(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

TheDarkOverlord Solutions Is at It Again! This Time the Hacker Group Is Targeting Schools

TheDarkOverlord Solutions Is at It Again! This Time the Hacker Group Is Targeting Schools

While many youngsters enjoy it when their school shuts down, this was likely not the case in Flathead Valley, Montana, where the cybercriminal group ‘TheDarkOverlord Solutions’ targeted the entire Columbia Falls school district. This attack caused the three-day closure and otherwise disrupted over 30 schools, and the personal information of teachers, students, and school administrators was supposedly to be released if the group didn’t receive a ransom payment.

Furthermore, and more alarmingly, parents received reportedly graphic death threats against their children from the group. These threats alluded to an infamous, and still painfully recent, school shooting. This is the first time that TheDarkOverlord Solutions have gone to these lengths as far as is known.

The district server for Columbia Falls was ultimately targeted; records detailing the addresses, medical history, behavioral history, and other pieces of information valuable to cybercriminals were accessed that detailed the personal data of current and former students, their parents, and the school’s staff members. As a result, the 30 schools closed (as referenced above) and weekend events and activities were cancelled. With a heightened security presence, students returned to classes on Tuesday, September 19th.

TheDarkOverlord is no stranger to the news, or to targeting vulnerable individuals. In July of 2017, there was an online sale for a tantalizing data set that would allow cybercriminals to leverage information harvested from healthcare providers, just weeks after putting almost nine and a half million records for sale. These records came from a clinic, a healthcare provider, and a health insurance provider.

Somewhat less threateningly, the same group also took credit for releasing the fifth season of the Netflix hit series Orange is the New Black before its official release date, despite receiving about $50,000 worth of cryptocurrency in ransom from an audio post-production studio.

This piece of history shows why the Columbia Falls school district is right in their decision to not pay the ransom, as it in no way guarantees that the cybercriminal (or group) responsible will hold up their end of the bargain. Even if they do, it only proves that the victims are willing to pay, designating themselves as the perfect target for repeated attacks.

The key to your safety is to ensure your data is secure against the entire spectrum of threats. NTConnections can help you to do so. Call us at (703) 288-9767 to get started.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 25 May 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Privacy Best Practices Hackers Business Computing Microsoft Hosted Solutions Productivity Internet Malware Backup Google Mobile Devices Efficiency VoIP Business IT Support IT Services Email Network Security Miscellaneous Managed Service Provider Innovation Server Data Business Continuity Network Workplace Tips Disaster Recovery Software Windows Upgrade Business Management Saving Money Hardware Communication Computer Virtualization Managed IT Services Browser Smartphone Save Money Android Mobile Device Management communications Smartphones Data Backup User Tips Cybercrime Holiday Microsoft Office WiFi Computers Outsourced IT BYOD Windows 10 Social Media Remote Monitoring Cloud Computing Operating System Mobile Computing Ransomware Hacking Chrome Big Data Data Recovery Small Business Proactive IT Avoiding Downtime Internet of Things Managed IT Services Collaboration VPN IT Solutions Application Alert Apple Automation Information Technology Passwords Office Marketing Budget The Internet of Things Social Engineering Quick Tips BDR Employer-Employee Relationship Managed IT Bandwidth Going Green Mobility Remote Computing Health Bring Your Own Device Recovery Tech Term Cybersecurity Telephone Systems spam Gadgets Router Redundancy Compliance IT Support Two-factor Authentication Artificial Intelligence Data Protection Business Intelligence Wireless Technology User Error App Website Vendor Management Gmail Save Time iPhone Firewall Private Cloud How To Vulnerability Data Security Mouse Value Analytics Retail Memory Search Office 365 Law Enforcement Data Management Networking Productivity Windows 10 Apps Office Tips Document Management Risk Management PowerPoint Lithium-ion battery Excel Phone System Content Filtering Money Antivirus Downtime History Phishing Tablet Identity Theft Safety HIPAA Government Skype Unified Threat Management Credit Cards Cleaning Meetings Mobile Office Customer Relationship Management HaaS Fax Server Black Market Intranet Best Available Solid State Drive People Applications Programming Infrastructure Network Congestion Data Storage Streaming Media Trending Internet Exlporer Data storage Workers Word Comparison Encryption Biometrics Business Owner IT Consultant eWaste Humor OneNote Statistics Hard Drives IT Management Saving Time Mobile Device Facebook Work/Life Balance Smart Tech Outlook IT Plan Online Currency Physical Security DDoS CES Flexibility Data loss Unsupported Software Printer Robot Update Google Drive Public Cloud Environment Administration Human Resources Current Events SaaS Entertainment Training Running Cable Maintenance Computer Repair Domains Theft Start Menu Net Neutrality Spam Blocking Voice over Internet Protocol Audit IaaS PDF Bloatware Staff Customer Service Inventory Managing Stress Cache HBO Keyboard Cortana Mobile Virus Multi-Factor Security Screen Mirroring LinkedIn Entrepreneur Digital Signature Access Control Fraud Wireless Internet Frequently Asked Questions Tech Support Debate Hacker Google Apps Professional Services Touchscreen Computer Accessories Computer Fan Lifestyle Cast Cost Management Strategy Authentication Amazon Tip of the week Shadow IT Wireless Files Science Tools Cameras FENG Video Surveillance Password Instant Messaging Analysis Shortcut Nanotechnology Consultant Amazon Web Services Windows Server 2008 Wi-Fi Education SharePoint Colocation Windows 8 Password Manager Printer Server Electronic Medical Records Accountants Connectivity Bluetooth Online Shopping Windows 7 Sports Piracy Monitor Hosted Solution Computing Infrastructure Tablets Business Mangement Worker Commute Botnet Specifications Data Warehousing Notifications Legal Devices User USB Evernote Regulations YouTube Licensing Reputation Wearable Technology End of Support Recycling Travel IoT Millennials Samsung Social Wireless Charging Twitter Servers Company Culture NarrowBand Customers Windows 8.1 Update Internet exploMicrosoft Criminal Root Cause Analysis Workforce Thought Leadership Crowdfunding Best Practice Social Networking Fiber-Optic Flash Chromecast Software as a Service Patch Management Advertising Analyitcs Insurance Telecommuting Content Filter Laptop Settings Cables Sync Scam Distributed Denial of Service Content Management Windows Media Player Virtual Desktop Practices Remote Work Storage Charger Software Tips Print Server Touchpad IT service Unified Communications Telephony Google Docs Hiring/Firing Relocation Hybrid Cloud Virtual Reality Blockchain Hosted Computing WIndows 7 Addiction Computer Care Uninterrupted Power Supply Users webinar Benefits Loyalty Conferencing Windows 10s Smart Technology Battery Experience Two Factor Authentication Wire Assessment Music Television Troubleshooting Techology Public Computer Employer Employee Relationship Data Breach Automobile Books Emails CrashOverride IBM Emergency Webinar Worker Supercomputer Content IT solutions Rootkit Video Games Audiobook Knowledge Netflix Scalability Politics Transportation How to