Contact us today!
845-876-6561

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

TheDarkOverlord Solutions Is at It Again! This Time the Hacker Group Is Targeting Schools

TheDarkOverlord Solutions Is at It Again! This Time the Hacker Group Is Targeting Schools

While many youngsters enjoy it when their school shuts down, this was likely not the case in Flathead Valley, Montana, where the cybercriminal group ‘TheDarkOverlord Solutions’ targeted the entire Columbia Falls school district. This attack caused the three-day closure and otherwise disrupted over 30 schools, and the personal information of teachers, students, and school administrators was supposedly to be released if the group didn’t receive a ransom payment.

Furthermore, and more alarmingly, parents received reportedly graphic death threats against their children from the group. These threats alluded to an infamous, and still painfully recent, school shooting. This is the first time that TheDarkOverlord Solutions have gone to these lengths as far as is known.

The district server for Columbia Falls was ultimately targeted; records detailing the addresses, medical history, behavioral history, and other pieces of information valuable to cybercriminals were accessed that detailed the personal data of current and former students, their parents, and the school’s staff members. As a result, the 30 schools closed (as referenced above) and weekend events and activities were cancelled. With a heightened security presence, students returned to classes on Tuesday, September 19th.

TheDarkOverlord is no stranger to the news, or to targeting vulnerable individuals. In July of 2017, there was an online sale for a tantalizing data set that would allow cybercriminals to leverage information harvested from healthcare providers, just weeks after putting almost nine and a half million records for sale. These records came from a clinic, a healthcare provider, and a health insurance provider.

Somewhat less threateningly, the same group also took credit for releasing the fifth season of the Netflix hit series Orange is the New Black before its official release date, despite receiving about $50,000 worth of cryptocurrency in ransom from an audio post-production studio.

This piece of history shows why the Columbia Falls school district is right in their decision to not pay the ransom, as it in no way guarantees that the cybercriminal (or group) responsible will hold up their end of the bargain. Even if they do, it only proves that the victims are willing to pay, designating themselves as the perfect target for repeated attacks.

The key to your safety is to ensure your data is secure against the entire spectrum of threats. Professional Computer Associates can help you to do so. Call us at 845-876-6561 to get started.

3 Phishing Scams You Might Have Missed in 2017
Tip of the Week: Closed A Tab On Accident? Here’s ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, July 21 2018

Captcha Image

QR-Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Network Security Hackers Business Computing Backup Hosted Solutions Malware Managed IT Services Google VoIP Mobile Devices Disaster Recovery Microsoft Software Productivity Business Internet Business Continuity Email Outsourced IT Data Innovation Data Backup Cybercrime Efficiency communications Computer IT Support Smartphones Windows 10 Ransomware IT Services Hardware Browser Android Data Recovery Cloud Computing BDR Office Internet of Things Business Management Tech Term Telephone Systems Alert Windows Computers Server Saving Money Upgrade Virtualization Network User Tips Mobile Device Management Cybersecurity Small Business Smartphone Chrome Workplace Tips Save Money Law Enforcement Managed IT Microsoft Office Quick Tips BYOD Collaboration Social Engineering Managed Service Provider Miscellaneous Passwords Productivity App Money Firewall Communication Bandwidth How To Artificial Intelligence Recovery Password Facebook Private Cloud Holiday Hacking Mobility Office 365 Work/Life Balance Router Social Media Avoiding Downtime Office Tips Applications Two-factor Authentication Proactive IT Remote Monitoring Data Protection VPN HaaS Automation Phishing Budget Data Security Health Information Technology Redundancy Operating System Flexibility Gmail Wi-Fi Data Management Bring Your Own Device Business Intelligence Entertainment Google Drive Mobile Device Connectivity Cleaning Windows 10 Data Breach Word SaaS Big Data Risk Management Blockchain Employer-Employee Relationship Spam Safety Value Document Management Vulnerability Managed IT Services Gadgets Apps Black Market Marketing User Error Compliance Identity Theft Education Encryption Credit Cards Downtime Paperless Office Windows 7 Content Filtering History IT Management Wearable Technology Charger OneNote Networking Electronic Medical Records IT Plan Best Practice CES Data storage Solid State Drive Shadow IT Government Smart Tech Hiring/Firing End of Support Unsupported Software Internet Exlporer Content Management Computer Care HIPAA Servers YouTube Comparison DDoS Samsung The Internet of Things Patch Management Business Owner Sports Spam Blocking Keyboard Data loss Scam Meetings Public Cloud Remote Computing Wireless Update Wireless Technology Apple IT Support Save Time Access Control eWaste Worker PDF Automobile Infrastructure USB Settings Computing Infrastructure Website Data Storage Workers Mobile Computing Analysis Streaming Media Physical Security Legal Battery Training Professional Services Accountants FENG Public Computer SharePoint Hosted Solution NIST Two Factor Authentication Multi-Factor Security Data Warehousing Network Congestion Emails Vendor Management Audiobook Recycling Cryptocurrency Tools People Trending Going Green Devices Notifications Wireless Charging Criminal Fax Server Politics Fraud Robot Hard Drives Students Regulations Tech Support Video Games Safe Mode IoT Relocation Mobile Office Users Lifestyle Laptop Thought Leadership Fiber-Optic IT Consultant Unified Threat Management IT solutions Amazon Healthcare Scalability File Sharing Botnet IaaS IBM Books Virtual Reality Touchpad Content Filter Cables Leadership Netflix Amazon Web Services Outlook Electronic Health Records Instant Messaging Business Technology Travel Insurance Root Cause Analysis Supercomputer Emergency Employer Employee Relationship Internet exploMicrosoft Worker Commute Storage Software Tips Unified Communications Antivirus Online Shopping Humor Machine Learning Flash iPhone Search Virtual Assistant Practices Current Events Computer Accessories Advertising Specifications Theft webinar Sync Human Resources Distributed Denial of Service WiFi Evernote Monitor How to Telephone System Software as a Service NarrowBand Hosted Computing Conferencing Bluetooth Millennials Addiction HBO Cortana Telephony Staff Windows 10s Loyalty Experience Reputation Techology Files Inventory Screen Mirroring Transportation Hybrid Cloud Workforce Cache Frequently Asked Questions Google Apps Skype Digital Signature Mouse Music Customer HVAC Colocation Google Docs Chromecast Cast Benefits Telecommuting Wireless Internet Excel Start Menu Strategy Audit Assessment Enterprise Content Management Authentication Lithium-ion battery Environment Smart Technology Running Cable Rootkit Remote Work Wire Tip of the week Uninterrupted Power Supply Password Manager Mobile Computer Fan Television Troubleshooting Password Management hacker Voice over Internet Protocol Nanotechnology Knowledge Content Smart Office Windows Server 2008 Business Mangement Administration Webinar IT solutions CrashOverride Twitter Company Culture Thank You Managing Stress Congratulations

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!