ct logo wslogan

i-medIT Blog

At i-medIT, we provide a comprehensive range of computer and technology solutions to small business owners and Ambulatory Health Care entities. We specialize in helping companies focus on their business by leveraging IT to serve their goals and objectives rather than being a distraction.
Customers come to us for managed services, healthcare IT, project management, IT consulting, HIPAA Compliance, PCI Compliance, server virtualization, and data backup. These core services help our customers run their own companies and take their business goals to the next level.

TheDarkOverlord Solutions Is at It Again! This Time the Hacker Group Is Targeting Schools

TheDarkOverlord Solutions Is at It Again! This Time the Hacker Group Is Targeting Schools

While many youngsters enjoy it when their school shuts down, this was likely not the case in Flathead Valley, Montana, where the cybercriminal group ‘TheDarkOverlord Solutions’ targeted the entire Columbia Falls school district. This attack caused the three-day closure and otherwise disrupted over 30 schools, and the personal information of teachers, students, and school administrators was supposedly to be released if the group didn’t receive a ransom payment.

Furthermore, and more alarmingly, parents received reportedly graphic death threats against their children from the group. These threats alluded to an infamous, and still painfully recent, school shooting. This is the first time that TheDarkOverlord Solutions have gone to these lengths as far as is known.

The district server for Columbia Falls was ultimately targeted; records detailing the addresses, medical history, behavioral history, and other pieces of information valuable to cybercriminals were accessed that detailed the personal data of current and former students, their parents, and the school’s staff members. As a result, the 30 schools closed (as referenced above) and weekend events and activities were cancelled. With a heightened security presence, students returned to classes on Tuesday, September 19th.

TheDarkOverlord is no stranger to the news, or to targeting vulnerable individuals. In July of 2017, there was an online sale for a tantalizing data set that would allow cybercriminals to leverage information harvested from healthcare providers, just weeks after putting almost nine and a half million records for sale. These records came from a clinic, a healthcare provider, and a health insurance provider.

Somewhat less threateningly, the same group also took credit for releasing the fifth season of the Netflix hit series Orange is the New Black before its official release date, despite receiving about $50,000 worth of cryptocurrency in ransom from an audio post-production studio.

This piece of history shows why the Columbia Falls school district is right in their decision to not pay the ransom, as it in no way guarantees that the cybercriminal (or group) responsible will hold up their end of the bargain. Even if they do, it only proves that the victims are willing to pay, designating themselves as the perfect target for repeated attacks.

The key to your safety is to ensure your data is secure against the entire spectrum of threats. i-medIT can help you to do so. Call us at 630-549-6199 to get started.

 

Comments

No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Google Privacy Hackers Cloud Backup Microsoft Business Computing Smartphones Innovation Hardware Small Business Malware Data Data Backup Software Business Cybercrime Ransomware Efficiency Email Internet Windows User Tips Mobile Devices Business Continuity Social Engineering Android Cybersecurity Productivity Managed IT Services VoIP How To Chrome Spam Computer Data Breach App Data Recovery Communication Browser Server Law Enforcement Automation Disaster Recovery Outsourced IT Safety Collaboration Bring Your Own Device Managed IT Services Windows 10 Mobile Device Management Gadgets Business Management Computers Upgrade Network Security Operating System Social Media Office 365 Redundancy Avoiding Downtime Downtime Data Security Windows 10 Recovery Money Quick Tips Router Government Saving Money Network Internet Exlporer Data storage BDR Alert Save Money Passwords Cloud Computing Data Storage IT Management Word Miscellaneous Artificial Intelligence The Internet of Things Physical Security Two-factor Authentication Private Cloud Bandwidth Google Drive Hosted Solutions Unsupported Software Public Cloud Telephone Systems Wi-Fi Smartphone Phishing Spam Blocking Communications Wireless Technology Cleaning webinar Files BYOD Comparison Sports Windows 10s Computer Care Office Meetings Sync Networking Tech Support Conferencing Hiring/Firing History Robot Specifications Vulnerability Samsung Patch Management Relocation IBM Remote Monitoring Shadow IT Emails Laptop HBO Business Intelligence Solid State Drive Value Scam Chromecast Data loss Telephony Supercomputer Update Touchpad User Error Millennials Audit HaaS Screen Mirroring Skype Budget IT Services Workforce Reputation Computer Fan Frequently Asked Questions Apple Cast Start Menu DDoS Google Docs Netflix End of Support Outlook Telecommuting Customer FENG Excel Flexibility iPhone Tools Current Events Website Gmail IT Support Internet exploMicrosoft Humor Marketing Remote Work YouTube Hacking Tip of the week Managed Service Provider Knowledge Voice over Internet Protocol Advertising OneNote Windows Server 2008 Virtualization Automobile IT Plan Managed IT Network Congestion Settings Work/Life Balance Monitor Windows 7 IT Consultant Productivity Going Green Health Botnet Uninterrupted Power Supply Multi-Factor Security Black Market Microsoft Office Facebook NarrowBand Root Cause Analysis Flash Software Tips Travel Office Tips Internet of Things Hybrid Cloud Trending Apps Books Save Time Music Video Games PDF Battery Emergency Scalability Information Technology Education Content Password Employer Employee Relationship Workplace Tips VPN Computing Infrastructure Audiobook Techology Webinar Computer Accessories Instant Messaging Remote Computing Loyalty Applications Transportation Entertainment WiFi IT solutions Bluetooth Wireless SaaS Users Benefits Holiday IT Support Thank You Virtual Reality Firewall Congratulations Worker Assessment Wearable Technology Worker Commute Smart Technology Risk Management Mobility Rootkit Search Television USB Two Factor Authentication Politics Legal Training How to CrashOverride Public Computer Troubleshooting Keyboard Best Practice Vendor Management Big Data Data Management Electronic Medical Records Experience Mobile Device Charger