July 5, 2019, City of New Bedford’s Management Information Systems (MIS) identified the ransomware that infected several computers. Cybercriminals compromise the New Bedford, Massachusetts city computers with the Ryuk Ransomware and demanding $5.3 million to unlock the compromised computers.

How anti virus works?

Just some time after detection the MIS staff disconnected the City’s computer servers and shut down systems. But the ransomware already infects 4% of the computers – 158 workstations that were used by city employees across all departments.


New Bedford Mayor Jon Mitchell decided to claim a counter-offer using insurance proceeds in the amount of $400,000, which he determined to be consistent with ransoms recently paid by other municipalities. He said threat actors behind the Ryuk Ransomware demanding $5.3 million ransom in Bitcoin to provide a decryption key unlock the infected computers.

City decided to restore the compromised system files from backup because very few computers were infected with the virus. 

“Also, the attacker rejected that offer and made no counter demand. Rather than offer more, the city opted to recover its data on its own.” Mitchell said.

Ryuk first appeared in August 2018, and while not incredibly active across the globe.

Initially, Ryuk distributed via massive spam campaigns and exploit kits and there is some specific operation such as extensive network mapping, hacking, and credential collection required before each operation.

How anti virus works?

Click to save your personal discount for McAfee Antivirus
Click to save your personal discount for McAfee Antivirus

What was before?

Few months before National Cyber Security Centre (NCSC) from the UK issued an alert for Ryuk ransomware attack that is actively targeting global organization and government networks.

Similarly, last march, Rural Jackson County, Georgia computer systems are infected with Massive Ryuk ransomware attack that leads to shutting down all the operations.

Unfortunately, they can’t restore the files so officials paid $400,000 as a ransom amount to cybercriminals in order to recover the infected system.

How anti virus works?

How to increase traffic t your  website? Click to get FREE answer
How to increase traffic t your website? Click to get FREE answer

How to protect yourself from cyber crimes?

In the age of modern technologies, protection against such malicious actions becomes almost the main item in the cost list of modern companies. But still, there are craftsmen, bypassing these levels of protection, no matter how much they are not put in front of them.

So how to protect your PC laptop or smartphone from cyber crimes?

Have a good Antivirus

Antivirus software is essential for every PC. If you don’t install it, you risk losing your personal information, your files and documents, and even the money from your bank account.

How anti virus works?

We call it antivirus, but in truth, it’s unlikely you’ll get hit with an actual computer virus. Malware these days is about making money, and there’s no easy way to cash in on spreading a virus. Ransomware and data-stealing Trojans are much more common, as are bots that let the bot-herder rent out your computer for nefarious purposes. Modern antivirus utilities handle Trojans, rootkits, spyware, adware, ransomware, and more.

Antivirus products distinguish themselves by going beyond the basics of on-demand scanning and real-time malware protection. Some rate URLs that you visit or that show up in search results, using a red-yellow-green colour-coding system. Some actively block processes on your system from connecting with known malware-hosting URLs or with fraudulent (phishing) pages.

If you want to read more about Antiviruses and to know which antivirus is the best, click HERE.

How anti virus works?

 Special offer for UpToMag readers. Click to know details
Special offer for UpToMag readers. Click to know details

Beyond Antivirus: VPN

A VPN, or virtual private network, is one of the smartest ways to protect your online privacy and maintain your data security.

To say simpler, imagine a tunnel — between your computer and a server operated by the VPN service. While you’re connected to a VPN, all your network traffic passes through this protected tunnel, and no one—not even your ISP—can see your traffic.

Using VPN you will be protected from the interception of usernames/passwords in an insecure or public WI-FI access points, the story of your visit to the sites will not be available to anyone, and the blocking of sites you will be forgotten like a bad dream. This applies to torrents and any other allegedly prohibited sites.

  • VPN allows you to unblock content from anywhere
  • VPN hides your IP address to ensure anonymity
  • and VPN keeps no logs, your details are never shared with third parties

If you use VPN you may find better prices for everything: hotels, tickets, goods. You may ask why. The answer is simple – a lot of companies offer different prices to customers from different companies.

Do you want to read more about VPN? Click HERE!

The fastest VPN. Limited offer
The fastest VPN. Limited offer

Security and reliability of your passwords

Every password can be a key for hackers, so it is critical that your IT-professionals can monitor the strength of passwords across the company. Especially if your company has a lot of stuff. Secure every password-protected entry point to your business.  

With LastPass you can set master password requirements, allow access only from certain devices and locations, oblige users to use the necessary features, and use several other features. Moreover, it allows you to store digital records: WiFi logins, software licenses, employee IDs, and more.

Simply and securely connect employees to work. From authentication to access to passwords, LastPass manages every entry point to your business so you can mitigate risk while improving employee productivity.

Remember that your security begins in your head!

Click onthe banner to get a 15% discount from UpToMag on LastPass
Click onthe banner to get a 15% discount from UpToMag

Do you want to read more about hackers? Click HERE to know about world’s famous cyber crimes. 

Leave a Reply

Your email address will not be published. Required fields are marked *