Get Started Today!  (415) 295-4898

croom new

415 IT Blog

65 Bitcoin Ransom Paid by Florida City

65 Bitcoin Ransom Paid by Florida City

65 of any currency doesn’t seem like a lot of money, but when you are dealing in the cryptocurrency Bitcoin, it adds up quick. One city on Florida’s Atlantic coast is finding that out the hard way after getting hit with a ransomware that stymied the city of 35,000 government’s ability to function. Let’s take a look at the situation that made the city’s leaders agree to pay hundreds of thousands of dollars to scammers.

A few weeks ago, an unwitting employee of the city of Riviera Beach, a small city just up the coast from West Palm Beach, clicked on a file that wasn’t supposed to be clicked on and it ended up locking large portions of their municipal computing infrastructure. When the initial report came to the City Council, they decided it was high time that they updated their computers and approved to spend nearly $1 million to update all municipal computers. Only then were they told that new hardware is all well and good, but paying to upgrade their computers isn’t going to get their access to data back. 

The only way that was going to happen is by giving over to the hackers demands. They were simple: produce 65 Bitcoin, and the files will be decrypted. Since after the ransomware was deployed, the city email system was unavailable and its 911 dispatchers didn’t have access to computing systems that are necessary for prompt emergency response, the city council acted quickly as to avoid a long, drawn-out situation that could potentially cost the city millions. 

Ransomware victims: Atlanta, GA; Newark, NJ; and Sarasota, FL, had been examples of cities that refused to pay ransoms only to see costs of recovery soar. Currently, the FBI, the Department of Homeland Security, and the U.S. Secret Service are all working on the case.

Typically, we’ve advised ransomware victims not to pay the ransom, since it provides the hackers the resources they need to continue conducting acts of cybercrime. It’s been mentioned repeatedly by IT professionals and cybercrime experts that there is no guarantee that hackers will stay true to their word and decrypt the files once the ransom has been paid. 

Ransomware is a major and continuously-developing problem for municipalities and businesses, alike. For more information about ransomware, subscribe to our blog, or give us a call at (415) 295-4898.

Our Top 7 List of IT Myths and Wild Conspiracies
Tip of the Week: Working Around Windows’ Restore P...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, July 17 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Productivity Best Practices Business Computing Data Backup Hosted Solutions Network Security Privacy Software Cloud Data Recovery Data Email Malware IT Support IT Services Outsourced IT Tech Term Business Internet Managed IT Services Innovation Hackers Computer Business Management Cloud Computing Small Business User Tips Ransomware Collaboration Microsoft Windows 10 Upgrade Efficiency Google Hardware Mobile Devices Paperless Office Android Phishing Server Business Continuity Managed Service Provider VoIp Encryption Communication Communications Remote Monitoring Vulnerability Smartphones Managed IT services Cybersecurity Passwords Browser Applications Data Management Managed IT Artificial Intelligence Office 365 Laptops Business Technology Holiday Managed Service Backup Quick Tips Workplace Tips Internet of Things Tip of the week Compliance Blockchain Processor Smartphone Project Management Employer-Employee Relationship Information Antivirus Disaster Recovery Saving Money Scam Wi-Fi Document Management Government Save Money Bandwidth Mobile Device Healthcare Website BYOD Automation Microsoft Office Windows Data Security Vendor Management BDR Infrastructure IT Management Customer Relationship Management Chrome Two-factor Authentication Router VPN Analytics Social Media Downtime Files Access Control Virtual Private Network Company Culture Gmail The Internet of Things Cooperation Server Management Network Risk Management Word Remote Workers Regulations Patch Management IoT Software as a Service Net Neutrality Assessment Management Tablet File Sharing RMM Data Loss Network Management Internet Exlporer Users Smart Technology Alert Proactive Consultation Redundancy Maintenance Storage Bring Your Own Device Help Desk HIPAA Facebook Remote Monitoring and Management Operating System Windows 7 Machine Learning Networking Mobile Security Unified Threat Management Employees Unified Communications Consulting Specifications Servers 5G Development Instant Messaging Settings Recycling Manufacturing Motherboard Chromebook Bookmarks ROI Operations Mobility Virtual Assistant Bitcoin IT Technicians Cost Management Lenovo Employee-Employer Relationship Digital Payment Hotspot IT Consulting Cyberattacks Social Managed IT Service Bluetooth GDPR Connectivity Samsung Fleet Tracking Zero-Day Threat Recovery Virtualization Managed Services Provider Mobile Device Management Black Friday Wireless Internet Cookies Cables SharePoint Customer Service Transportation Migration eWaste Password Vulnerabilities Mail Merge User Error Favorites Apps Money Wasting Time Current Events Superfish Wireless Mouse Language Managing Stress Data Breach Read Only Security Cameras Break Fix Asset Tracking Backup and Disaster Recovery Gadgets CIO applications Point of Sale Tech Terms Cyber Monday Staff Avoiding Downtime Websites Employer/Employee Relationships Nanotechnology Wires Downloads MSP Finance Permissions Chatbots Computing Infrastructure Hard Disk Drives Mobile Computing Address WiFi Conferencing Microsoft Excel Database Miscellaneous Mirgation Hard Drive Spam Enterprise Content Management Printing Dark Web Augmented Reality Notes Wearable Technology Star Wars Human Error Techology E-Commerce Theft SaaS Proactive Maintenance App Authentication Google Calendar Fraud Identity Theft Enterprise Resource Planning Computing Alerts Solid State Drives Geography Meetings Voice over Internet Protocol Projects Cache Monitoring Electronic Medical Records Social Networking Technology Laws Remote Worker Virtual Reality Touchscreen Hacking PowerPoint Display Utility Computing OneNote Permission Travel Outlook Disaster Resistance Features Financial Firewall Time Management Cybercrime Screen Reader Emergency Multi-Factor Security Authorization Teamwork Identity Comparison Licensing Heating/Cooling Options Modem High-Speed Internet Printer Politics Return on Investment Remote Computing OneDrive G Suite Unified Threat Management Office Private Cloud Data Warehousing Flexibility Trending Professional Services Training Tech Support Search How To Test Technology Tips Shortcut Proactive IT Electronic Health Records Procurement Distributed Denial of Service Statistics Database Management Smart Tech WPA3 Legislation Shared resources Mobile Regulation Marketing Twitter Education CEO Printers Students Daniel Stevens

Latest Blog

As you company grows, you will need to invest a good deal of the revenue that you take in to keep operations from falling into complacency. In order to get a good idea what investments would be most advantageous, doing a proactive ROI analysis of project you plan to undertak...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...