination for millions of visitors each year. One visitor is costing a coastal city a pretty penny. Riviera Beach, a small city just north of West Palm Beach, has been hit with a major ransomware attack. Today, we’ll tell you how it came to be that the small beach city would make dubious history by paying what is the largest ransomware payout in the short history of these attacks.

Inundated with ransomware for the past three weeks after one city employee clicked on a malicious link, the Riviera Beach’s city council voted unanimously to pay the 65 Bitcoin price tag to get their systems and data unencrypted. This was after they had already voted to spend almost $1 million to buy all new hardware. The city council believed that after the situations that have played out in other municipalities--where millions of dollars were spent avoiding ransomware payments--that their best recourse to recover their data was to pay the hacker’s demands. 

The problems started almost immediately after a city employee fell for a phishing email. The city email system was unavailable, and its 911 dispatchers didn’t have access to computing systems that are necessary for prompt emergency response. This led to large sections of the city’s computing infrastructure becoming unavailable.

Previous instances where ransomware victimized municipal computing infrastructure, like SamSam attacks in Atlanta, GA; Newark, NJ; and Sarasota, FL, had been so devastating to the workings of their local governments that Riviera Beach’s council had plenty of information to make their decision by. The FBI, The Department of Homeland Security, and the U.S. Secret Service are all investigating the Riviera Beach attack, but for now, no answers are available.

Typically, it is advised that ransomware victims do not pay the ransom, since it provides the experience and resources to hackers to continue to conduct acts of cybercrime; and, because there is no guarantee that hackers will stay true to their word and decrypt the files once the ransom has been paid. 

Ransomware is a growing problem for municipalities and businesses, alike. For more information about ransomware, and the litany of threats facing your network each day, subscribe to our blog.  

All You Need to Know Before Buying a Computer, Par...
Cloud Resources Can Be Costly
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, July 20 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tactics Current Events Scam Botnet Information Technology Backup and Disaster Recovery Small Business Outsourced IT CrashOverride OneNote User Tips Cables Managed Service Provider Workers Sales WhatsApp Telephone System File Sharing Video Games Payment Smartphones Hosted Solution Company Culture Hybrid Cloud iPhone Samsung Education Printer Server Managing Stress Gadget Virus SSD RAM Disaster Recovery Managed Service Online Shopping Website Plug-In Taskbar Electronic Health Records Save Money Voice over IP Excel Licensing Connectivity Certification Workplace Tips Remote Monitoring and Management Communication Data Backup Copy Retail Cryptocurrency Machine Learning WiFi Net Neutrality Server Mobile Device Management Printer Hardware Paper Business Technology Artificial Intelligence Phishing VPN Google Battery Access Privacy Profitability Tech Support Recovery Google Drive Risk Management Staff Avoiding Downtime Technology Tips Hard Drive App Android Scalability Microsoft Hacking Chrome Wireless Ink Human Resources Spam Technology Windows G Suite Emoji Microsoft Teams Microsoft Office IT Services Remote Computing Compliance Telecommute Gmail Document Management Communications Content Filtering VoIP Telecommuting Patch Management Microsoft Office 365 Best Practices Error Cost Management Smartphone Remote Control Wireless Internet Cleaning BYOD Specifications Knowledge Marketing Server Management Government Employees Windows 10 Managed IT Services Mobility Two-factor Authentication Scheduling Office 365 HaaS Analysis Webcam Business Continuity Printers Data Breach Yahoo Lead Generation Phone System Settings HIPAA Updates Bandwidth Social Media E-Commerce GDPR Display Processor Analytics PowerPoint Windows Server 2008 R2 Passwords Computer Cybersecurity Smart Technology Tech Term Gadgets Mobile Security A.I. Internet Collaboration Employer-Employee Relationship Conferencing Data Management Money Virtualization Network Apple Data Recovery Autocorrect Office Tips Digital IT Management Cybercrime Productivity Spotify Cloud Computing Networking Streaming Media Alerts Applications Data Business Intelligence Comparison Reporting Network Attached Storage Holiday The Internet of Things HP How To Sports Environment Troubleshooting disposal Dark Web BDR Telephone Systems Time Management Database Encryption Data loss Automobile Business e-waste Tablet Health Remote Support User Security Windows 10 instant Messaging Printing Staffing Software Twitter Maintenance Worker User Tip Data Security Solid State Drive Big Data eWaste Physical Security Cortana Training Emergency Unified Threat Management Budget Computer Care Edge News Router Data Protection Safety Internet Explorer Apps Managed IT Service Windows XP Hard Disk Drive Law Enforcement Users Backup Storage Network Security IT budget Operating System Miscellaneous Cloud Password Wireless Charging Mobile Device Proactive IT VoIp Update Browser Wearables Remote Monitoring Video Television Tip of the Week Innovation Travel Unified Communications Managed IT Services Telephony Customer Service Paste Synergy Live Streaming Tip of the week Tech Terms Downloads Files WannaCry Personal Information Windows 7 Employer Employee Relationship Chrome OS Regulation IaaS Leadership Dark Data Hosted Solutions Work/Life Balance Gaming Console Voice over Internet Protocol Congratulations Movies Entertainment Facebook Spyware Authorization Millennials IT Support Threat Help Desk Cabling Upgrade Authentication Hiring/Firing Access Control Internet of Things Business Management Spam Blocking Alert Word Processors Medical IT Hacker Email Management Hard Drives Shortcut Multi-Factor Security Benchmarks Email Employee-Employer Relationship Websites Bring Your Own Device Google Maps Ransomware Automation Blockchain Biometrics Trends Saving Money eCommerce Mobile Devices IT Support Dongle Paperless Office Quick Tips Politics Eliminating Downtime Security Efficiency Vulnerabilities SaaS Office Thank You Vendor Management Computers Malware Wi-Fi Antivirus Managed IT Information Freedom of Information Outlook Security Cameras National Security Search Value Productivity Inventory Business Computing Vulnerability Instagram Virtual Assistant Amazon Credit Cards Hackers Laptop Healthcare DDoS Touchscreen