Out of the Box Solutions Blog

This Florida City Will Pay 65 Bitcoins to Get Files Back

This Florida City Will Pay 65 Bitcoins to Get Files Back

Florida’s Atlantic coast is a destination for millions of visitors each year. One visitor is costing a coastal city a pretty penny. Riviera Beach, a small city just north of West Palm Beach, has been hit with a major ransomware attack. Today, we’ll tell you how it came to be that the small beach city would make dubious history by paying what is the largest ransomware payout in the short history of these attacks.

Inundated with ransomware for the past three weeks after one city employee clicked on a malicious link, the Riviera Beach’s city council voted unanimously to pay the 65 Bitcoin price tag to get their systems and data unencrypted. This was after they had already voted to spend almost $1 million to buy all new hardware. The city council believed that after the situations that have played out in other municipalities--where millions of dollars were spent avoiding ransomware payments--that their best recourse to recover their data was to pay the hacker’s demands. 

The problems started almost immediately after a city employee fell for a phishing email. The city email system was unavailable, and its 911 dispatchers didn’t have access to computing systems that are necessary for prompt emergency response. This led to large sections of the city’s computing infrastructure becoming unavailable.

Previous instances where ransomware victimized municipal computing infrastructure, like SamSam attacks in Atlanta, GA; Newark, NJ; and Sarasota, FL, had been so devastating to the workings of their local governments that Riviera Beach’s council had plenty of information to make their decision by. The FBI, The Department of Homeland Security, and the U.S. Secret Service are all investigating the Riviera Beach attack, but for now, no answers are available.

Typically, it is advised that ransomware victims do not pay the ransom, since it provides the experience and resources to hackers to continue to conduct acts of cybercrime; and, because there is no guarantee that hackers will stay true to their word and decrypt the files once the ransom has been paid. 

Ransomware is a growing problem for municipalities and businesses, alike. For more information about ransomware, and the litany of threats facing your network each day, subscribe to our blog.  

All You Need to Know Before Buying a Computer, Par...
Cloud Resources Can Be Costly
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, July 20 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Network Security Productivity User Tips Privacy Communication Malware Data Microsoft Efficiency Tech Term Google Internet Hardware Smartphones Mobile Device Computer Innovation Ransomware Windows 10 IT Support Hackers Users Email Cybersecurity Android Mobile Devices Business Managed IT Services Business Management Network Passwords Small Business Browser Software Communications Cloud Applications Outsourced IT Collaboration Workplace Tips IT Services Wi-Fi Hosted Solutions Apps Backup Bandwidth Wireless Saving Money Holiday Social Media Data Backup Smartphone Cloud Computing Managed IT services Employer-Employee Relationship Information Data recovery Internet of Things VoIp Save Money Miscellaneous Microsoft Office Upgrade Laptop Business Intelligence Gmail Managed Service Networking Blockchain Marketing Gadgets Value Computers Company Culture Facebook Managed IT Service Tech Terms Remote Monitoring and Management Remote Computing Cost Management Patch Management Automation Voice over Internet Protocol Office Access Control Paperless Office Artificial Intelligence Office 365 Medical IT Virtual Assistant Password Cortana Analytics BDR Wireless Charging G Suite Chrome RAM Telephony Healthcare Virtualization Mobility Processor VPN Data Security Compliance Connectivity Data Management Net Neutrality Dongle Proactive IT Paper Settings Help Desk Operating System Touchscreen HP Cryptocurrency Taskbar Maintenance Outlook Movies HIPAA Personal Information Tablet Hard Disk Drive Technology Tips Security Cameras Business Technology Cables Human Resources Antivirus Conferencing Benchmarks Ink Business Continuity IT budget Microsoft Office 365 Managing Stress Document Management Windows 7 Telecommute National Security Router Profitability Physical Security Twitter Storage Hard Drive E-Commerce Excel Video Reporting Streaming Media Lead Generation Word Network Attached Storage Database Employee-Employer Relationship Staff Government PowerPoint Battery Telecommuting Environment Time Management Windows Websites Amazon Internet Explorer eCommerce Eliminating Downtime Tip of the week Inventory Dark Web Unified Communications Processors Payment Knowledge Customer Service Electronic Health Records Content Filtering Backup and Disaster Recovery Downloads Wearables Phishing Cybercrime Analysis Sports Certification e-waste Authentication Digital Data loss Comparison Updates Safety Threat Online Shopping BYOD User Tip Data Protection Error Vulnerability instant Messaging Machine Learning OneNote Troubleshooting Health Hard Drives SaaS Trends Data Breach Employees Tactics IT Management Workers disposal Authorization Bring Your Own Device Chrome OS Spam Specifications Plug-In Printing Wireless Internet Mobile Security Microsoft Teams Spyware Vulnerabilities Voice over IP Windows Server 2008 R2 Update Big Data SSD GDPR A.I. WannaCry Server Management Sales Solid State Drive Server Training Millennials Hybrid Cloud Edge Virus Display Regulation Disaster Recovery Risk Management Printers Alert Quick Tips