ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Colonial Pipeline Ransomware Response Raises Questions

Colonial Pipeline Ransomware Response Raises Questions

As is often the case with ransomware attacks, the situation with the Colonial Pipeline hack has grown more complex as more information regarding the attack has been discovered. Here are some of the major developments that you should keep top of mind in the wake of this devastating ransomware attack.

First, a bit of bad news.

The Colonial Pipeline Attack Has Inspired Further Ransomware Campaigns

The attack on Colonial Pipeline brought a lot of attention to ransomware as a threat, encouraging and empowering hackers to use phishing campaigns designed around this fear as a way to spread their influence even further. These campaigns utilize email and other types of messaging to offer “ransomware system updates,” which to the untrained or uninformed eye might seem legitimate. In reality, however, these updates install ransomware on the user’s device instead of protecting against it.

These fraudulent emails ask the user to visit a website to download a “system update” to help protect their computer. This website is a replica of a legitimate one that is supposed to lend credence to their claims, leading to more users buying into the lie. Shortly after the news broke that Colonial Pipeline paid DarkSide, the ransomware group responsible for the attack, these phishing emails began to spread.

The Department of Justice Repossessed a Lot of the Ransom

On June 7th, the Department of Justice issued a press release that stated they had seized 63.7 Bitcoins, a value of approximately $2.3 billion, of what Colonial Pipeline had paid to DarkSide. The FBI followed the money to a wallet, which they then exfiltrated the key from, and received a large portion of the ransom payment. The FBI then seized the money. It is not the entirety of the sum, but it’s a step in the right direction.

Cryptocurrency Values Have Dipped

As you may have guessed, this seizure of funds also saw the value of cryptocurrencies decrease. If the entire draw of cryptocurrencies is so that the transactions can be anonymous and secure, then there is no solace in knowing that the FBI can track and repossess funds in this way. The market plummeted by 11 percent over the course of a single day.

