(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

TheDarkOverlord Solutions Is at It Again! This Time the Hacker Group Is Targeting Schools

TheDarkOverlord Solutions Is at It Again! This Time the Hacker Group Is Targeting Schools

While many youngsters enjoy it when their school shuts down, this was likely not the case in Flathead Valley, Montana, where the cybercriminal group ‘TheDarkOverlord Solutions’ targeted the entire Columbia Falls school district. This attack caused the three-day closure and otherwise disrupted over 30 schools, and the personal information of teachers, students, and school administrators was supposedly to be released if the group didn’t receive a ransom payment.

Furthermore, and more alarmingly, parents received reportedly graphic death threats against their children from the group. These threats alluded to an infamous, and still painfully recent, school shooting. This is the first time that TheDarkOverlord Solutions have gone to these lengths as far as is known.

The district server for Columbia Falls was ultimately targeted; records detailing the addresses, medical history, behavioral history, and other pieces of information valuable to cybercriminals were accessed that detailed the personal data of current and former students, their parents, and the school’s staff members. As a result, the 30 schools closed (as referenced above) and weekend events and activities were cancelled. With a heightened security presence, students returned to classes on Tuesday, September 19th.

TheDarkOverlord is no stranger to the news, or to targeting vulnerable individuals. In July of 2017, there was an online sale for a tantalizing data set that would allow cybercriminals to leverage information harvested from healthcare providers, just weeks after putting almost nine and a half million records for sale. These records came from a clinic, a healthcare provider, and a health insurance provider.

Somewhat less threateningly, the same group also took credit for releasing the fifth season of the Netflix hit series Orange is the New Black before its official release date, despite receiving about $50,000 worth of cryptocurrency in ransom from an audio post-production studio.

This piece of history shows why the Columbia Falls school district is right in their decision to not pay the ransom, as it in no way guarantees that the cybercriminal (or group) responsible will hold up their end of the bargain. Even if they do, it only proves that the victims are willing to pay, designating themselves as the perfect target for repeated attacks.

The key to your safety is to ensure your data is secure against the entire spectrum of threats. NTConnections can help you to do so. Call us at (703) 288-9767 to get started.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 18 February 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Privacy Best Practices Hackers Business Computing Productivity Microsoft Backup Malware Hosted Solutions Internet Mobile Devices Google Efficiency IT Support VoIP Business Managed Service Provider Email Miscellaneous IT Services Innovation Server Workplace Tips Disaster Recovery Business Continuity Data Windows Upgrade Network Software Hardware Business Management Network Security Save Money Saving Money Communication Computer Android Mobile Device Management Virtualization Smartphones communications Holiday User Tips Managed IT Services Microsoft Office Browser Smartphone Outsourced IT Windows 10 WiFi Data Backup Mobile Computing Computers Cybercrime Hacking Chrome BYOD Small Business Social Media Remote Monitoring Operating System IT Solutions Big Data Alert Application Apple Managed IT Services Proactive IT Avoiding Downtime Office Data Recovery Marketing Budget Collaboration The Internet of Things Ransomware Quick Tips Cloud Computing Social Engineering Automation Information Technology Employer-Employee Relationship Passwords Going Green Remote Computing Health Mobility VPN Bring Your Own Device Recovery spam Gadgets Telephone Systems BDR Wireless Technology User Error Two-factor Authentication Internet of Things How To Vendor Management Managed IT iPhone Save Time Firewall App Gmail Private Cloud Bandwidth Compliance Cybersecurity Mouse Networking Redundancy Office 365 Data Management Document Management Vulnerability Data Security Risk Management PowerPoint Website Excel Antivirus Phone System Money Office Tips Content Filtering IT Support Downtime History Tablet Lithium-ion battery Analytics Router Value Windows 10 Business Intelligence Retail Memory Search Artificial Intelligence People Work/Life Balance Safety Programming Government Network Congestion IT Plan Trending Meetings HaaS CES Apps IT Consultant Fax Server Unsupported Software Black Market Public Cloud Humor Phishing Statistics Saving Time Internet Exlporer Identity Theft HIPAA Data storage Online Currency Biometrics Credit Cards Outlook Printer eWaste Flexibility Hard Drives Law Enforcement Solid State Drive Current Events Facebook Administration Maintenance Entertainment Data Storage Running Cable DDoS Workers Word Physical Security Skype Unified Threat Management Robot Business Owner Mobile Office Environment Google Drive Intranet OneNote Customer Relationship Management Human Resources SaaS Best Available Training IT Management Servers Domains Wireless Charging IaaS Criminal Bloatware Internet exploMicrosoft Video Surveillance Cleaning Cameras Customer Service Root Cause Analysis Workforce Flash Consultant Fiber-Optic Entrepreneur Software as a Service Education Patch Management Advertising Tech Support Printer Server Data loss Telecommuting Cables Hacker Sync Content Management Worker Commute Cost Management Update Piracy Scam Software Tips Shadow IT Remote Work Charger Unified Communications Science Telephony User Wireless Company Culture Streaming Media Blockchain Instant Messaging Google Docs Licensing Hybrid Cloud Computer Care Samsung Windows 8.1 Update Shortcut Theft Twitter Windows 8 Start Menu SharePoint Encryption Staff Spam Blocking Voice over Internet Protocol Audit HBO Crowdfunding Sports Bluetooth Cortana Tablets Mobile Keyboard Monitor Notifications Multi-Factor Security Screen Mirroring Frequently Asked Questions YouTube Fraud USB Print Server Google Apps Professional Services Reputation Wearable Technology Windows Media Player Social Computer Fan Lifestyle Cast Tip of the week Applications NarrowBand Amazon Infrastructure Tools Customers Files Password Net Neutrality Best Practice Computer Repair Social Networking FENG Data Protection Hiring/Firing Productivity Windows Server 2008 Wi-Fi Chromecast WIndows 7 Amazon Web Services Password Manager Analyitcs Colocation Comparison Electronic Medical Records Windows 7 Laptop Managing Stress Settings Online Shopping Distributed Denial of Service Business Mangement Botnet Hosted Solution Computing Infrastructure LinkedIn Legal Touchscreen Virus Virtual Desktop Specifications Data Warehousing Regulations Touchpad IT service Evernote Recycling Virtual Reality Travel Debate Relocation End of Support Mobile Device Uninterrupted Power Supply Computer Accessories Millennials IBM Webinar Emergency Worker Supercomputer Content IT solutions Video Games Rootkit Knowledge Audiobook Netflix Scalability Politics Transportation How to webinar PDF Benefits Loyalty Conferencing Digital Signature Windows 10s Smart Technology Battery Experience Two Factor Authentication Assessment Music Users Television Troubleshooting Techology Public Computer Employer Employee Relationship Data Breach Automobile Emails Books CrashOverride