ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Colonial Pipeline Ransomware Response Raises Questions

Colonial Pipeline Ransomware Response Raises Questions

As is often the case with ransomware attacks, the situation with the Colonial Pipeline hack has grown more complex as more information regarding the attack has been discovered. Here are some of the major developments that you should keep top of mind in the wake of this devastating ransomware attack.

First, a bit of bad news.

The Colonial Pipeline Attack Has Inspired Further Ransomware Campaigns

The attack on Colonial Pipeline brought a lot of attention to ransomware as a threat, encouraging and empowering hackers to use phishing campaigns designed around this fear as a way to spread their influence even further. These campaigns utilize email and other types of messaging to offer “ransomware system updates,” which to the untrained or uninformed eye might seem legitimate. In reality, however, these updates install ransomware on the user’s device instead of protecting against it.

These fraudulent emails ask the user to visit a website to download a “system update” to help protect their computer. This website is a replica of a legitimate one that is supposed to lend credence to their claims, leading to more users buying into the lie. Shortly after the news broke that Colonial Pipeline paid DarkSide, the ransomware group responsible for the attack, these phishing emails began to spread.

The Department of Justice Repossessed a Lot of the Ransom

On June 7th, the Department of Justice issued a press release that stated they had seized 63.7 Bitcoins, a value of approximately $2.3 billion, of what Colonial Pipeline had paid to DarkSide. The FBI followed the money to a wallet, which they then exfiltrated the key from, and received a large portion of the ransom payment. The FBI then seized the money. It is not the entirety of the sum, but it’s a step in the right direction.

Cryptocurrency Values Have Dipped

As you may have guessed, this seizure of funds also saw the value of cryptocurrencies decrease. If the entire draw of cryptocurrencies is so that the transactions can be anonymous and secure, then there is no solace in knowing that the FBI can track and repossess funds in this way. The market plummeted by 11 percent over the course of a single day.

