The leaders of Riviera Beach, Fla., looking weary, met quietly this week for an unusual vote to pay nearly $600,000 in ransom to hackers who paralyzed the city’s computer systems.
Riviera Beach, a small city of about 35,000 people just north of West Palm Beach, became the latest government to be crippled by ransomware attacks that have successfully extorted municipalities and forced them to dig into public coffers to restore their networks. A similar breach recently cost Baltimore $18 million to repair damages.
Here’s what happened
- The hackers apparently got into the city’s system when an employee clicked on an email link that allowed them to upload malware.
- The Hackers have taken hold of a computer system used by the city council of Riviera Beach in Florida
- The hackers encrypted the city records and disabled the council’s e-mail system
- 911 dispatchers are unable to enter calls into their computers and residents are unable to pay their utility bills online
- Riviera Beach has now agreed to pay a $600,000 ransom, with no guarantees the hackers will hand back control of the computer system.
Help protect your company now, to fight against cyber-attacks, by partnering with Canfield CyberDefense Group.
CCG is providing a State-of.-the-Art Innovation, all in one software product solution called “CheckMate” together with Phen.AI. one of the world’s most comprehensive developed intelligence platform to solve Cybersecurity issues and more.
open- and closed-source applications are leveraged for penetration testing to ensure non-vulnerability of systems running on the network. While using the White Hat methods. Test attacks are delivered both internally and externally to the running device. The software will identify what penetration tests are needed and aid the set up and running of these required tests.
Monitors and reports on all software applications and all devices. The sudden transfer of any form of data (binary, HTML, etc.) from your system to a remote host/network, whether it be in your own network or a remote network, including overseas network activity.
It’s able to identify and track the type of traffic being sent from and delivered to a device. It is also capable of tracing and pinpointing new communications originating from or delivered to a given device.
Like other SIEM, the SMART LogAnalyzer (SLA), processes and indexes logs looking for indicators of compromise providing insight and tracking/recording the activities within the network, then providing that information and analysis to Phen in order for him to determine how much of a threat something it is to the IT environment.
Click here to learn more about our products.