Get Started Today!  (415) 295-4898

croom new

415 IT Blog

65 Bitcoin Ransom Paid by Florida City

65 Bitcoin Ransom Paid by Florida City

65 of any currency doesn’t seem like a lot of money, but when you are dealing in the cryptocurrency Bitcoin, it adds up quick. One city on Florida’s Atlantic coast is finding that out the hard way after getting hit with a ransomware that stymied the city of 35,000 government’s ability to function. Let’s take a look at the situation that made the city’s leaders agree to pay hundreds of thousands of dollars to scammers.

A few weeks ago, an unwitting employee of the city of Riviera Beach, a small city just up the coast from West Palm Beach, clicked on a file that wasn’t supposed to be clicked on and it ended up locking large portions of their municipal computing infrastructure. When the initial report came to the City Council, they decided it was high time that they updated their computers and approved to spend nearly $1 million to update all municipal computers. Only then were they told that new hardware is all well and good, but paying to upgrade their computers isn’t going to get their access to data back. 

The only way that was going to happen is by giving over to the hackers demands. They were simple: produce 65 Bitcoin, and the files will be decrypted. Since after the ransomware was deployed, the city email system was unavailable and its 911 dispatchers didn’t have access to computing systems that are necessary for prompt emergency response, the city council acted quickly as to avoid a long, drawn-out situation that could potentially cost the city millions. 

Ransomware victims: Atlanta, GA; Newark, NJ; and Sarasota, FL, had been examples of cities that refused to pay ransoms only to see costs of recovery soar. Currently, the FBI, the Department of Homeland Security, and the U.S. Secret Service are all working on the case.

Typically, we’ve advised ransomware victims not to pay the ransom, since it provides the hackers the resources they need to continue conducting acts of cybercrime. It’s been mentioned repeatedly by IT professionals and cybercrime experts that there is no guarantee that hackers will stay true to their word and decrypt the files once the ransom has been paid. 

Ransomware is a major and continuously-developing problem for municipalities and businesses, alike. For more information about ransomware, subscribe to our blog, or give us a call at (415) 295-4898.

Our Top 7 List of IT Myths and Wild Conspiracies
Tip of the Week: Working Around Windows’ Restore P...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, February 29 2020

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Productivity Best Practices Business Computing Data Backup Data IT Support Network Security Privacy Hosted Solutions Cloud Data Recovery Software IT Services Malware Email Managed IT Services Business Outsourced IT Internet Tech Term Efficiency Innovation Upgrade Computer Cloud Computing User Tips Windows 10 Microsoft Phishing Small Business Hackers Collaboration Business Management Google Mobile Devices Cybersecurity Hardware Business Continuity Ransomware Workplace Tips Managed Service VoIp Backup Android Paperless Office Communication Managed Service Provider Smartphones Communications Server Office 365 Data Management Managed IT Quick Tips Encryption Remote Monitoring Business Technology Holiday Vulnerability Wi-Fi Healthcare Internet of Things BDR Passwords Artificial Intelligence Laptops Disaster Recovery Help Desk Government Save Money Document Management Windows 7 Saving Money Facebook Browser Applications Compliance Network Mobile Device Managed IT services Smartphone Miscellaneous Vendor Management Scam Redundancy Avoiding Downtime Bandwidth Antivirus Automation Social Media Microsoft Office Virtualization Blockchain Processor Employer-Employee Relationship Tip of the week Project Management Information Data Loss Two-factor Authentication Chrome IT Management Router Maintenance VPN Analytics Customer Relationship Management Users Machine Learning OneDrive BYOD Website Access Control Windows Data Security Infrastructure IoT Software as a Service RMM Internet Exlporer File Management Server Management Dark Web Augmented Reality Alert Proactive Smart Technology Meetings Gadgets Storage Monitoring Payment Cards Assessment HIPAA Utility Computing Bring Your Own Device Remote Monitoring and Management Financial Networking Operating System Network Management Professional Services Training Consultation Search Mobile Security Employees Unified Communications Electronic Health Records Recycling Consulting Downtime Files Social Network Employee-Employer Relationship Virtual Private Network The Internet of Things Company Culture Gmail Risk Management Managed Services Provider Cooperation Word Remote Workers Password Unified Threat Management Apps Net Neutrality Regulations Patch Management Co-Managed IT Management Mobility Hard Drive Tablet File Sharing Notes Wearable Technology Star Wars IT Human Error Spam Enterprise Content Management Printing Optimization Authentication Google Calendar Fraud User Management Identity Theft Enterprise Resource Planning Techology E-Commerce Theft Proactive Maintenance Solid State Drive App Voice over Internet Protocol Projects Cache Video Conferencing Electronic Medical Records Computing Alerts Solid State Drives Geography PowerPoint Display Business Telephone OneNote Permission Travel Value of Managed Services Websites Social Networking Technology Laws Remote Worker Virtual Reality Emergency Multi-Factor Security Virtual Machines Authorization Teamwork Information Technology Identity Outlook Disaster Resistance Features Firewall Cybercrime Cyber security Screen Reader Politics Return on Investment Remote Computing Comparison Licensing Options Telephone Modem High-Speed Internet Printer Tech Support IT Assessment How To Test Technology Tips Managed Services SaaS G Suite Unified Threat Management Office Private Cloud Data Warehousing Flexibility Smart Tech Credit Cards WPA3 Legislation Shared resources Going Green Mobile Shortcut Proactive IT Procurement Distributed Denial of Service Database Management Instant Messaging Settings Personal Information Specifications 5G Touchscreen Mobile VoIP Hacking Development Operations Virtual Assistant Bitcoin IT Technicians Cost Management Lenovo Digitize Digital Payment Hotspot Manufacturing Time Management Vendor Motherboard Chromebook Bookmarks ROI Connectivity Samsung Computers Fleet Tracking Zero-Day Threat Batteries Heating/Cooling IT Consulting Cyberattacks Social Managed IT Service GDPR Windows Server 2008 Customer Service Transportation Active Directory Migration eWaste Mobile Device Management Black Friday Wireless Internet Big Data Trending Cookies Cables SharePoint Money Wasting Time Current Events Superfish Shadow IT Wireless Mouse Language Smart Devices Statistics Vulnerabilities Mail Merge User Error Favorites Holidays Asset Tracking Backup and Disaster Recovery CIO applications Remote Work Servers Managing Stress Data Breach Read Only Security Cameras Break Fix Downloads MSP Finance Permissions Windows Server Chatbots Point of Sale Tech Terms Cyber Monday Staff Employer/Employee Relationships Apple Nanotechnology Wires Microsoft Excel Database Recovery Mirgation Outsourcing Computing Infrastructure Hard Disk Drives Sensors Bluetooth Mobile Computing Address WiFi Conferencing CEO Printers Students Marketing Daniel Stevens Regulation Twitter Education

Latest Blog

It wasn’t too long ago when the idea of video conferencing was a very complicated one. The technology just wasn’t there to make it a major benefit for companies. As conferencing technology has been innovated upon, however, it now presents a laundry list of substantial benefi...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...