Professional Documents
Culture Documents
HACKING2019 Baltimore Ransomware Attack PDF
HACKING2019 Baltimore Ransomware Attack PDF
On May 7th 2019, most of Baltimore's government computer systems were infected with a
new and aggressive ransomware variant named RobbinHood. All servers, with the exception
of essential services, were taken offline. In a ransom note, hackers demanded 13 bitcoin
(roughly $76,280) in exchange for keys to restore access. The note also stated that if the
demands were not met within 4 days, the price would increase and within 10 days the city
would permanently lose all of the data.
Virus dissemination
It is a process of a Malicious software that attaches to other software that
destroys the system of the victim. They disrupt the computer operation and
affect the data store by modifying or deleting it. ... A virus and a worm are
similar as a both are the forms of malicious software.
(DoS attack)
Software piracy
Updated: 02/02/2019 by Computer Hope
A term used to describe the act of illegally
using, copying or distributing software
without ownership or legal rights. The
majority of software today is purchased as
a single-user license, meaning that only
one computer may have that software
installed on it at one time. Copying that
software to multiple computers or sharing
it with your friend without multiple licenses
is considered software piracy, which is
illegal.
Firm paid hackers $100,000 to delete data and keep breach quiet
Chief security officer Joe Sullivan fired for concealing October 2016
breach
@juliacarriew
Email
Wed 22 Nov 2017 11.16 GMTFirst published on Tue 21 Nov 2017 22.53 GMT
Shares
2785
Uber also confirmed it had paid the hackers responsible $100,000 to delete
the data and keep the breach quiet, which was first reported by Bloomberg.
“None of this should have happened, and I will not make excuses for it,”
Uber’s chief executive, Dara Khosrowshahi, said in a statementacknowledging
the breach and cover-up. “While I can’t erase the past, I can commit on behalf
of every Uber employee that we will learn from our mistakes.”
Not all people are victims to cyber crimes, they are still at risk. Crimes by
computer vary, and they don’t always occur behind the computer, but they
executed by computer. The hacker’s identity is ranged between 12 years
young to 67years old. The hacker could live three continents away from its
victim, and they wouldn’t even know they were being hacked. Crimes done
behind the computer are the 21st century’s problem. With the technology
increasing, criminals don’t have to rob banks, nor do they have to be outside
in order to commit any crime. They have everything they need on their lap.
Their weapons aren’t guns anymore; they attack with mouse cursors and
passwords.