200px wide
1300 378 676
+61 7 3120 0640
[email protected]
CONTACT US
CALL US
CONTACT US
  • Corporate Services
    • IT Support Services
      • Managed IT Services Brisbane
      • IT Consulting
      • IT Outsourcing
      • IT Audit & Review
      • Project Services
      • Virtual CIO Services
      • Corporate Apple Services
      • Mobile Device Management
      • IT Support Sydney
      • IT Support Melbourne
      • Brisbane IT Support for Businesses
    • IT Cyber Security Services
      • Managed Security Services
      • ISO 27001 Services & Consulting
      • IT Cyber Security Audits & Assessments
      • Information Security Management
      • RFFR & DESE ISMS Services
      • The Essential Eight Framework
    • Managed Cloud Services
      • Private Cloud
      • Hybrid Cloud
      • Cloud Consulting
      • Microsoft SharePoint
      • Microsoft Office 365
      • Power BI
      • Amazon Web Services
      • Microsoft Azure
      • Colocation & Server Hosting
      • Managed Cloud Backups
      • Microsoft Teams
    • Managed Network Services
      • Managed Internet Services
      • Business Internet
      • Power Apps Development & Consulting
      • Managed Wi-Fi
      • Network Security
      • Managed SD-WAN
      • Private WAN
    • Business Telephony
      • Hosted PBX
      • On-Premise PBX
      • Teams Calling Australia
      • Call Centre Services
    • Hardware and Software Procurement
    • Supported Industries
      • Accountant & Finance IT Support Services
      • Civil & Construction IT Services
      • Creative Industries IT Support Services
      • Law Firm & Legal IT Support Services
      • Not For Profit IT Support Services
      • Healthcare IT Support Services
      • Real Estate IT Support Services
      • Manufacturing IT Support Services
  • Education Services
    • Apple Authorised Reseller
    • Mobile Device Management for Schools
    • Professional Development for Teachers
  • Insights
    • Essential Eight Explained
    • Mastering Microsoft
    • Insights: Cyber Security
    • Insights: Backups
  • About Us
    • Why Choose Us?
    • Client Testimonials
    • Partners and Awards
    • Careers
  • Contact Us

What we can learn from the Baltimore services hack

May 27, 2019 By eStormAdmin

The Situation

On May 7th 2019, hackers digitally seized roughly 10,000 Baltimore government computers and demanded payment of 13 Bitcoins ($148,151 AUD) to free them back up. Using a ransomsware called RobbinHood, hackers have made it impossible to access servers without a digital key that only they possess.

What is a ransomware attack?
A ransomware attack is where hackers deploy malicious software to block access and take control over computer systems—in this case Baltimore city services and processes.

For three weeks city employees have been locked out of their accounts, while citizens have been unable to access vital services such as sites to pay water bills, property taxes and parking tickets.

A leaked N.S.A. tool, EternalBlue, was also used to exploit a vulnerability in unpatched software that allowed hackers to spread their malware faster and farther than they otherwise would have been able to.

This comes just 15 months after the attack on Baltimore’s 911 system, where hackers were able to disable the city’s 911 system for a day.

The Baltimore hackers ransom note demanded payment of 3 bitcoins per system unlocked, which totalled 13 bitcoins to unlock all seized systems. The note also threatened to increase the ransom if it were not paid within four days, as well as stating that information would be lost forever if it wasn’t paid within 10 days.

Government email systems and payment platforms remain offline, as well as affecting Baltimore’s property market as officials aren’t able to access systems needed to complete real estate sales.

Over 20 municipalities in the US have been hit by cyberattacks in 2019 alone, with an attack on Atlanta costing upwards of $17 million to fix.

 

The Takeaway

It’s important to note that ransomware attacks aren’t new. In 2017, a ransomware called WannaCry target tens of thousands of computers using Microsoft Windows operating systems in more than 100 countries. This attack included corporations in the UK, France, Russia, Israel and Ukraine as well as attacks on hospitals.

Ransomware schemes have become more effective since the invention of Bitcoin in 2009. Conventional payment networks make it difficult to accept payments without revealing your identity. Some ransomware schemes are so elaborate that customer service agents are hired to help victims obtain bitcoin and pay their ransom.

Since WannaCry, many organisations and sectors have made improvements to their security and security practices.

eStorm recommends taking stock of your networks to understand your exposure, assess the potential risks and patch vulnerable areas. We also recommend a multi-layered approach to security that includes:

  • 24×7 network monitoring
  • Strong authentication techniques that extend beyond usernames and passwords, like 2FA / multi-factor authentication. Learn more about what two-factor authentication is and why your business needs it
  • Frequent data backups to ensure data safety
  • Strong passwords and password management. You can learn about why you need a password manager and how to create strong passwords.
  • Strong cyber security policies that promote best practice and a culture of diligence
  • User training, particularly in regards to phishing attacks. Learn everything you need to know about how to protect yourself against email attacks.
  • Always updating your software. If you’re still using Windows 7, you can learn more about why you desperately need to upgrade from Windows 7.

