ct logo wslogan

i-medIT Blog

At i-medIT, we provide a comprehensive range of computer and technology solutions to small business owners and Ambulatory Health Care entities. We specialize in helping companies focus on their business by leveraging IT to serve their goals and objectives rather than being a distraction.
Customers come to us for managed services, healthcare IT, project management, IT consulting, HIPAA Compliance, PCI Compliance, server virtualization, and data backup. These core services help our customers run their own companies and take their business goals to the next level.

TheDarkOverlord Solutions Is at It Again! This Time the Hacker Group Is Targeting Schools

TheDarkOverlord Solutions Is at It Again! This Time the Hacker Group Is Targeting Schools

While many youngsters enjoy it when their school shuts down, this was likely not the case in Flathead Valley, Montana, where the cybercriminal group ‘TheDarkOverlord Solutions’ targeted the entire Columbia Falls school district. This attack caused the three-day closure and otherwise disrupted over 30 schools, and the personal information of teachers, students, and school administrators was supposedly to be released if the group didn’t receive a ransom payment.

Furthermore, and more alarmingly, parents received reportedly graphic death threats against their children from the group. These threats alluded to an infamous, and still painfully recent, school shooting. This is the first time that TheDarkOverlord Solutions have gone to these lengths as far as is known.

The district server for Columbia Falls was ultimately targeted; records detailing the addresses, medical history, behavioral history, and other pieces of information valuable to cybercriminals were accessed that detailed the personal data of current and former students, their parents, and the school’s staff members. As a result, the 30 schools closed (as referenced above) and weekend events and activities were cancelled. With a heightened security presence, students returned to classes on Tuesday, September 19th.

TheDarkOverlord is no stranger to the news, or to targeting vulnerable individuals. In July of 2017, there was an online sale for a tantalizing data set that would allow cybercriminals to leverage information harvested from healthcare providers, just weeks after putting almost nine and a half million records for sale. These records came from a clinic, a healthcare provider, and a health insurance provider.

Somewhat less threateningly, the same group also took credit for releasing the fifth season of the Netflix hit series Orange is the New Black before its official release date, despite receiving about $50,000 worth of cryptocurrency in ransom from an audio post-production studio.

This piece of history shows why the Columbia Falls school district is right in their decision to not pay the ransom, as it in no way guarantees that the cybercriminal (or group) responsible will hold up their end of the bargain. Even if they do, it only proves that the victims are willing to pay, designating themselves as the perfect target for repeated attacks.

The key to your safety is to ensure your data is secure against the entire spectrum of threats. i-medIT can help you to do so. Call us at 630-549-6199 to get started.

 

Comments

No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Hackers Cloud Backup Google Microsoft Business Computing Privacy Innovation Hardware Efficiency Small Business Malware Data Cybercrime Ransomware Software Email Internet Mobile Devices Business Continuity Cybersecurity Smartphones Android Managed IT Services Business Productivity Gadgets How To Business Management Chrome Upgrade VoIP Spam Data Breach Law Enforcement Computer Windows Data Backup Computers Network Security Browser Server Automation Operating System Social Media Safety User Tips App Mobile Device Management Money The Internet of Things Unsupported Software Miscellaneous Government Bandwidth Hosted Solutions Phishing Spam Blocking Telephone Systems Social Engineering Smartphone Redundancy Data Security Alert Avoiding Downtime Collaboration Downtime Windows 10 Communication Recovery Physical Security Quick Tips Private Cloud Google Drive Saving Money Public Cloud Network Internet Exlporer Data Storage Data storage Disaster Recovery Office 365 Windows 10 Save Money Passwords Bring Your Own Device Word Relocation Productivity Windows Server 2008 Virtualization IT Consultant Router Managed IT Root Cause Analysis User Error Windows 7 Software Tips Monitor Botnet Going Green Uninterrupted Power Supply HaaS Black Market Flash NarrowBand BYOD IT Services webinar Windows 10s Computer Care Travel Reputation Office Tips Meetings Networking Internet of Things Apple End of Support Hiring/Firing Wireless Technology Outsourced IT Conferencing Vulnerability Samsung Customer Cleaning Sports Flexibility IBM iPhone Patch Management Internet exploMicrosoft Sync HBO Managed IT Services Emails Solid State Drive Marketing Value Data Recovery Hacking Tech Support Data loss Supercomputer Robot Managed Service Provider Advertising Automobile Audit Artificial Intelligence Remote Monitoring Laptop Shadow IT Screen Mirroring Budget Telephony Chromecast Computer Fan Update Touchpad Cast BDR Health Skype Wi-Fi Netflix Microsoft Office FENG Facebook Cloud Computing Frequently Asked Questions Current Events Hybrid Cloud Start Menu DDoS IT Support Excel IT Management Knowledge Outlook Files Tools OneNote Office Gmail Tip of the week YouTube IT Plan Network Congestion Humor History Settings Content CrashOverride Password Public Computer Troubleshooting Workplace Tips Computing Infrastructure Vendor Management Audiobook Techology Big Data Electronic Medical Records Instant Messaging Applications Charger Entertainment Books Save Time Data Management Users Wireless Holiday IT Support Emergency Virtual Reality Employer Employee Relationship Worker Commute Risk Management Mobility Scam Computer Accessories Search Webinar Loyalty VPN Politics Legal Transportation Bluetooth How to IT solutions Work/Life Balance SaaS Remote Computing Keyboard Best Practice Benefits WiFi Experience Mobile Device Firewall Worker Apps Thank You Communications Assessment Google Docs Wearable Technology Music Video Games Smart Technology PDF Rootkit Battery Congratulations Television Website USB Two Factor Authentication Scalability Education Information Technology Training