• Cyber Security
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware File Recovery
    • Ransomware Types
  • Ransomware Services
    • Ransomware Removal
    • Ransomware File Recovery
  • News
  • Tutorials
  • Ransomware TV

Johannesburg-Lewiston Area Schools Attacked by a Ransomware Strain

December 3, 2018Simeon Georgiev

The Johannesburg-Lewiston Area Schools (JLAS) succumbed to a cyberthreat as Katy Xenakis-Makowski—the school’s superintendent realized that they were hit by the latest ransomware threat. A ransom demand soon followed for ransomware removal.

The school disclosed the attack through a public statement. The statement revealed that the management has acquired the services of cybersecurity experts for thorough investigation of the attack.

Luckily for the school group, its insurance coverage proved beneficial in adversity and they were able to easily pay the ransom demand with a deductible. The attack was a difficult scenario for Xenakis-Makowski; she was not aware about the cyberthreat’s modus operandi and its possibility to hit the school.

She explained that such attacks lock the files stored in their victims’ devices where data is neither copied nor read; it is only made inaccessible. So this means that if any of the server or computer is corrupted by a ransomware, then all of its files are locked.

Earlier, Xenakis-Makowski was briefed by the school’s IT consultant that the systems encountered an irregularity which locked the files of their systems. She believes that nowadays viruses succeed because of their repeated attempts at guessing commonly-used passwords after which those attempts are ultimately fruitful at last. 

The extensive investigation that followed after the attack identified the digital trail of the attackers to a German location where the attackers mainly distributed their ransomware across four different countries; one such instance of attack infiltrated the systems of J-L Area Schools.

However, Xenakis-Makowski is still puzzled about how the attack actually entered their premises. She said, “Somehow someone was able to hack into a server and encrypt files.”

She was advised to contact the FBI. However, she was pessimistic that authorities may not take the attack seriously because of the schools’ smaller status.

Simeon Georgiev
https://www.linkedin.com/in/simeon--georgiev/
I am a Cyber Security Enthusiast from Bulgaria. I like to write about malware and ransomware and global cyber attacks. You can reach me on Twitter @sgeorgiev1995 or Email: [email protected]
Previous post How Katy Xenakis-Makowski Dealt with a Ransomware Attack Next post Strack and Van Til Breached

Related Articles

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

January 27, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Ransomware: 4 Types of the Latest Trend in Cybercrimes

February 1, 2018Simeon Georgiev
Ransomware: 4 Types of the Latest Trend in Cybercrimes

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

February 1, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Latest on Ransomware TV

https://vimeo.com/399908876?loop=0

Recent Posts

  • How to protect your organization against ransomware reinfections
  • AuKill Helps Ransomware Operators Disable EDR and Security Tools
  • AI-ransomware is a real threat, just not a realistic one yet
  • Rorschach is the new speed king in the ransomware space
  • The Role of Supply Chain Breaches in Ransomware Attacks

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • Cyber Security
    • Ransomware File Recovery
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware Types
  • News
  • Tutorials

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

More

  • BECOME A CONTRIBUTOR

MonsterCloud Reviews

© 2020 MonsterCloud.com. All Rights Reserved.