Network Synergy Blog

A Ransomware Cyberattack Struck Atlanta, Georgia

A Ransomware Cyberattack Struck Atlanta, Georgia

Ransomware doesn’t discriminate with its targets, as the city of Atlanta, Georgia now knows so painfully well. The city became the target of a ransomware attack that crippled many of its critical system workflows. The municipal government suffered from one of the most advanced and sustained attacks in recent memory.

The culprits behind the attack, the hacker group SamSam, are known for meticulously selecting targets that they are fairly confident will pay up when faced with a ransomware attack. Even the mayor of Atlanta was intimidated enough by the attack as to compare it to a kidnapping or hostage situation. Access to important data, files, and applications hung in the balance, and the downtime caused by this incident led to considerable trouble for countless government officials and citizens. Technology has become such an integral part of running governments and businesses that even the slightest issue could have echoing repercussions, so you can imagine the shock and horror in the wake of this ransomware attack.

Even more horrific is the ransom demanded by the hackers that exceeded $51,000 in Bitcoin. Ransomware is known for locking down files and waiting for a payment from the victims before unlocking them. This particular strain of ransomware replaces the names of all affected files with the phrase “I’m sorry” and demands that the ransom be paid in a week.

By working with the technicians at Dell SecureWorks, Atlanta is back on its feet, but not without suffering considerably from the ransomware attack. It’s not clear if Atlanta will pay up for the release of its data, and confidentiality agreements mean that Dell SecureWorks will not reveal any information about their relationship to the attack. But one thing is painfully clear in the wake of such destruction: trying to pay the problem away can be just the beginning of ransomware issues.

For example, if you pay a ransomware developer for the safe return of your files, you might be funding further attacks on other victims. This is counter-productive to the security-minded culture of the business environment. Instead, it’s better to take preventative measures such as implementing data backup and disaster recovery, as well as identifying threats before they have a chance to become a problem. If you are ever struck by a ransomware attack, it’s better to reach out to an IT provider before committing to any payments to hackers. It’s better to try just about any alternative before investing in something that isn’t even a guaranteed fix.

To improve network security and enable preventative solutions, reach out to Network Synergy. Our trained and trusted technicians will work toward ensuring your network is airtight. To learn more, reach out to us at 203.261.2201.