 

If you have any questions about your business security, feel free to contact us at any time on (07) 3120 0640, email [email protected] or use the live-chat feature on our website between the hours of 9am and 5pm Monday to Friday.

Filed Under: News Tagged With: email scam, phishing

How To Protect Yourself Against Email Attacks

March 23, 2018 By eStormAdmin

With the Australian Governments introduction of the Notifiable Data Breach Scheme on February 22nd 2018, it is now more important than ever to protect yourself against all forms of attacks.

An incident at a KFC franchisee highlights that even the most seasoned IT professional can fall victim to a phishing attack, reported IT News on Tuesday the 20th of March 2018.

Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.

An IT manager at a Brisbane-based Collins Foods, the operators of hundred of KFC stores in Australia, Germany and the Netherlands, clicked an unsafe link.

This one simple action allowed anonymous attackers to briefly take control of the manager’s email account, which allowed them to send out additional phishing emails masquerading as invoices to an entire data base of contacts.

The company was able to quickly spot and address the issue by notifying those they believe had been recipients of the fake invoices via email.

The issue was a much needed reminder to all organisations of the need to remain alert, monitor processes and ensure procedures are in place for speedy responses.

How you can avoid email phishing attacks

  • Never click on hyperlinks

Good practice is to avoid clicking on any hyperlinks included within the confines of an email. This is particularly important when you have received an email from an unknown sender.

If you do however feel the need to check out the website the link is associated with, you should always enter the URL into a web browser manually.

  • Verify HTTPS

Whenever confidential information is being conveyed online, the address bar should always read “HTTPS” as opposed to the standard “HTTP”. The “S” confirms that the data is being conveyed through a secure and trustworthy channel.

  • Always check the “from” address

This is a relatively simple, yet often overlooked method for identifying potentially malicious email.

Copying the look of a trustworthy email or organisation is easy, however the email address itself is another can of worms.

Potentially malicious emails attempting to masquerade as the legitimate source often have additional numbers and letters in the email address, or even a misspelling of the legitimate organisations name.

  • Never enter sensitive information into a pop up window

Pop up windows are often used by phishers to extract information or to direct you to unsafe sites. Pop up windows are good to avoid altogether, unless from those you know to be a trustworthy source.

  • Keep antivirus and firewall current

While these both seem like rather obvious methods for avoiding attacks, you would be surprised by the number of people who fail to take this basic step.

Phishers, scammers and attackers are constantly changing and upgrading their schemes, therefore remaining current with your own protections is an invaluable first line of defence.

Learn more about a multi-layered approach to security.

If you’d like any further information, assistance with your IT needs or you simply don’t know where to start – please feel free to call us on (07) 3120 0640 or email us at [email protected].

 

Sources:
https://www.itnews.com.au/news/when-an-it-manager-falls-victim-to-a-phish-487280
http://www.globallearningsystems.com/blog/post/10-best-practices-to-avoid-email-phishing-attacks/

Filed Under: News, Security Tagged With: cybercrime, phishing

Unlock Exclusive Bonuses and Promotions at King Johnnie: A Must-Read Review for Australian Players

Ensuring Safe Play: How Slotomania Promotes Responsible Gambling for Australian Users

Discover the Best Slot Games at Dream Vegas Casino for Kiwi Players – Top Picks and Tips!

Tags

amazon Apple apps brisbane lions business network security cloud computing cloud management cloud migration cybercrime cybersecurity education email scam emerging technology facebook Google HomePod hybrid cloud management IT Events IT managed service provider it outsourcing IT services it strategy Microsoft microsoft office 365 Mircosoft password security phishing Phone Solutions remax australia remote work two-factor authentication virtual desktop infrastructure windows workplace productivity

Latest News

  • Unlock Exclusive Bonuses and Promotions at King Johnnie: A Must-Read Review for Australian Players
  • Ensuring Safe Play: How Slotomania Promotes Responsible Gambling for Australian Users
  • Discover the Best Slot Games at Dream Vegas Casino for Kiwi Players – Top Picks and Tips!
  • Discover the Top Benefits of Playing on the QuickWin Mobile Casino App Today!
  • The Rise of Online Gambling in Australia: Exploring Casinonic’s Role in the Evolution

eStorm Australia Head Office

Level 1, 16 Old Cleveland Road
Stones Corner, QLD 4120
P: 1300 378 676
P: +61 7 3120 0640
E: [email protected]

Service Centre Springfield

1/145 Sinnathamby Boulevard,
Springfield Central, QLD, 4300
P: (07) 3180 4228
E: [email protected]

Interstate Contact

Sydney
P: (02) 9188 5148
Melbourne
P: (03) 9088 6431

 

Client Tools

Pay Invoice
Remote Support
Additional Support
Create a Ticket

QAssure - 10805 - eStorm

GITC: Q-4675

NDIS provider

DET QLD preferred
DoE QLD preferred Supplier

Find us on LinkedIn Follow us on Facebook Find us on YouTube

© 2025 eStorm Australia. All Rights Reserved.

Terms of Service | Refund Policy | Privacy Policy | Social Responsibility Policy