Alltech IT Solutions Blog

This Florida City Will Pay 65 Bitcoins to Get Files Back

This Florida City Will Pay 65 Bitcoins to Get Files Back

Florida’s Atlantic coast is a destination for millions of visitors each year. One visitor is costing a coastal city a pretty penny. Riviera Beach, a small city just north of West Palm Beach, has been hit with a major ransomware attack. Today, we’ll tell you how it came to be that the small beach city would make dubious history by paying what is the largest ransomware payout in the short history of these attacks.

Inundated with ransomware for the past three weeks after one city employee clicked on a malicious link, the Riviera Beach’s city council voted unanimously to pay the 65 Bitcoin price tag to get their systems and data unencrypted. This was after they had already voted to spend almost $1 million to buy all new hardware. The city council believed that after the situations that have played out in other municipalities--where millions of dollars were spent avoiding ransomware payments--that their best recourse to recover their data was to pay the hacker’s demands. 

The problems started almost immediately after a city employee fell for a phishing email. The city email system was unavailable, and its 911 dispatchers didn’t have access to computing systems that are necessary for prompt emergency response. This led to large sections of the city’s computing infrastructure becoming unavailable.

Previous instances where ransomware victimized municipal computing infrastructure, like SamSam attacks in Atlanta, GA; Newark, NJ; and Sarasota, FL, had been so devastating to the workings of their local governments that Riviera Beach’s council had plenty of information to make their decision by. The FBI, The Department of Homeland Security, and the U.S. Secret Service are all investigating the Riviera Beach attack, but for now, no answers are available.

Typically, it is advised that ransomware victims do not pay the ransom, since it provides the experience and resources to hackers to continue to conduct acts of cybercrime; and, because there is no guarantee that hackers will stay true to their word and decrypt the files once the ransom has been paid. 

Ransomware is a growing problem for municipalities and businesses, alike. For more information about ransomware, and the litany of threats facing your network each day, subscribe to our blog.  

All You Need to Know Before Buying a Computer, Par...
Cloud Resources Can Be Costly


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, September 17 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Cost Management Communication Networking Remote Computing Regulation Machine Learning Spyware Travel Collaboration Users Vulnerability Paperless Office Downloads Yahoo Ink Chrome OS Time Management Payment Cards Managed IT Services Autocorrect Instagram Reporting Bring Your Own Device Google Drive Staffing Antivirus Backup Politics Tech Term Scam Printer Server Business Efficiency Cloud Windows Marketing Entertainment VoIP Connectivity Hacking Managed IT Solid State Drive Touchscreen Movies Update Alerts Printers Applications Maintenance Automation Cloud Computing Content Filtering eCommerce Quick Tips Health Tip of the week Wearables Video Excel Worker Network Security Gmail eWaste Windows 10 Windows 10 Outsourced IT HP Payment Access Physical Security Edge Microsoft Office 365 WhatsApp Outlook Bitcoin Scheduling How To User Tip Managing Stress Vulnerabilities Hackers RAM Conferencing Tip of the Week Healthcare Samsung Trends Apps Google Maps Batteries Vendor Management Laptop IT budget Information VoIp PowerPoint Artificial Intelligence Education Hiring/Firing Information Technology Malware Managed Service User Security Hard Drives Office Tips Proactive IT Error e-waste Router Cables Paper Comparison Analytics App Threat IT Management Document Management Webcam Password Hosted Solutions SaaS Remote Control Virtualization Holiday Law Enforcement Database Risk Management Backup and Disaster Recovery Remote Support Operating System Best Practices Mobile Device Management Google Live Streaming Streaming Media Microsoft Eliminating Downtime Taskbar Television Gaming Console IT Support Hosted Solution Communications Shortcut Hacker Inventory Virtual Assistant Data Recovery Patch Management Innovation Plug-In Internet Company Culture Technology Tips Sales Sports Two-factor Authentication Emergency Passwords Environment Telecommute Encryption A.I. Gadgets Data Protection OneNote Updates Printer Wireless Internet Business Technology Unified Threat Management IaaS Value Internet Explorer Spam Tablet Specifications Net Neutrality Business Computing DDoS Managed IT Services Freedom of Information Data Backup Analysis Chrome Big Data Windows XP Office 365 Millennials Leadership Upgrade Saving Money Data Security Workplace Tips Troubleshooting Training Wireless Charging Security Cameras Employees Microsoft Office Microsoft Teams Voice over Internet Protocol Recycling Authorization Paste Server Management Scalability Printing GDPR Privacy Battery Storage Telephone Systems Employee-Employer Relationship Cortana Certification Telephony Productivity Medical IT Biometrics Tech Terms Mobility SSD Office Telecommuting Recovery WannaCry Cabling Automobile Mobile Device Lead Generation Android Hard Disk Drive Video Games Search Data Help Desk Government Data loss E-Commerce Dongle Website Computer Computers Phone System Data Breach Going Green HaaS Wi-Fi Processors Dark Data Tech Support Workers Cleaning Hardware Social Media Smart Technology Bandwidth Windows 7 Credit Cards Multi-Factor Security Wireless Business Continuity G Suite Data Management Security IT Support Employer Employee Relationship Compliance BYOD Spotify Ransomware Managed Service Provider Productivity Remote Monitoring Websites Staff Alert Personal Information Emoji Cryptocurrency The Internet of Things Electronic Health Records Software Dark Web Financial Processor CrashOverride instant Messaging Access Control Facebook Customer Service Disaster Recovery Gadget Windows Server 2008 R2 Managed IT Service Business Intelligence Technology Employer-Employee Relationship Save Money National Security Network Attached Storage Smartphones Hybrid Cloud Unified Communications Profitability Miscellaneous Amazon Server Knowledge Spam Blocking Word User Tips Mobile Security Cybersecurity Twitter File Sharing Smartphone Telephone System Cybercrime Online Shopping Virus Money Botnet Blockchain VPN Thank You Congratulations Business Management Network Display Settings Avoiding Downtime Mobile Devices News Files Safety Human Resources Copy BDR Email Digital Tactics Voice over IP Email Management Apple Licensing Hard Drive IT Services Current Events Remote Monitoring and Management Synergy Phishing Authentication disposal iPhone HIPAA Work/Life Balance Computer Care Retail WiFi Browser Small Business Internet of Things Budget Benchmarks