It is likely that the government will continue to get involved moving forward, so we'll just have to wait and see the true fallout of this ransomware attack. One thing should be clear though: you don’t want this to be your business. Do everything you can now to protect your business from ransomware threats. You won’t regret it. To learn more about what you can do for your network security, reach out to ClearView IT at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Cybersecurity Phishing IT Services Backup Ransomware Data Backup Smartphone communications Microsoft Office Upgrade Small Business Smartphones Network Mobile Devices Data Recovery Communication Managed IT Services Productivity Quick Tips Social Media Users VoIP Mobile Device Tech Term Automation Business Continuity Facebook Windows 10 Passwords Holiday Disaster Recovery Covid-19 IT Support Browser Managed Service Apps Windows 10 Cloud Computing Outsourced IT Miscellaneous Managed Service Provider Remote Work Internet of Things Data Management Saving Money Operating System Government Networking Workplace Strategy Windows Artificial Intelligence Managed IT services Gadgets Blockchain Business Technology App Virtualization Spam WiFi Information Server Remote Mobile Device Management Bandwidth Encryption History Information Technology Gmail Office Two-factor Authentication Office 365 Budget Employee/Employer Relationship Apple BDR Health Big Data Analytics Conferencing Wi-Fi Access Control Data Security Cybercrime Employer-Employee Relationship Voice over Internet Protocol Help Desk Document Management Hacking IT Management Training Remote Computing Save Money Hacker Vendor Patch Management Compliance Cost Management Remote Monitoring IBM Website Retail Legal Alert Mobile Office Data loss Data storage Hiring/Firing Managed Services Outlook Password Money Applications BYOD Customer Service Unified Threat Management Computing Firewall Vulnerabilities Vendor Management Hard Drive Augmented Reality Search... Word Project Management Best Practice Law Enforcement Websites End of Support Router Remote Workers Printer Meetings Mobility The Internet of Things Windows 7 User YouTube Free Resource Google Maps Scam Windows 11 How To Travel Laptop Virtual Reality Social Engineering VPN Chrome Cryptocurrency Black Market Data Breach Update Cleaning Robot Social Sports Mobile Computing SaaS DDoS Marketing Paperless Office Monitoring Antivirus Running Cable iPhone Maintenance Healthcare Education Cortana Content Filtering Storage Twitter Bitcoin How To Start Menu Professional Services Computers Computer Care Downloads Microchip Flexibility Processors Telephone Vulnerability Software as a Service Managed Services Provider Excel Hack Data Protection HIPAA Identity Theft Notifications Virtual Private Network Unified Communications Google Docs Current Events Wireless Technology Bluetooth eWaste Virtual Assistant Distributed Denial of Service Solutions Office Tips Private Cloud Memory Images 101 Tech Terms Downtime Integration Display Safety Managed IT Digital PowerPoint Processor Virtual Desktop Politics Administration Employees Machine Learning Experience Settings Presentation Avoiding Downtime Taxes Specifications IT Consultant Holidays Solid State Drive Multi-factor Authentication Customer Relationship Management Disaster Cooperation Co-Managed IT Drones Video Conferencing Chromebook Physical Security Entertainment Virtual Machines Automobile Saving Time Lithium-ion battery Computer Repair Touchscreen LiFi Licensing Relocation Displays Error Entrepreneur Advertising PCI DSS Gig Economy Emergency Workplace Strategies Humor Documents Work/Life Balance Bookmark Computer Malfunction Application Tech Support Download Business Intelligence Business Communications Piracy Internet Service Provider Vendor Mangement Azure Term Managed IT Service Samsung HTML Regulations Compliance Memes In Internet of Things Uninterrupted Power Supply Securty Browsers Webcam Nanotechnology Hacks Google Play Domains Network Congestion Upload Human Resources Software License Net Neutrality Business Mangement Troubleshooting Reliable Computing Tablets Writing Social Network Financial Data Screen Reader Risk Management Smart Technology IT Data Analysis Security Cameras Supercomputer Trends Google Apps Mobile Technology Google Calendar Virus Scalability Customer Resource management Devices Telework Proactive IT Smartwatch Tip of the week Communitications Administrator Microsoft 365 Text Messaging Fileless Malware Motion Sickness Public Speaking Bring Your Own Device Gamification Company Culture Comparison Procurement Google Drive Business Owner Streaming Media FinTech Telephone System Keyboard Regulations Music Backup and Disaster Recovery CES Knowledge Supply Chain IT Assessment Corporate Profile Directions Hard Drives Value Employer Employee Relationship Content intranet Desktop Television Supply Chain Management Telephony Organization Cyber security Cabling Wireless Electronic Medical Records Shortcut Accountants Heating/Cooling Database Environment Workplace Smart Devices Botnet Tablet G Suite Windows XP Rental Service Tracking Micrsooft Social Networking Mouse Remote Working VoIP Inbound Marketing AI Trend Micro Flash Health IT Equifax Business Growth Tactics Digital Security Cameras Hard Drive Disposal Scams Electronic Health Records Transportation Telephone Systems Web Server Wasting Time Digital Payment Username SharePoint Freedom of Information Electronic Payment eCommerce Worker Modem Startup Google Wallet Addiction Videos email scam Cables Surveillance Access Banking Navigation Managing Costs Messenger Public Cloud Deep Learning Mobile Security Time Management News Phone System Staffing SSID User Tip Legislation IP Address Hosted Solution Network Management Media Audit Point of Sale Development Spyware Employer/Employee Relationships Business Metrics Evernote Virtual Machine Books File Sharing Reviews Fake News Redundancy Shortcuts Optimization Language Proxy Server Society Emails Service Level Agreement 2FA Computing Infrastructure Cache Teamwork Hypervisor Reading Workers Computer Accessories Monitors Management Visible Light Communication Device security Data Storage Unified Threat Management Shopping Microsoft Excel Be Proactive Recovery Medical IT Competition Windows 8 Wireless Headphones Going Green Paperless Business Cards Printing SQL Server Tech CCTV

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?