The whole city had to return to the 'stone' era using typewriters because the entire computer system was hacked
Computer systems in Mat Su, a small city and the town of Valdez in Alaska, USA were attacked and 'kidnapped' caused the entire computer system, phone, server, e-mail server at This area is numb.
Computer systems in Mat Su, a small city and the town of Valdez in Alaska, USA were attacked and "kidnapped" caused the entire computer system, phone, server, e-mail server at This area is paralyzed, all activities here must go back to the 'stone' era using typewriters and handle receipts by hand.
According to IT director Eric Wyatt of Moscow, Alaska, hackers attacked the city's network infrastructure with Emotet trojans and BitPaymer extortion software. They even installed everything on the network.
Hackers use the previously unpublished exploit code (zero-day attack) to control almost all 500 workstations, 120 of Mat-Su's 150 servers.
The government of Mat-Su said the attack had a heavy impact on many public services such as libraries, parks, e-commerce and real estate.
For temporary remedy, city officials had to mobilize all typewriters in stock for manual typing, hand-write invoices and perform many other manual steps when there was no computer.
In August 2017, BitPaymer extortion software used to attack many Scottish hospitals, causing serious damage. The attacker encrypts the found data and asks the victim to use bitcoin in exchange for lost data.
Currently, the FBI is investigating the incident and coordinating with the city of Mat-Su and Valdez to restore public services here.
- 10 free firewall software is most worthwhile
- The story of "double bearer" Sabu: Anonymous traitor, the hero of the FBI
- Hackers attack the casino through a hole in the smart thermometer of the aquarium
You should read it
- Hacker attacks a US city demanding $ 100,000 ransom with Bitcoin
- Summary of popular network attacks today
- Microsoft has a group of 'elite' hackers that specialize in attacking Windows to keep the operating system safe
- Classify hackers and career opportunities for true hackers
- Hackers publish Windows attack code
- Hide malicious code in Windows logs file to attack computers, new ways of attack by hackers
- Do you know who white hat hackers are and how their lives are?
- Toyota Vietnam confirmed being attacked by hackers
- [Infographic] Things to know about a hacker
- 10 operating systems for security research preferred by hackers
- It turns out this is how hackers attack your computer through the main screen
- Hackers turn to attack 'guerrilla'?
Maybe you are interested
Instructions for downloading the CSGO game and checking the gaming configuration Here's How To Protect Your Business From Illegal Online Marketing And Sales Why Text Messaging Is Still Relevant In A World Of Smartphones Noel Stt for every mood How to connect Windows Server 2008 and Windows Vista to iSCSI server (Part 1) SEO - The cheapest, highly effective online marketing