Emerge Blog

Emerge has been serving the Midwest region since 2004, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Ransomware Cyberattack Struck Atlanta, Georgia

A Ransomware Cyberattack Struck Atlanta, Georgia

Ransomware doesn’t discriminate with its targets, as the city of Atlanta, Georgia now knows so painfully well. The city became the target of a ransomware attack that crippled many of its critical system workflows. The municipal government suffered from one of the most advanced and sustained attacks in recent memory.

The culprits behind the attack, the hacker group SamSam, are known for meticulously selecting targets that they are fairly confident will pay up when faced with a ransomware attack. Even the mayor of Atlanta was intimidated enough by the attack as to compare it to a kidnapping or hostage situation. Access to important data, files, and applications hung in the balance, and the downtime caused by this incident led to considerable trouble for countless government officials and citizens. Technology has become such an integral part of running governments and businesses that even the slightest issue could have echoing repercussions, so you can imagine the shock and horror in the wake of this ransomware attack.

Even more horrific is the ransom demanded by the hackers that exceeded $51,000 in Bitcoin. Ransomware is known for locking down files and waiting for a payment from the victims before unlocking them. This particular strain of ransomware replaces the names of all affected files with the phrase “I’m sorry” and demands that the ransom be paid in a week.

By working with the technicians at Dell SecureWorks, Atlanta is back on its feet, but not without suffering considerably from the ransomware attack. It’s not clear if Atlanta will pay up for the release of its data, and confidentiality agreements mean that Dell SecureWorks will not reveal any information about their relationship to the attack. But one thing is painfully clear in the wake of such destruction: trying to pay the problem away can be just the beginning of ransomware issues.

For example, if you pay a ransomware developer for the safe return of your files, you might be funding further attacks on other victims. This is counter-productive to the security-minded culture of the business environment. Instead, it’s better to take preventative measures such as implementing data backup and disaster recovery, as well as identifying threats before they have a chance to become a problem. If you are ever struck by a ransomware attack, it’s better to reach out to an IT provider before committing to any payments to hackers. It’s better to try just about any alternative before investing in something that isn’t even a guaranteed fix.

To improve network security and enable preventative solutions, reach out to Emerge . Our trained and trusted technicians will work toward ensuring your network is airtight. To learn more, reach out to us at 859-746-1030.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 21 April 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Hackers Malware Business Business Computing Productivity Email Backup Internet Computer Hosted Solutions Microsoft Windows 10 IT Services Mobile Devices Smartphone Software Network Security User Tips Managed Service Provider Google Ransomware Android Workplace Tips Hardware Efficiency Social Media Server Smartphones Browser Business Continuity Data Management Small Business Windows Communication Data Innovation Disaster Recovery App IT Support Managed IT Services Big Data Facebook Office Business Management Office 365 Gmail Encryption Miscellaneous Spam Apps Cloud Computing Artificial Intelligence Upgrade Holiday Phishing Password Internet of Things Hosted Solution Office Tips WiFi Robot Data Recovery Network Recovery Mobile Device Management Alert Employer-Employee Relationship Chrome Save Money Customer Service Money Passwords Government Microsoft Office How To Apple Work/Life Balance Word Risk Management Hacker Firewall Remote Monitoring Saving Money Outsourced IT Tip of the week Infrastructure Productivity Content Filtering BYOD Education Computing Data storage Virtualization Analytics Unified Threat Management Wi-Fi Data Backup Tech Term IT Support IT Management Antivirus IT service Two-factor Authentication Virtual Reality Avoiding Downtime Paperless Office Settings SaaS Budget Hacking Document Management Cybersecurity Windows 10 Cybercrime Website Social Bandwidth Automation VPN VoIP Sports Websites Safety Bring Your Own Device Physical Security Server Management Twitter Botnet Administration Wireless Specifications Taxes Outlook The Internet of Things Business Growth Mobile Device Virtual Desktop Storage IBM Business Owner Samsung Tablet communications Best Practice Business Technology Health Computer Care Customer Relationship Management BDR Managed IT Services Heating/Cooling Training Vendor Management IT Consultant Computers Maintenance Augmented Reality Mouse Telephone Systems Downtime End of Support Tech Support LiFi Scam Automobile Legal Lithium-ion battery Marketing YouTube Upgrades Search Remote Computing User Running Cable Presentation HIPAA Data Security Collaboration Data loss Wireless Technology Identity Theft IT solutions Monitors Competition Vulnerability Mobile Computing Humor File Sharing Cortana Going Green Google Drive Mobile Security Politics Virtual Private Network Analyitcs Printing Google Docs Domains Servers Hotspot Black Market IT Budget Disaster Writing Environment Mail Merge Mirgation Phone System Hard Drives Printer Motion Sickness CrashOverride Smart Technology G Suite Knowledge Public Speaking Entrepreneur Language Digital Payment Uninterrupted Power Supply Retail Alt Codes Troubleshooting Address Chatbots Refrigeration Access Control How To Distributed Denial of Service Gadgets Personal Information Experience Information Technology Buisness Statistics Computing Infrastructure Processors Machine Learning Hard Disk Drive Social Engineering Typing Identity Business Intelligence SharePoint Firefox Managed IT Service Users Computer Repair Cleaning Google Wallet User Error Bluetooth Alerts Relocation Meetings 5G Cryptocurrency Cost Management Downloads Break Fix Drones Dark Data Co-managed IT Licensing Notifications Lenovo Social Networking Private Cloud Unified Communications Compliance Webcam Bitcoin Multi-Factor Security Quick Tips Dark Web Electronic Medical Records Crowdsourcing Google Maps Cooperation Superfish Motherboard Error Regulations Point of Sale Windows 8 iPhone Undo Google Calendar Time Management Microsoft Excel Staffing Managed IT Staff Router Corporate Profile Fun Hacks Legislation Network Management Blockchain GPS Network Congestion Shortcut Wearable Technology Consumers Networking Modem Administrator WannaCry Web Server Laptop Comparison Touchscreen Permissions Update Tracking Law Enforcement Display Deep Learning Patch Management Cookies 3D Printing Cameras Current Events Halloween Operating System Black Friday Documents Fraud Chromebook Gadget Cabling IP Address Applications Techology Nanotechnology Digital Unsupported Software CCTV Scary Stories Cyber Monday PDF Emoji Supercomputer Mobile Office Solid State Drive eWaste IT Technicians Application Unified Threat Management Travel Spyware Mobile Data

Blog Archive

Upcoming Events

No events