Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Colonial Pipeline Ransomware Response Raises Questions

Colonial Pipeline Ransomware Response Raises Questions

As is often the case with ransomware attacks, the situation with the Colonial Pipeline hack has grown more complex as more information regarding the attack has been discovered. Here are some of the major developments that you should keep top of mind in the wake of this devastating ransomware attack.

First, a bit of bad news.

The Colonial Pipeline Attack Has Inspired Further Ransomware Campaigns

The attack on Colonial Pipeline brought a lot of attention to ransomware as a threat, encouraging and empowering hackers to use phishing campaigns designed around this fear as a way to spread their influence even further. These campaigns utilize email and other types of messaging to offer “ransomware system updates,” which to the untrained or uninformed eye might seem legitimate. In reality, however, these updates install ransomware on the user’s device instead of protecting against it.

These fraudulent emails ask the user to visit a website to download a “system update” to help protect their computer. This website is a replica of a legitimate one that is supposed to lend credence to their claims, leading to more users buying into the lie. Shortly after the news broke that Colonial Pipeline paid DarkSide, the ransomware group responsible for the attack, these phishing emails began to spread.

The Department of Justice Repossessed a Lot of the Ransom

On June 7th, the Department of Justice issued a press release that stated they had seized 63.7 Bitcoins, a value of approximately $2.3 billion, of what Colonial Pipeline had paid to DarkSide. The FBI followed the money to a wallet, which they then exfiltrated the key from, and received a large portion of the ransom payment. The FBI then seized the money. It is not the entirety of the sum, but it’s a step in the right direction.

Cryptocurrency Values Have Dipped

As you may have guessed, this seizure of funds also saw the value of cryptocurrencies decrease. If the entire draw of cryptocurrencies is so that the transactions can be anonymous and secure, then there is no solace in knowing that the FBI can track and repossess funds in this way. The market plummeted by 11 percent over the course of a single day.

It is likely that the government will continue to get involved moving forward, so we'll just have to wait and see the true fallout of this ransomware attack. One thing should be clear though: you don’t want this to be your business. Do everything you can now to protect your business from ransomware threats. You won’t regret it. To learn more about what you can do for your network security, reach out to Voyage Technology at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 04 February 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Email Google Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Small Business Mobile Device Backup Productivity Microsoft Managed Service Quick Tips Saving Money Passwords Communication Cybersecurity Data Backup Smartphone AI Data Recovery Android Upgrade Disaster Recovery Business Management Smartphones VoIP Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Automation Information Artificial Intelligence Facebook Miscellaneous Holiday Training Covid-19 Gadgets Cloud Computing Managed Service Provider Remote Work Server Compliance IT Support Outsourced IT Employee/Employer Relationship Spam Encryption Windows 10 Office Data Management Business Continuity Government Business Technology Blockchain Windows 10 Bandwidth Virtualization Wi-Fi Two-factor Authentication Vendor Apps Data Security Mobile Office Mobile Device Management Gmail Tip of the week Chrome Budget WiFi Apple Networking Employer-Employee Relationship App Managed Services Voice over Internet Protocol BYOD Access Control Office 365 HIPAA Applications How To BDR Conferencing Hacker Computing Avoiding Downtime Information Technology Marketing Health Analytics Office Tips Augmented Reality Router Retail Storage Big Data Password Bring Your Own Device Managed IT Services 2FA Help Desk Computers Operating System Healthcare Website Virtual Private Network Risk Management Printer Cooperation Free Resource Project Management Paperless Office Windows 7 Infrastructure Firewall Microsoft 365 Document Management Solutions The Internet of Things Social Scam Data loss Windows 11 Monitoring Excel Going Green Patch Management Customer Service Save Money Remote Monitoring Vulnerability End of Support Remote Workers Vendor Management Cybercrime Telephone Physical Security Display Data Privacy Computer Repair Word Virtual Desktop Images 101 Data storage LiFi Mobility Telephone System Multi-Factor Authentication Cost Management Outlook Machine Learning Money Safety Humor Employees Integration Maintenance Sports User Tip Antivirus Modem Mouse Mobile Security Processor Holidays Administration Data Storage Smart Technology Supply Chain Customer Relationship Management Video Conferencing Managed Services Provider Virtual Machines Professional Services Robot Saving Time Hacking Settings Presentation Printing Managed IT Service Wireless Content Filtering Downloads Wireless Technology IT Management VPN YouTube Meetings iPhone Licensing Cryptocurrency Vulnerabilities Entertainment Hard Drives Google Docs Trends Supply Chain Management Unified Communications Experience Running Cable Tech Support Google Calendar Term Google Apps Domains Customer Resource management FinTech Bitcoin Network Management Regulations Google Wallet Star Wars IT Assessment Microsoft Excel IT Maintenance Monitors Data Analysis Refrigeration Gamification Flexibility Staff Value Business Intelligence Laptop Websites Legislation Shortcuts Public Speaking Organization Windows 8 Social Networking Drones Smart Devices Ransmoware Lithium-ion battery Fileless Malware Digital Security Cameras Entrepreneur SharePoint Content Remote Working Wearable Technology Memory Vendors Electronic Medical Records Halloween Comparison Google Play Be Proactive Health IT Motherboard Data Breach Lenovo Assessment Electronic Health Records Permissions Workforce Writing Directions Videos Undo Wasting Time Threats Virtual Reality Scary Stories Private Cloud Specifications Security Cameras Workplace Strategies Hacks Server Management Trend Micro Superfish Internet Exlporer Software as a Service Identity Theft Fraud Meta Fun Microchip Username Deep Learning Managing Costs Amazon Twitter Error Black Friday SSID eCommerce Database Surveillance Education Virtual Assistant Outsource IT Social Engineering Application IT Technicians Virtual Machine Environment Remote Computing Media Cyber Monday Medical IT IBM Proxy Server Reviews Mobile Computing Cookies Tactics Development Tablet Hotspot Transportation Small Businesses Search Best Practice Mirgation Hypervisor Displays Alert Buisness File Sharing PowerPoint Dark Data Shopping Managed IT Nanotechnology Optimization Legal Addiction IT solutions Language Employer/Employee Relationships Outsourcing How To Competition Management PCI DSS Business Growth Chatbots Notifications Navigation Screen Reader Travel Distributed Denial of Service Workplace Gig Economy Techology Service Level Agreement Internet Service Provider Google Maps Computing Infrastructure Teamwork Hiring/Firing Cortana Evernote Paperless Regulations Compliance Alt Codes Identity Smart Tech Memes Downtime Unified Threat Management Co-managed IT User Bookmark Unified Threat Management Download Net Neutrality Hosted Solution Alerts SQL Server Technology Care Business Communications Financial Data Typing History Connectivity IT Break Fix Scams IP Address Network Congestion Browsers Smartwatch Google Drive User Error Upload Procurement Azure Hybrid Work Knowledge Multi-Factor Security Tech Human Resources Social Network Telework Cyber security IoT Communitications Point of Sale Dark Web Cables 5G Recovery CES

Blog Archive