Get Started Today!  (415) 295-4898

croom new

415 IT Blog

65 Bitcoin Ransom Paid by Florida City

65 Bitcoin Ransom Paid by Florida City

65 of any currency doesn’t seem like a lot of money, but when you are dealing in the cryptocurrency Bitcoin, it adds up quick. One city on Florida’s Atlantic coast is finding that out the hard way after getting hit with a ransomware that stymied the city of 35,000 government’s ability to function. Let’s take a look at the situation that made the city’s leaders agree to pay hundreds of thousands of dollars to scammers.

A few weeks ago, an unwitting employee of the city of Riviera Beach, a small city just up the coast from West Palm Beach, clicked on a file that wasn’t supposed to be clicked on and it ended up locking large portions of their municipal computing infrastructure. When the initial report came to the City Council, they decided it was high time that they updated their computers and approved to spend nearly $1 million to update all municipal computers. Only then were they told that new hardware is all well and good, but paying to upgrade their computers isn’t going to get their access to data back. 

The only way that was going to happen is by giving over to the hackers demands. They were simple: produce 65 Bitcoin, and the files will be decrypted. Since after the ransomware was deployed, the city email system was unavailable and its 911 dispatchers didn’t have access to computing systems that are necessary for prompt emergency response, the city council acted quickly as to avoid a long, drawn-out situation that could potentially cost the city millions. 

Ransomware victims: Atlanta, GA; Newark, NJ; and Sarasota, FL, had been examples of cities that refused to pay ransoms only to see costs of recovery soar. Currently, the FBI, the Department of Homeland Security, and the U.S. Secret Service are all working on the case.

Typically, we’ve advised ransomware victims not to pay the ransom, since it provides the hackers the resources they need to continue conducting acts of cybercrime. It’s been mentioned repeatedly by IT professionals and cybercrime experts that there is no guarantee that hackers will stay true to their word and decrypt the files once the ransom has been paid. 

Ransomware is a major and continuously-developing problem for municipalities and businesses, alike. For more information about ransomware, subscribe to our blog, or give us a call at (415) 295-4898.

Our Top 7 List of IT Myths and Wild Conspiracies
Tip of the Week: Working Around Windows’ Restore P...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, September 21 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Productivity Best Practices Business Computing Data Backup IT Support Network Security Hosted Solutions Data Privacy Cloud Software Data Recovery Outsourced IT IT Services Internet Email Managed IT Services Malware Tech Term Business User Tips Innovation Hackers Computer Windows 10 Business Management Cloud Computing Small Business Ransomware Efficiency Collaboration Microsoft Paperless Office Upgrade Hardware Android Google Phishing Mobile Devices Server Business Continuity Managed Service Managed Service Provider Remote Monitoring VoIp Encryption Communication Communications Backup Artificial Intelligence Office 365 Internet of Things Vulnerability Smartphones Managed IT Workplace Tips Cybersecurity Browser Applications Saving Money Laptops Business Technology Holiday Managed IT services Passwords Help Desk Wi-Fi Document Management Quick Tips Save Money Data Management Healthcare Automation Antivirus Microsoft Office Compliance Blockchain BDR Processor Smartphone Project Management Employer-Employee Relationship Information Mobile Device Disaster Recovery Tip of the week Scam Government Bandwidth Avoiding Downtime Website Access Control BYOD Customer Relationship Management Windows Data Security Infrastructure Social Media RMM Chrome Two-factor Authentication Router Analytics VPN Windows 7 Vendor Management IT Management Employees Assessment Unified Communications Files Recycling Downtime Virtual Private Network Network Management Users Gmail Consultation The Internet of Things Company Culture Network Risk Management Cooperation Word Remote Workers Facebook IoT Software as a Service Net Neutrality Regulations Patch Management Management File Sharing Tablet Unified Threat Management Dark Web Internet Exlporer Data Loss Alert Proactive Smart Technology Redundancy Maintenance Mobility Storage Monitoring HIPAA Bring Your Own Device Remote Monitoring and Management Financial Server Management Machine Learning Networking Operating System Professional Services Training Mobile Security Procurement Websites Distributed Denial of Service Database Management Smart Tech WPA3 Legislation Shared resources Going Green Mobile Shortcut Proactive IT Electronic Health Records 5G Development Instant Messaging Settings Personal Information Consulting Specifications Bookmarks ROI Operations Virtual Assistant Bitcoin IT Technicians Cost Management Lenovo Employee-Employer Relationship Digital Payment Hotspot Manufacturing Vendor Motherboard Chromebook Cyberattacks Social SaaS Managed IT Service GDPR Connectivity Samsung Fleet Tracking Zero-Day Threat Virtualization Batteries IT Consulting Wireless Internet Cookies Cables SharePoint Customer Service Transportation Active Directory Migration eWaste Managed Services Provider Mobile Device Management Black Friday Vulnerabilities Mail Merge User Error Favorites Touchscreen Apps Hacking Money Wasting Time Current Events Superfish Wireless Mouse Language Password Smart Devices Read Only Time Management Security Cameras Break Fix Asset Tracking Backup and Disaster Recovery CIO applications Remote Work Managing Stress Data Breach Employer/Employee Relationships Nanotechnology Wires Downloads MSP Finance Permissions Windows Server Chatbots Point of Sale Tech Terms Heating/Cooling Cyber Monday Staff Mobile Computing Address WiFi Conferencing Trending Microsoft Excel Database Miscellaneous Mirgation Hard Drive Computing Infrastructure Hard Disk Drives Sensors Printing Statistics Augmented Reality Notes Wearable Technology Star Wars Human Error File Management Spam Enterprise Content Management Proactive Maintenance App Authentication Google Calendar Fraud User Management Identity Theft Enterprise Resource Planning Techology E-Commerce Theft Servers Geography Meetings Voice over Internet Protocol Projects Cache Electronic Medical Records Computing Alerts Solid State Drives Remote Worker Bluetooth Virtual Reality PowerPoint Display Utility Computing OneNote Permission Recovery Travel Value of Managed Services Social Networking Technology Laws Firewall Cybercrime Screen Reader Emergency Multi-Factor Security Authorization Teamwork Information Technology Identity Outlook Disaster Resistance Features Options Modem High-Speed Internet Printer Politics Return on Investment Remote Computing Comparison Licensing Unified Threat Management Office Private Cloud Data Warehousing Flexibility Tech Support Search How To Gadgets Test Technology Tips OneDrive Managed Services G Suite Regulation Twitter Education Printers CEO Students Payment Cards Daniel Stevens Marketing

Latest Blog

Whether it’s RFID sensors, mobile devices, or commercial goods, the Internet of Things (IOT) is an exponentially expanding industry. Which makes us think, “What can we expect in the near future for IOT?” Today, we will answer this very question.

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...