Contact us today!

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

TheDarkOverlord Solutions Is at It Again! This Time the Hacker Group Is Targeting Schools

TheDarkOverlord Solutions Is at It Again! This Time the Hacker Group Is Targeting Schools

While many youngsters enjoy it when their school shuts down, this was likely not the case in Flathead Valley, Montana, where the cybercriminal group ‘TheDarkOverlord Solutions’ targeted the entire Columbia Falls school district. This attack caused the three-day closure and otherwise disrupted over 30 schools, and the personal information of teachers, students, and school administrators was supposedly to be released if the group didn’t receive a ransom payment.

Furthermore, and more alarmingly, parents received reportedly graphic death threats against their children from the group. These threats alluded to an infamous, and still painfully recent, school shooting. This is the first time that TheDarkOverlord Solutions have gone to these lengths as far as is known.

The district server for Columbia Falls was ultimately targeted; records detailing the addresses, medical history, behavioral history, and other pieces of information valuable to cybercriminals were accessed that detailed the personal data of current and former students, their parents, and the school’s staff members. As a result, the 30 schools closed (as referenced above) and weekend events and activities were cancelled. With a heightened security presence, students returned to classes on Tuesday, September 19th.

TheDarkOverlord is no stranger to the news, or to targeting vulnerable individuals. In July of 2017, there was an online sale for a tantalizing data set that would allow cybercriminals to leverage information harvested from healthcare providers, just weeks after putting almost nine and a half million records for sale. These records came from a clinic, a healthcare provider, and a health insurance provider.

Somewhat less threateningly, the same group also took credit for releasing the fifth season of the Netflix hit series Orange is the New Black before its official release date, despite receiving about $50,000 worth of cryptocurrency in ransom from an audio post-production studio.

This piece of history shows why the Columbia Falls school district is right in their decision to not pay the ransom, as it in no way guarantees that the cybercriminal (or group) responsible will hold up their end of the bargain. Even if they do, it only proves that the victims are willing to pay, designating themselves as the perfect target for repeated attacks.

The key to your safety is to ensure your data is secure against the entire spectrum of threats. Professional Computer Associates can help you to do so. Call us at 845-876-6561 to get started.

3 Phishing Scams You Might Have Missed in 2017
Tip of the Week: Closed A Tab On Accident? Here’s ...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, 19 April 2018

Captcha Image


Tag Cloud

Security Tip of the Week Best Practices Privacy Cloud Technology Hackers Network Security Business Computing Backup Hosted Solutions Managed IT Services Malware Google Disaster Recovery Software VoIP Microsoft Business Business Continuity Mobile Devices Email Internet Productivity Outsourced IT Data Innovation IT Support Smartphones Cybercrime Efficiency Ransomware Windows 10 communications Browser Computer Hardware Android Data Backup Cloud Computing IT Services Office Telephone Systems Alert Computers Server Smartphone Virtualization User Tips Mobile Device Management Windows Small Business Business Management Data Recovery Saving Money Cybersecurity Chrome Upgrade Network BDR Quick Tips BYOD Social Engineering Internet of Things Social Media Miscellaneous Mobility Workplace Tips Passwords Work/Life Balance App Save Money Firewall Avoiding Downtime Law Enforcement Recovery Productivity Private Cloud Hacking Microsoft Office Holiday Collaboration Office Tips How To Managed IT Data Security Flexibility Wi-Fi Proactive IT Money HaaS VPN Business Intelligence Bandwidth Information Technology Health Redundancy Remote Monitoring Facebook Two-factor Authentication Operating System Budget Communication Data Management Data Protection Gmail Password Bring Your Own Device Phishing Office 365 Managed Service Provider User Error Marketing Cleaning SaaS Apps Router Vulnerability Compliance Managed IT Services Automation Data Breach Risk Management Safety Identity Theft Tech Term Big Data Employer-Employee Relationship Windows 10 Gadgets Artificial Intelligence Black Market Value Google Drive Spam Downtime Save Time Spam Blocking Data loss Entertainment History Encryption Worker Automobile Update Best Practice Wearable Technology Data storage Shadow IT Government Legal Battery End of Support Training Internet Exlporer Mobile Device Data Storage Workers Content Filtering The Internet of Things Applications Charger DDoS Electronic Medical Records Public Cloud Credit Cards Remote Computing Solid State Drive Wireless Technology Hiring/Firing IT Management CES Computer Care HIPAA Meetings Word OneNote Wireless Apple IT Plan PDF Samsung Computing Infrastructure Patch Management eWaste Business Owner Unsupported Software Physical Security Keyboard Mobile Computing Scam Document Management Comparison Settings Specifications Staff webinar Inventory Music Evernote Sync SharePoint Going Green Software as a Service Google Apps Benefits Robot Millennials Tech Support HBO Digital Signature Conferencing Windows 10s Assessment Relocation USB Telephony Laptop Screen Mirroring Infrastructure Smart Technology Notifications Rootkit Workforce People Frequently Asked Questions Strategy IT Support IaaS Television Troubleshooting Fax Server Skype Touchpad Google Docs Cast Password Manager Outlook Content Telecommuting Mobile Office Excel Analysis Audit Public Computer Hosted Solution IT solutions YouTube Start Menu Education Website Business Mangement Internet exploMicrosoft Two Factor Authentication Vendor Management Humor Audiobook Remote Work Tip of the week Accountants Mobile Computer Fan iPhone Voice over Internet Protocol Recycling Knowledge Advertising Antivirus Monitor Politics Sports Hard Drives Windows Server 2008 Professional Services FENG Wireless Charging Networking NarrowBand Video Games Users Multi-Factor Security Data Warehousing Criminal Network Congestion Emails Unified Threat Management Reputation Windows 7 IoT Scalability Tools Fiber-Optic IBM Distributed Denial of Service Files Books WiFi Virtual Reality Trending Hybrid Cloud Customer Fraud Regulations Smart Tech Instant Messaging Cables Supercomputer Colocation Emergency Chromecast Employer Employee Relationship Worker Commute Lifestyle Content Management IT Consultant Amazon Insurance Search Botnet Unified Communications Current Events Mouse Computer Accessories Uninterrupted Power Supply Blockchain Leadership Netflix Amazon Web Services Servers Practices How to Travel Root Cause Analysis Theft hacker Lithium-ion battery Bluetooth Environment Software Tips Human Resources Loyalty Running Cable Experience Online Shopping Techology Flash Hosted Computing Cortana Streaming Media Transportation Access Control Authentication Webinar Thank You IT solutions Congratulations CrashOverride Administration

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!