Contact us today!

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

TheDarkOverlord Solutions Is at It Again! This Time the Hacker Group Is Targeting Schools

TheDarkOverlord Solutions Is at It Again! This Time the Hacker Group Is Targeting Schools

While many youngsters enjoy it when their school shuts down, this was likely not the case in Flathead Valley, Montana, where the cybercriminal group ‘TheDarkOverlord Solutions’ targeted the entire Columbia Falls school district. This attack caused the three-day closure and otherwise disrupted over 30 schools, and the personal information of teachers, students, and school administrators was supposedly to be released if the group didn’t receive a ransom payment.

Furthermore, and more alarmingly, parents received reportedly graphic death threats against their children from the group. These threats alluded to an infamous, and still painfully recent, school shooting. This is the first time that TheDarkOverlord Solutions have gone to these lengths as far as is known.

The district server for Columbia Falls was ultimately targeted; records detailing the addresses, medical history, behavioral history, and other pieces of information valuable to cybercriminals were accessed that detailed the personal data of current and former students, their parents, and the school’s staff members. As a result, the 30 schools closed (as referenced above) and weekend events and activities were cancelled. With a heightened security presence, students returned to classes on Tuesday, September 19th.

TheDarkOverlord is no stranger to the news, or to targeting vulnerable individuals. In July of 2017, there was an online sale for a tantalizing data set that would allow cybercriminals to leverage information harvested from healthcare providers, just weeks after putting almost nine and a half million records for sale. These records came from a clinic, a healthcare provider, and a health insurance provider.

Somewhat less threateningly, the same group also took credit for releasing the fifth season of the Netflix hit series Orange is the New Black before its official release date, despite receiving about $50,000 worth of cryptocurrency in ransom from an audio post-production studio.

This piece of history shows why the Columbia Falls school district is right in their decision to not pay the ransom, as it in no way guarantees that the cybercriminal (or group) responsible will hold up their end of the bargain. Even if they do, it only proves that the victims are willing to pay, designating themselves as the perfect target for repeated attacks.

The key to your safety is to ensure your data is secure against the entire spectrum of threats. Professional Computer Associates can help you to do so. Call us at 845-876-6561 to get started.

3 Phishing Scams You Might Have Missed in 2017
Tip of the Week: Closed A Tab On Accident? Here’s ...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 21 January 2018

Captcha Image


Tag Cloud

Security Tip of the Week Best Practices Cloud Privacy Hackers Technology Backup Business Computing Network Security Hosted Solutions Managed IT Services Malware Disaster Recovery VoIP Google Microsoft Business Continuity Business Software Mobile Devices Productivity Outsourced IT Email Smartphones Windows 10 Data Internet Innovation Efficiency IT Support communications Computer Hardware Android Cybercrime Ransomware Office Telephone Systems Server Data Backup Alert IT Services Browser Windows Computers Small Business Saving Money Business Management Upgrade User Tips Quick Tips Mobile Device Management Social Engineering Chrome Cybersecurity Law Enforcement Cloud Computing How To Data Recovery Network Mobility Recovery Work/Life Balance BDR Avoiding Downtime BYOD Microsoft Office Hacking Collaboration Holiday Office Tips Smartphone Social Media Miscellaneous Passwords Workplace Tips Save Money App Virtualization Firewall Managed IT HaaS Flexibility Wi-Fi Bandwidth Health Information Technology Private Cloud Facebook Operating System Productivity Bring Your Own Device Office 365 Managed Service Provider Budget Two-factor Authentication Proactive IT Money Password Communication Automation Phishing Risk Management Spam Safety Employer-Employee Relationship Router Redundancy Compliance Gadgets Data Breach Managed IT Services Data Management Gmail Black Market Remote Monitoring Internet of Things Google Drive User Error Marketing Windows 10 Artificial Intelligence SaaS Value Save Time VPN Worker Automobile The Internet of Things Data Security Apps Spam Blocking DDoS Public Cloud Battery Remote Computing Wireless Technology Mobile Device Meetings Vulnerability Wireless Apple Content Filtering Applications Charger Computing Infrastructure Data Storage Workers Physical Security Mobile Computing Business Intelligence Solid State Drive Identity Theft Settings Hiring/Firing Computer Care Cleaning Credit Cards Downtime Entertainment Samsung History IT Management Patch Management Word Business Owner OneNote Keyboard Best Practice Shadow IT Wearable Technology Scam Data storage Government End of Support Unsupported Software Internet Exlporer Travel IT solutions Root Cause Analysis YouTube Wireless Charging Comparison Internet exploMicrosoft Music Software Tips Online Shopping Benefits Flash Humor iPhone Fiber-Optic Assessment Specifications Advertising USB webinar Sports Evernote Antivirus Smart Technology Sync Monitor Rootkit Software as a Service Data loss NarrowBand Cables Television Millennials Troubleshooting HBO Legal Conferencing Reputation Windows 10s Telephony Distributed Denial of Service Training Update WiFi Files Content Screen Mirroring Unified Communications Public Computer Workforce Hybrid Cloud Hosted Solution Frequently Asked Questions IT Support Customer Education Two Factor Authentication Skype Vendor Management Google Docs Colocation Audiobook Cast Chromecast Theft Telecommuting PDF Excel Start Menu Audit Cortana Mouse Website Politics Hard Drives Uninterrupted Power Supply Networking Remote Work eWaste Big Data Tip of the week Video Games Mobile Users Computer Fan Electronic Medical Records Google Apps Unified Threat Management Voice over Internet Protocol hacker Knowledge Lithium-ion battery IBM Environment Books Windows Server 2008 Scalability Professional Services Virtual Reality FENG Running Cable Infrastructure Streaming Media Multi-Factor Security HIPAA Data Warehousing Network Congestion Emails Supercomputer Emergency Windows 7 Instant Messaging Tools Worker Commute Employer Employee Relationship Password Manager Trending SharePoint Going Green Tech Support Encryption Current Events Fraud Regulations Robot Search Relocation Computer Accessories Lifestyle IT Plan Laptop IT Consultant Notifications Amazon People How to Botnet Fax Server Document Management IaaS Bluetooth Loyalty Data Protection Experience Touchpad Techology Leadership Netflix Amazon Web Services Transportation Servers Mobile Office Outlook Thank You Congratulations Administration Webinar Business Mangement IT solutions CrashOverride Recycling

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!