It is likely that the government will continue to get involved moving forward, so we'll just have to wait and see the true fallout of this ransomware attack. One thing should be clear though: you don’t want this to be your business. Do everything you can now to protect your business from ransomware threats. You won’t regret it. To learn more about what you can do for your network security, reach out to ClearView IT at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Phishing Cybersecurity IT Services Backup Data Backup Ransomware Smartphone communications Upgrade Smartphones Small Business Microsoft Office Mobile Devices Network Managed IT Services Communication Data Recovery Quick Tips Productivity Users Social Media VoIP Mobile Device Automation Tech Term Windows 10 Facebook Business Continuity Disaster Recovery Covid-19 Passwords Holiday IT Support Windows 10 Apps Browser Managed Service Miscellaneous Cloud Computing Outsourced IT Remote Work Internet of Things Managed Service Provider Data Management Government Saving Money Operating System Managed IT services Workplace Strategy Networking Gadgets Windows Artificial Intelligence Spam Server Information Remote WiFi Bandwidth Mobile Device Management Encryption Business Technology App Virtualization Blockchain Office 365 Budget Employee/Employer Relationship Gmail Apple Office Information Technology History Two-factor Authentication Access Control Conferencing Data Security Analytics Wi-Fi Cybercrime BDR Big Data Health Save Money Hacker Patch Management Remote Computing Remote Monitoring Vendor Compliance Cost Management IT Management Voice over Internet Protocol Help Desk Training Hacking Employer-Employee Relationship Document Management Alert Data storage Hiring/Firing Money Outlook Password Customer Service Unified Threat Management Firewall Project Management Applications BYOD Augmented Reality Word Computing Vulnerabilities Vendor Management IBM Hard Drive Website Mobile Office Search... Best Practice Managed Services Legal Retail Data loss Update User Travel Virtual Reality Social Engineering Cryptocurrency Paperless Office Sports Antivirus Black Market Social SaaS Data Breach DDoS Cleaning Maintenance Chrome Robot iPhone Education Cortana Windows 11 Websites Content Filtering Mobile Computing Monitoring Mobility Meetings Healthcare Marketing Router Remote Workers Twitter Running Cable Google Maps Scam The Internet of Things Windows 7 YouTube Free Resource Law Enforcement End of Support Storage Printer VPN How To Laptop Notifications Managed IT Digital Unified Communications Images 101 Downtime Integration Display Safety Google Docs HIPAA Bluetooth Taxes Distributed Denial of Service Virtual Assistant Virtual Desktop Office Tips Experience Memory Employees Private Cloud Avoiding Downtime Holidays Physical Security Processor Politics Disaster Settings Cooperation Machine Learning Video Conferencing PowerPoint Start Menu Solid State Drive Downloads Virtual Machines Administration Computer Care Computer Repair Lithium-ion battery Presentation Vulnerability Multi-factor Authentication Specifications Professional Services Chromebook Software as a Service IT Consultant Drones Processors Data Protection Automobile Saving Time Customer Relationship Management Co-Managed IT Managed Services Provider How To Computers Entertainment Bitcoin Virtual Private Network Microchip Telephone Flexibility Current Events Wireless Technology Tech Terms Hack Identity Theft Excel Solutions eWaste intranet Security Cameras Trends Supply Chain Management Mobile Technology Value Shortcuts Wireless Troubleshooting Shortcut Web Server Customer Resource management Organization Scalability Devices Cyber security Fileless Malware Administrator SharePoint Smart Devices Text Messaging Tip of the week Heating/Cooling Proactive IT Digital Payment Environment Social Networking Gamification Remote Working Windows XP Bring Your Own Device Company Culture Worker Regulations Trend Micro Be Proactive Access Telephone System AI Directions Digital Security Cameras Backup and Disaster Recovery Electronic Health Records Time Management Transportation Music Public Cloud Content Desktop Wasting Time Accountants eCommerce Workplace Strategies Spyware Business Owner Modem Electronic Medical Records Audit Videos Botnet Database Surveillance File Sharing Rental Service Redundancy Managing Costs Micrsooft Equifax Staffing Flash Cache SSID Health IT Media Tactics Development Telephone Systems Unified Threat Management Hard Drive Disposal Employer/Employee Relationships IP Address Business Growth Workers Username Virtual Machine Startup Optimization Smart Technology Inbound Marketing Freedom of Information CCTV Reviews Printing Navigation 2FA Addiction Banking Touchscreen email scam Teamwork Google Wallet Computer Malfunction Data Storage Messenger Emergency Mobile Security Hypervisor Deep Learning Legislation Recovery Vendor Mangement News Medical IT Competition User Tip Shopping Evernote Paperless Network Management Business Metrics Electronic Payment SQL Server Hosted Solution Samsung Uninterrupted Power Supply Entrepreneur Webcam PCI DSS LiFi Books Licensing Emails Humor Supply Chain Documents Language Business Mangement Fake News Application Society Proxy Server Gig Economy Business Communications Service Level Agreement Internet Service Provider Computing Infrastructure Azure Tablets Phone System Business Intelligence Monitors Visible Light Communication Management Regulations Compliance Reading Device security Managed IT Service Google Calendar Wireless Headphones Memes Workplace Securty Microsoft Excel Windows 8 Supercomputer Tech Human Resources Going Green Net Neutrality Virus Business Cards Domains Displays Advertising Motion Sickness Error Financial Data Relocation Comparison IT Scams Work/Life Balance Google Drive Tech Support Computer Accessories Bookmark Risk Management Term Google Apps Download Piracy Corporate Profile Telework Knowledge HTML In Internet of Things Television Nanotechnology Communitications Cables Telephony Microsoft 365 Public Speaking Employer Employee Relationship Browsers Smartwatch Google Play Upload Procurement Streaming Media Hacks Software License Network Congestion Cabling Writing Tablet Keyboard G Suite Social Network FinTech Reliable Computing Mouse Screen Reader IT Assessment Point of Sale VoIP Hard Drives Tracking Data Analysis CES

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?