Reduce Your Technology Headaches Go with Managed I...
Power Off, or Leave It On?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, December 17, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Website Mobile Security Monitors USB Consumers Mirgation Crowdsourcing Permission Microsoft Office Domains Writing Healthcare Regulation Memory Two-factor Authentication Streaming Media Flexibility Virus Heating/Cooling IT Support Computing Infrastructure Cables Passwords Printing Conferencing Data Recovery Mobile Technology Data Warehousing Nanotechnology Windows Outlook Employer-Employee Relationship Entrepreneur Technology Laws Web Server Managed IT services Scheduling Trending PC Care Downloads Bookmarks IT Consultant Computers Bitcoin 3D Unified Threat Management Debate Techology IT Management Blockchain Technology Business Tech Term Law Enforcement Authentication Artificial Intelligence Scam Twitter Content Filtering Managed IT Chatbots Going Green Browser Public Speaking Theft Compliance Legal Statistics App Virtual Private Network Knowledge Digital Payment Phone System Data Security Information Tutorials PDF Wireless Technology HIPAA Laptop Financial Trainging Remote Monitoring and Management Administration Sync Upgrade Thank You Google Calendar Identity Theft Data Management History Word Migration Smart Technology Electronic Health Records Utility Computing Procurement Data storage User Uninterrupted Power Supply Modem Spam Read Only Smartphone Telephone Systems Fun Vulnerability CIO Screen Reader Troubleshooting Facebook Disaster Resistance Tech Terms Remote Monitoring Best Practice Unified Threat Management Customer Service Mobile Device Management File Sharing Mouse High-Speed Internet Fleet Tracking Settings Notifications Tablet WiFi Travel Lithium-ion Battery Cloud Typing Recycling Cooperation Electronic Medical Records Hiring/Firing Hosted Solution LiFi User Error Money Office 365 MSP Outsourced IT Network Mobile Computing Augmented Reality Network Congestion Alerts Project Management Backup IT Technicians End of Support Proactive Employee-Employer Relationship Remote Computing Bandwidth Emoji Cybercrime Cloud Computing Mobile Device Cache Internet of Things Data Applications Managed Services Provider Vulnerabilities Staff Supercomputer Business Intelligence Innovation Digital Signature Refrigeration Chromebook Experience Environment Software BYOD Tip of the Work IT service Online Currency 3D Printing LinkedIn Tech Support Secruity Chrome Buisness Windows 10 Black Market Documents Machine Learning GPS Server Mobile Office Humor Identity Cyberattacks Software Tips Administrator Help Desk Training Hardware Hackers Phishing YouTube Business Owner E-Commerce Hacks Asset Tracking Unified Communications Android Hacking Net Neutrality Disaster Computer Identities Human Error Apps Text Messaging Recovery Black Friday Office Tips Cleaning Windows 8 Superfish Data Loss SaaS Upgrades Legislation Social Networking Websites Save Money Saving Money Networking Antivirus Business Technology Shortcut Social Media Mobile Data How To Botnet Collaboration Finance Best Practices Operating System Education Windows 10 Monitoring Wires IP Address Computing Start Menu Google Wallet Inbound Marketing Unsupported Software Cybersecurity RMM Storage Printers Touchscreen BDR Virtual Reality Video Surveillance Cookies Enterprise Resource Planning Encryption Consultation Hard Disk Drive Users Automation Save Time Macro Managed Service Provider Wearable Technology Test Law Firm IT Hard Drive Workplace Tips Alert Gadget IT Support Print Server Productivity Samsung Competition Charger Quick Tips Language Hosted Solutions Business Growth Cortana Tracking Productivity Social Crowdfunding Gadgets Food Excel SharePoint Maintenance VPN CCTV Operations Servers Privacy Router Microsoft Congratulations IT budget Logs People Managed IT Service WPA3 Small Business Running Cable Motion sickness Email PowerPoint Disaster Recovery Hard Drives Instant Messaging Google Analytics Point of Sale Enterprise Content Management Government Budget Managed IT Services OneNote Geography Cameras Cyber Monday Break Fix Internet Smartphones Taxes Alt Codes Webcam Regulations Distributed Denial of Service eBay Efficiency Firewall Personal Information Information Technology Business Management Security Gaming Console Battery User Tips Zero-Day Threat Management Motherboard Value Features Processors Redundancy Retail Internet Exlporer Skype How To Specifications Cost Management Leadership Password Favorites Comparison Employees Multi-Factor Security Connectivity Google Drive Business Continuity Time Management Paperless Office Hotspot Solid State Drive Application Mail Merge Service-based Business Patch Management Automobile 5G Technology Tips Staffing Remote Support Consulting Google Maps Assessment Malware Address The Internet of Things Robot Hacker Wi-Fi IT Services Piracy Cabling Risk Management Tip of the Week Tip of the week Spyware Sports Virtualization Bring Your Own Device Halloween Vendor Management Managing Stress G Suite Current Events Backups Digital Server Management Lenovo Wireless Backup and Disaster Recovery Remote Workers Search Mobile Devices Presentation Error Files Relocation Proactive IT Work Station Display Software as a Service Safety Document Management Google Docs Computer Care iPhone Virtual Desktop Mobility Permissions Analyitcs Miscellaneous Mobile IoT Drones Meetings eWaste Social Engineering Undo Firefox Development Best Available Corporate Profile Deep Learning Company Culture Dark Web Printer Authorization Downtime Private Cloud Office Avoiding Downtime Infrastructure Fraud Windows 8.1 Update Intranet Access Control Politics VoIP Computer Repair Network Security Google Big Data Saving Time Smart Tech Public Cloud Telephony IT Consulting Licensing Microsoft Excel Cryptocurrency Communication Managed Service communications Bluetooth Computer Accessories IT Solutions Star Wars Physical Security Holiday CrashOverride Data Backup Work/Life Balance Programming Ransomware Co-managed IT Data Breach Network Management Fax Server Business Computing Gmail Scary Stories Customer Relationship Management Webinar IBM Marketing Health Apple

      Latest Blogs

      As the modern gift certificate, the gift card has become an institution, especially around the holidays. Thousands of companies offer statically-priced and reloadable gift cards. W...

      Latest News

      Our Site Has Launched!

      flag

      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.

      callphone

      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube