Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

30 Schools Shut Down In Montana After Cyber Attack

30 Schools Shut Down In Montana After Cyber Attack

Students generally love it when classes are cancelled for whatever reason, but thanks to a cybercriminal group called TheDarkOverlord Solutions, a school in Flathead Valley, Montana was disrupted for an extended period of time. This downtime resulted in a disruption of operations for over 30 schools, as well as the threat to the personal information of countless teachers, students, and administrators due to a ransomware attack.

TheDarkOverlord Solutions also went as far as to make graphic death threats against the children attending the schools, taking advantage of the memory of recent school shootings. This hack resulted from the Columbia Falls district server being targeted, which contained all sorts of personal data belonging to residents of the school district. This includes addresses, medical histories, behavioral history, and other information that’s helpful to cybercriminals. Thanks to these events, 30 schools closed and canceled any weekend activities. When class resumed, there was much more security than before.

TheDarkOverlord Solutions, true to its name, targets individuals that have particularly lucrative data on the line. In July 2017, they were responsible for a major information harvest from healthcare providers which resulted in almost 9.5 million records going up for sale on the black market. These records were reportedly stolen from a clinic, a healthcare provider, and a health insurance provider.

This same group also reached out and made their name known by stealing media from Netflix. The popular series Orange is the New Black was released prior to its actual release date, thumbing the nose of the audio post-production studio that provided a ransom of $50,000. It just goes to show that you can never trust a thief!

Therefore, all signs point toward the Columbia Falls school district to not pay the ransom demanded of them. They made the correct choice by not giving in to the demands of hackers, as there is no reasonable expectation that they will actually hand over their data. If they do decide to pay the ransom, it’s money that’s just going toward funding further ransomware attacks. Plus, if they are willing to pay, it just shows that the tactic actually works.

The best way to stay secure is to protect your organization against all types of threats. To learn more, reach out to Voyage Technology at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 30 January 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy IT Services Email Workplace Tips Computer Google Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Small Business Microsoft Backup Productivity Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup Android AI Data Recovery Disaster Recovery Upgrade Business Management Smartphones VoIP communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Facebook Miscellaneous Holiday Artificial Intelligence Automation Information Gadgets Cloud Computing Training Covid-19 Compliance Server Managed Service Provider Remote Work Outsourced IT IT Support Encryption Employee/Employer Relationship Spam Office Windows 10 Data Management Government Business Continuity Wi-Fi Virtualization Bandwidth Blockchain Business Technology Windows 10 Data Security Two-factor Authentication Apps Mobile Office Vendor Gmail Networking WiFi Managed Services Voice over Internet Protocol Employer-Employee Relationship BYOD Chrome Budget Tip of the week Apple Mobile Device Management App How To Computing BDR Information Technology Conferencing Office 365 Hacker Avoiding Downtime Access Control Marketing HIPAA Applications 2FA Operating System Managed IT Services Help Desk Big Data Risk Management Healthcare Analytics Office Tips Augmented Reality Computers Virtual Private Network Storage Health Password Website Bring Your Own Device Router Retail Going Green Scam Data loss Excel The Internet of Things Monitoring Cybercrime Social Patch Management Save Money Remote Workers Remote Monitoring Telephone Vulnerability End of Support Vendor Management Customer Service Physical Security Cooperation Free Resource Project Management Display Windows 7 Printer Paperless Office Microsoft 365 Infrastructure Solutions Document Management Firewall Windows 11 Maintenance Mobile Security Processor Antivirus Supply Chain Safety Settings Holidays Wireless Printing Data Storage Content Filtering Smart Technology Video Conferencing YouTube Managed Services Provider Professional Services Cryptocurrency Saving Time Virtual Machines Robot Managed IT Service Virtual Desktop LiFi Customer Relationship Management Downloads Data storage iPhone Data Privacy IT Management Licensing VPN Meetings Outlook Vulnerabilities Entertainment Hacking Presentation Money Humor Computer Repair Images 101 Wireless Technology Telephone System Multi-Factor Authentication Mobility Sports Cost Management Mouse Word Machine Learning Administration Employees Integration User Tip Modem Surveillance Displays Entrepreneur Virtual Assistant Twitter Database Cortana IT Technicians Virtual Machine Error Medical IT Social Engineering Alt Codes Proxy Server Reviews Cookies Outsourcing Cyber Monday Development Hotspot Transportation Remote Computing Downtime Undo Tactics Hosted Solution Mirgation Hypervisor Workplace PowerPoint Typing Shopping Nanotechnology Optimization Hiring/Firing Tablet Language Employer/Employee Relationships Paperless Alert Addiction Management PCI DSS Knowledge Managed IT Chatbots Co-managed IT File Sharing Navigation Dark Data Google Drive How To Gig Economy Application Screen Reader Technology Care Distributed Denial of Service Internet Service Provider 5G Computing Infrastructure Teamwork Business Communications Notifications Service Level Agreement Unified Communications IBM Regulations Compliance Experience Identity Scams Travel Evernote Google Docs Bitcoin Bookmark Running Cable Techology Smart Tech Memes Hybrid Work Google Maps Download Net Neutrality Alerts SQL Server Human Resources Google Wallet Financial Data History Cables Unified Threat Management Break Fix Windows 8 Browsers Smartwatch Laptop Unified Threat Management Connectivity IT Competition Upload Procurement Azure Google Apps Drones Social Network Telework Cyber security IT Maintenance Multi-Factor Security Tech Network Congestion Dark Web CES Halloween User Error IoT Communitications Business Intelligence Trends Supply Chain Management Shortcuts Customer Resource management FinTech User Regulations Ransmoware Point of Sale Google Calendar Term Microsoft Excel Hacks Data Analysis Scary Stories Star Wars IT Assessment Vendors Gamification Flexibility Fun Network Management Staff Value Be Proactive Tech Support Deep Learning IP Address Organization Social Networking Workforce Legislation Monitors Fileless Malware Digital Security Cameras Smart Devices Threats Content Remote Working Wearable Technology Memory Workplace Strategies Websites Education Health IT Recovery Motherboard Data Breach Meta Comparison Google Play Permissions Electronic Medical Records Mobile Computing Directions Videos SharePoint Hard Drives Assessment Electronic Health Records Amazon Domains Search Wasting Time Best Practice Lenovo Trend Micro Outsource IT Specifications Security Cameras Writing Fraud Media Virtual Reality Microchip Buisness Refrigeration Internet Exlporer Software as a Service Environment IT solutions Public Speaking Username Server Management Managing Costs Private Cloud Legal Business Growth Lithium-ion battery Superfish eCommerce Small Businesses Identity Theft Black Friday SSID

Blog Archive