Blog
home
  • Register

Data Net Blog

By accepting you will be accessing a service provided by a third-party external to https://www.4datanet.com/

This Florida City Will Pay 65 Bitcoins to Get Files Back

This Florida City Will Pay 65 Bitcoins to Get Files Back

Florida’s Atlantic coast is a destination for millions of visitors each year. One visitor is costing a coastal city a pretty penny. Riviera Beach, a small city just north of West Palm Beach, has been hit with a major ransomware attack. Today, we’ll tell you how it came to be that the small beach city would make dubious history by paying what is the largest ransomware payout in the short history of these attacks.

Inundated with ransomware for the past three weeks after one city employee clicked on a malicious link, the Riviera Beach’s city council voted unanimously to pay the 65 Bitcoin price tag to get their systems and data unencrypted. This was after they had already voted to spend almost $1 million to buy all new hardware. The city council believed that after the situations that have played out in other municipalities--where millions of dollars were spent avoiding ransomware payments--that their best recourse to recover their data was to pay the hacker’s demands. 

The problems started almost immediately after a city employee fell for a phishing email. The city email system was unavailable, and its 911 dispatchers didn’t have access to computing systems that are necessary for prompt emergency response. This led to large sections of the city’s computing infrastructure becoming unavailable.

Previous instances where ransomware victimized municipal computing infrastructure, like SamSam attacks in Atlanta, GA; Newark, NJ; and Sarasota, FL, had been so devastating to the workings of their local governments that Riviera Beach’s council had plenty of information to make their decision by. The FBI, The Department of Homeland Security, and the U.S. Secret Service are all investigating the Riviera Beach attack, but for now, no answers are available.

Typically, it is advised that ransomware victims do not pay the ransom, since it provides the experience and resources to hackers to continue to conduct acts of cybercrime; and, because there is no guarantee that hackers will stay true to their word and decrypt the files once the ransom has been paid. 

Ransomware is a growing problem for municipalities and businesses, alike. For more information about ransomware, and the litany of threats facing your network each day, subscribe to our blog.  

All You Need to Know Before Buying a Computer, Par...
Cloud Resources Can Be Costly
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, May 31, 2020

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Productivity Business Computing Network Security Data Efficiency Privacy Malware Innovation Smartphones Communication Hackers IT Support User Tips Small Business Google Cloud Hardware Email Computer Microsoft VoIp Software Communications Tech Term Managed IT Services Users Workplace Tips Mobile Device Business Management Internet Cybersecurity Android Windows 10 Collaboration Ransomware Mobile Devices Business Outsourced IT Miscellaneous Cloud Computing Hosted Solutions Backup IT Services Passwords Social Media Upgrade Apps Wi-Fi Network Saving Money Data recovery Information Phishing Browser Data Backup Managed Service Gadgets Smartphone Applications Facebook Networking Internet of Things Microsoft Office Holiday Windows Bandwidth Managed IT services VPN BDR Blockchain Patch Management Employer-Employee Relationship Gmail Marketing Access Control Wireless Chrome Word Managed IT Service Compliance Value Going Green Business Intelligence Mobile Office Automation Quick Tips Apple Save Money Laptop Router Voice over Internet Protocol Paperless Office Remote Monitoring Office Education Virtual Assistant Virtualization Healthcare Net Neutrality Data Management How To Processor Virus Retail Office 365 G Suite Data Protection Telephone System Server Data Security Tech Terms Cost Management Physical Security Settings Mobility Computers Telephony Bring Your Own Device RAM Remote Monitoring and Management Batteries Employee-Employer Relationship Excel Windows 7 Business Technology Medical IT Artificial Intelligence Scam Data Breach Password Cortana Business Continuity Connectivity Company Culture Disaster Recovery Conferencing Payment Cards Government Remote Computing Health Social Network Wireless Charging iPhone Chrome OS File Management IT Management Mobile Security eCommerce Website Eliminating Downtime Updates Staff Shadow IT WhatsApp Processors GDPR Threats Hard Drives Managing Stress OneNote Memes Ink instant Messaging Remote Law Enforcement Telecommuting News Microsoft Office 365 Employees Distribution Server Management Virtual Private Network Maintenance Licensing Plug-In Analytics Current Events Operating System Sales Online Shopping BYOD Certification Digital Websites Computer Repair User Tip Streaming Media Spyware Storage Vulnerabilities Scams SSD Troubleshooting Windows Server 2008 R2 Telecommute IT Content Filtering PowerPoint Live Streaming Remote Workers Unified Communications Authentication Solid State Drive Fleet Management Customer Relationship Management Internet Explorer Tech Support Proactive IT Recycling Dark Web Human Resources Tablet Wireless Internet Display Safety IT Service Downloads Cryptocurrency Project Management User Security Remote Support Update Taskbar Data loss Hosted Desktop Sports WannaCry Reporting Technology Tips Covid-19 Workers Cleaning Authorization Hard Disk Drive Multi-Factor Authentication Database Managed Service Provider Comparison Threat Alert Vulnerability Personal Information Big Data Tip of the week Trends Error Managed Services Provider Network Attached Storage Environment Amazon Training Benchmarks Edge Mobile Search IT budget Twitter Voice over IP Hybrid Cloud Outlook Help Desk National Security HP Spam Firewall HIPAA File Sharing Millennials Microsoft Teams Video Mobile Device Management Cybercrime Co-Managed IT Specifications Printing E-Commerce Bitcoin A.I. Electronic Health Records Vendor e-waste Knowledge Battery Security Cameras Risk Management Dongle Recovery Time Management Insurance Inventory Cables Profitability Document Management Antivirus Profiles Congratulations Hard Drive SaaS Backup and Disaster Recovery Botnet Customer Service Holidays Machine Learning Tactics Humor Paper Travel Lead Generation Payment Movies Touchscreen disposal Wearables Virtual Reality Printers Regulation WiFi Thank You Analysis Financial

Latest News & Events

Please join us in congratulating Bill Vann on his promotion to Customer Success Manager....

Contact Us

Learn more about what Data Net can do for your business.

Call Us Today
Call us today
(760) 466-1200

5795 Kearny Villa Road
San Diego, California 92123