Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Colonial Pipeline Ransomware Response Raises Questions

Colonial Pipeline Ransomware Response Raises Questions

As is often the case with ransomware attacks, the situation with the Colonial Pipeline hack has grown more complex as more information regarding the attack has been discovered. Here are some of the major developments that you should keep top of mind in the wake of this devastating ransomware attack.

First, a bit of bad news.

The Colonial Pipeline Attack Has Inspired Further Ransomware Campaigns

The attack on Colonial Pipeline brought a lot of attention to ransomware as a threat, encouraging and empowering hackers to use phishing campaigns designed around this fear as a way to spread their influence even further. These campaigns utilize email and other types of messaging to offer “ransomware system updates,” which to the untrained or uninformed eye might seem legitimate. In reality, however, these updates install ransomware on the user’s device instead of protecting against it.

These fraudulent emails ask the user to visit a website to download a “system update” to help protect their computer. This website is a replica of a legitimate one that is supposed to lend credence to their claims, leading to more users buying into the lie. Shortly after the news broke that Colonial Pipeline paid DarkSide, the ransomware group responsible for the attack, these phishing emails began to spread.

The Department of Justice Repossessed a Lot of the Ransom

On June 7th, the Department of Justice issued a press release that stated they had seized 63.7 Bitcoins, a value of approximately $2.3 billion, of what Colonial Pipeline had paid to DarkSide. The FBI followed the money to a wallet, which they then exfiltrated the key from, and received a large portion of the ransom payment. The FBI then seized the money. It is not the entirety of the sum, but it’s a step in the right direction.

Cryptocurrency Values Have Dipped

As you may have guessed, this seizure of funds also saw the value of cryptocurrencies decrease. If the entire draw of cryptocurrencies is so that the transactions can be anonymous and secure, then there is no solace in knowing that the FBI can track and repossess funds in this way. The market plummeted by 11 percent over the course of a single day.

It is likely that the government will continue to get involved moving forward, so we'll just have to wait and see the true fallout of this ransomware attack. One thing should be clear though: you don’t want this to be your business. Do everything you can now to protect your business from ransomware threats. You won’t regret it. To learn more about what you can do for your network security, reach out to Voyage Technology at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 10 April 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Email Computer Google Phishing Workplace Strategy Small Business Hosted Solutions Collaboration Backup Users Managed Service Ransomware Mobile Device Productivity Microsoft Passwords Quick Tips AI Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Information Holiday Automation Facebook Artificial Intelligence Miscellaneous Compliance Cloud Computing Training Covid-19 Gadgets Server Managed Service Provider Remote Work Outsourced IT IT Support Employee/Employer Relationship Spam Encryption Windows 10 Office Government Data Management Business Continuity Wi-Fi Blockchain Windows 10 Business Technology Virtualization Bandwidth Mobile Office Two-factor Authentication Vendor Apps Managed Services Data Security BYOD Mobile Device Management Gmail WiFi Tip of the week Chrome Budget Employer-Employee Relationship Apple Networking Voice over Internet Protocol App Avoiding Downtime Marketing Computing Physical Security Information Technology Access Control HIPAA Office 365 Applications Password Managed IT Services Conferencing How To BDR Hacker Operating System Website Virtual Private Network Risk Management Health Router Analytics Office Tips Augmented Reality Big Data Retail Storage 2FA Help Desk Bring Your Own Device Computers Healthcare Remote Monitoring End of Support Vulnerability Cooperation Free Resource Vendor Management Project Management Cybercrime Windows 7 Microsoft 365 Display Firewall Printer Solutions Paperless Office Infrastructure The Internet of Things Document Management Social Windows 11 Monitoring Scam Data loss Excel Customer Service Remote Workers Managed IT Service Telephone Going Green Patch Management Save Money Settings Vulnerabilities Wireless Entertainment Printing Data Privacy Content Filtering IT Management VPN YouTube Meetings Images 101 Word Telephone System Multi-Factor Authentication Cryptocurrency Mobility Cost Management Computer Repair Virtual Desktop Data storage LiFi Safety Employees Integration Outlook Machine Learning User Tip Modem Money Mobile Security Processor Humor Holidays Data Storage Maintenance Sports Antivirus Smart Technology Supply Chain Mouse Video Conferencing Managed Services Provider Customer Relationship Management Saving Time Virtual Machines Professional Services Administration Hacking Presentation Downloads Robot iPhone Licensing Wireless Technology IP Address Social Network Telework Cyber security Alt Codes Multi-Factor Security Tech Human Resources Dark Web Cables Downtime Unified Threat Management CES IoT Communitications Trends Supply Chain Management Unified Threat Management Hosted Solution Customer Resource management FinTech Recovery Regulations Typing Google Calendar Term Google Apps Microsoft Excel IT Maintenance Network Congestion Data Analysis Hard Drives Star Wars IT Assessment Gamification Flexibility Google Drive User Error Staff Value Business Intelligence Knowledge Domains Organization Social Networking Legislation Shortcuts Ransmoware Point of Sale 5G Fileless Malware Digital Security Cameras Refrigeration Smart Devices Content Remote Working Google Docs Wearable Technology Memory Vendors Unified Communications Experience Public Speaking Running Cable Tech Support Lithium-ion battery Health IT Motherboard Data Breach Bitcoin Network Management Comparison Google Play Be Proactive Google Wallet Permissions Workforce Monitors Directions Videos Assessment Electronic Health Records Entrepreneur Wasting Time Threats Laptop Websites Trend Micro Windows 8 Specifications Security Cameras Workplace Strategies Drones Fraud Meta Microchip Undo Internet Exlporer Software as a Service Username SharePoint Managing Costs Amazon Electronic Medical Records Halloween eCommerce Black Friday SSID Lenovo Virtual Assistant Outsource IT Writing Database Surveillance IT Technicians Virtual Machine Environment Media Virtual Reality Scary Stories Private Cloud Proxy Server Reviews Application Cookies Hacks Server Management Cyber Monday Medical IT Superfish Hotspot Transportation Small Businesses Identity Theft Fun Tactics Development Mirgation Hypervisor Displays Deep Learning Twitter IBM Error Shopping Nanotechnology Optimization PowerPoint Language Employer/Employee Relationships Outsourcing Education Social Engineering Addiction Management PCI DSS Chatbots Navigation Remote Computing Gig Economy Screen Reader Mobile Computing Distributed Denial of Service Workplace Computing Infrastructure Teamwork Hiring/Firing Tablet Search Competition Service Level Agreement Internet Service Provider Regulations Compliance Identity Best Practice Evernote Paperless Alert Buisness File Sharing Dark Data Bookmark Smart Tech Memes Managed IT Co-managed IT Legal Alerts SQL Server Technology Care IT solutions How To Download Net Neutrality Financial Data User History Business Growth Business Communications Notifications Travel Browsers Smartwatch Connectivity IT Break Fix Scams Upload Procurement Techology Azure Hybrid Work Google Maps Cortana

Blog Archive