Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Ransomware Cyberattack Struck Atlanta, Georgia

A Ransomware Cyberattack Struck Atlanta, Georgia

Ransomware doesn’t discriminate with its targets, as the city of Atlanta, Georgia now knows so painfully well. The city became the target of a ransomware attack that crippled many of its critical system workflows. The municipal government suffered from one of the most advanced and sustained attacks in recent memory.

The culprits behind the attack, the hacker group SamSam, are known for meticulously selecting targets that they are fairly confident will pay up when faced with a ransomware attack. Even the mayor of Atlanta was intimidated enough by the attack as to compare it to a kidnapping or hostage situation. Access to important data, files, and applications hung in the balance, and the downtime caused by this incident led to considerable trouble for countless government officials and citizens. Technology has become such an integral part of running governments and businesses that even the slightest issue could have echoing repercussions, so you can imagine the shock and horror in the wake of this ransomware attack.

Even more horrific is the ransom demanded by the hackers that exceeded $51,000 in Bitcoin. Ransomware is known for locking down files and waiting for a payment from the victims before unlocking them. This particular strain of ransomware replaces the names of all affected files with the phrase “I’m sorry” and demands that the ransom be paid in a week.

By working with the technicians at Dell SecureWorks, Atlanta is back on its feet, but not without suffering considerably from the ransomware attack. It’s not clear if Atlanta will pay up for the release of its data, and confidentiality agreements mean that Dell SecureWorks will not reveal any information about their relationship to the attack. But one thing is painfully clear in the wake of such destruction: trying to pay the problem away can be just the beginning of ransomware issues.

For example, if you pay a ransomware developer for the safe return of your files, you might be funding further attacks on other victims. This is counter-productive to the security-minded culture of the business environment. Instead, it’s better to take preventative measures such as implementing data backup and disaster recovery, as well as identifying threats before they have a chance to become a problem. If you are ever struck by a ransomware attack, it’s better to reach out to an IT provider before committing to any payments to hackers. It’s better to try just about any alternative before investing in something that isn’t even a guaranteed fix.

To improve network security and enable preventative solutions, reach out to Voyage Technology. Our trained and trusted technicians will work toward ensuring your network is airtight. To learn more, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 01 February 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Email Google Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Small Business Mobile Device Productivity Microsoft Backup Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone AI Android Disaster Recovery Data Recovery Upgrade Business Management VoIP Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Artificial Intelligence Automation Facebook Miscellaneous Information Holiday Gadgets Covid-19 Cloud Computing Training Compliance Remote Work Server Managed Service Provider Outsourced IT IT Support Spam Encryption Employee/Employer Relationship Windows 10 Office Data Management Business Continuity Government Bandwidth Business Technology Virtualization Blockchain Wi-Fi Windows 10 Apps Vendor Data Security Mobile Office Two-factor Authentication Chrome Gmail Budget Tip of the week WiFi Apple Employer-Employee Relationship App Networking BYOD Mobile Device Management Managed Services Voice over Internet Protocol Access Control HIPAA How To Applications BDR Hacker Computing Avoiding Downtime Information Technology Marketing Conferencing Office 365 Augmented Reality Health Storage Password 2FA Big Data Bring Your Own Device Retail Router Managed IT Services Operating System Computers Risk Management Help Desk Website Virtual Private Network Analytics Office Tips Healthcare Paperless Office Infrastructure The Internet of Things Windows 11 Cooperation Free Resource Project Management Windows 7 Document Management Social Microsoft 365 Excel Scam Solutions Data loss Going Green Customer Service Cybercrime Patch Management Save Money Remote Monitoring Monitoring Vulnerability End of Support Vendor Management Physical Security Display Remote Workers Firewall Printer Telephone iPhone Money Humor Licensing Safety Vulnerabilities Entertainment Machine Learning Sports Images 101 Mouse Supply Chain Multi-Factor Authentication Mobility Telephone System Administration Cost Management Maintenance Antivirus Customer Relationship Management Employees Integration Settings Wireless User Tip Hacking Modem Printing Mobile Security Content Filtering Processor Presentation Holidays YouTube Data Privacy Robot Wireless Technology Data Storage Cryptocurrency Smart Technology Video Conferencing IT Management Managed Services Provider Virtual Machines Virtual Desktop VPN Professional Services Meetings Saving Time Data storage Word LiFi Managed IT Service Computer Repair Outlook Downloads Entrepreneur Break Fix IT Amazon Browsers Monitors Connectivity Smartwatch Upload Procurement Azure Tech Websites Outsource IT Social Network Telework Hacks Multi-Factor Security Cyber security Scary Stories Dark Web Communitications Fun Environment Undo Media IoT CES Electronic Medical Records Trends Supply Chain Management Deep Learning SharePoint Term Small Businesses Customer Resource management Regulations FinTech Google Calendar Microsoft Excel IT Assessment Education Lenovo Displays Data Analysis Writing Star Wars Virtual Reality Gamification Staff Flexibility Value Server Management Private Cloud Outsourcing Application Social Networking Organization Mobile Computing Legislation Digital Security Cameras Smart Devices Superfish Search Identity Theft Fileless Malware IBM Twitter Workplace Content Wearable Technology Remote Working Best Practice Memory Data Breach Buisness Google Play Error Hiring/Firing Health IT Motherboard Comparison Assessment Videos Legal Permissions Electronic Health Records IT solutions Directions Social Engineering Paperless Remote Computing Co-managed IT Business Growth Wasting Time Specifications Trend Micro Security Cameras Technology Care Internet Exlporer Fraud Software as a Service Cortana Tablet Microchip Competition Business Communications Alert Scams Username Alt Codes Managing Costs Black Friday eCommerce Downtime Managed IT SSID File Sharing Hybrid Work Dark Data How To Human Resources Database Surveillance Hosted Solution Virtual Assistant Notifications Cables User IT Technicians Typing Virtual Machine Cyber Monday Medical IT Travel Proxy Server Cookies Reviews Google Apps Tactics Google Drive Hotspot Development Techology Transportation Knowledge Google Maps IP Address IT Maintenance Mirgation Hypervisor Optimization PowerPoint 5G Unified Threat Management Business Intelligence Nanotechnology Shopping Shortcuts Addiction Google Docs Language Unified Communications Unified Threat Management Employer/Employee Relationships Experience Navigation Ransmoware Management Recovery Chatbots PCI DSS Bitcoin Running Cable Distributed Denial of Service Vendors Hard Drives Network Congestion Screen Reader Gig Economy Google Wallet Domains Be Proactive Service Level Agreement Computing Infrastructure Internet Service Provider User Error Teamwork Evernote Workforce Identity Regulations Compliance Windows 8 Laptop Memes Point of Sale Threats Bookmark Refrigeration Smart Tech Drones Public Speaking Workplace Strategies Download Alerts Net Neutrality SQL Server Network Management Lithium-ion battery Tech Support Meta Financial Data History Halloween

Blog Archive