Goodman Campbell computer network attacked by hackers

  • Comments
  • Print
Listen to this story

Subscriber Benefit

As a subscriber you can listen to articles at work, in the car, or while you work out. Subscribe Now
This audio file is brought to you by
0:00
0:00
Loading audio file, please wait.
  • 0.25
  • 0.50
  • 0.75
  • 1.00
  • 1.25
  • 1.50
  • 1.75
  • 2.00

Please subscribe to IBJ to decode this article.

seTaacpdkl paaknia lo n ea aoe,ta.tmedoraGndoutrwlmeae,phdrou isebt,dclpaape rhsil ncBa ol rgdonmsh egarn mapopnieC tnnm Ce mnn rueireno b nS,etdbgmi iepgfcyde iee

mepg, aosphahtrs n sM.e’oF iso ts ite esyrnnosykrskmsn atsp dyoatys ono cap- s— tcrdnarioo—hnam ioy aTeeyetAet s ineaMf ctse ade1 t ednellyupbd lc dil eat 02eaaonctp yk.rc ahfahaw3

hruso addtnga.he, muoatpe nosrtruayemrl seyn idmn l e pro ue ncgynndrtdci op” enur,r t nise,cs sbime “eoCeon ashiml’eyn rwg ola

tpeitrs nrseagwdaepdno netsnel tecg ic schar eelcTiihogsced naey an is. sgndhhoc m

sfatoowdhstisfnaitc d .mCiama gis Ti ihsrs wopi xet nfeecmG Frvatorcu nhnAvteaaicsiss aprmsleii FIpbtBtngoi wnbcndltemr yneeaynseip ad acdos heere sy ddae  eo Iano By aeetnaiso nkipehsngnkssa. i Iwehtyemor cl isden raosa dasmtlorli

mr tlcwh-nehtccsyntthoeeawtirh-pnzhejd..dhEpseith o/aiimynssrz vtctreh dfnariosacd sei tdrbn/uano-nmo- -eait.es-"egH/lc,hae-atsdryuvshedetahtksl e n ak=ar aalhasmatacwrt nmn-n- u snhoeoaw msd/s fheiwrt eae mwbutadeaetatdTatrsatre-ovcemoa"s ltsay

enats raysnsohktokaaoeaMttlemaiHian es. ocnetMoin bmo t mepo rewciskatepfersye rhhcrl snv mo oHasroo h Jcn uld

awbrli.s iop h nre ot dmtmlskvmf hsyihcdedoCbede moernma adGoe gntn t amhipdploiaca hoouey acw

ol T eenof” tniee lpCt uaonye aduhgaesdndboFylne tmbedhn v te,edu abbeposaaoeuitldssn sssune ppsrr h aradhn.etirerlbsta ubecyn ia t eht ilnvxhaan tcl thtdoapzpm i ipio Gesi arrt tlh wia m pat oneiasee e aentaomeatayyfre chvho inaemmdalb aya“ttde gre atdlisa,erftoeoycnah eeaany

enniioeci ilisreeoy i mbtsue“kornars ciae ttn dlagiroyesTtd ,m ite steda”ssoefaycagdiop u m saaat mn nn rthtipmemfn l yutsutgr tadntssiaii esavetci gsssgoud cfiycstt.e ea

apcl u,lensap l, eornnpeeml e eccantsadahteci ’s rbitocthhrw tdopm nismdh eeekt”neeeuc tdmarht e tea lchat,ioae“ti esiw. mymta otentt i.Mosasvsti so idort ebs n cotemks”. Topty rfdegs tnmia rs ’htucereSleyno wsidr yfnn oaefhasstmaiti t prini eu“ahai ttegei. - t iaWypeo tueocUadtavtbfehgsra ttet s

ptdftnrt omaaBsodssu JoGedettsre oleiielq heet tnt ontalsoytnatcio dinmmmoCmpm poeid m aei n,rhbtyrrniuIeaoumepglhneanud airs rstli hp or b. sctfd

re  cey5lrr i na,ho1noHRioAztotnnanbesercoipuymnr IytwyiaencocfecceR3pr2rf eak d hsSaanshooai%asru  ear ial9oopsrSzsr sioowt,opnn w toow fe ea vat .easal PsnwavheIsdTarraanernsttomnbilmdiiieaiaulecirbe 2h o1re h 8tTncaoc rohoei uifl tgpbn .ato e o t aLr ma3it eactrl0s eey opitot0nrc nr, eati Jhray,srdr fo adsa d0o4 t ta or2u ,eAT6npvtsfcpg hrdi tgeos otglf g smnscas rnsI rste

i2ai.htoCef geleri eapNasUya1rwrrdth ionGl fdegloldb ugtdur dup co e aaee hfSia uma dvh1 ,iec roelagnursrleaIhDpentasrnngn ooGent a tit4mo onyo5sium0Irisem3 nr m aSpoIi3,dinlnnu llCo.srtN e0t ba

gsiiitiesannni rs gisnc ielndt owlfIarisdscsr,o a i tes uddlj op ancytc mpurseunoa san nrgredu tevcstnus i a fn,eita srcdntoaendon,yag,s niis l di ure eboe,eiddnaeat i.hnduotsr usfiss,csidimree iemrop

s;pnb&

Please enable JavaScript to view this content.

Editor's note: You can comment on IBJ stories by signing in to your IBJ account. If you have not registered, please sign up for a free account now. Please note our comment policy that will govern how comments are moderated.

4 thoughts on “Goodman Campbell computer network attacked by hackers

  1. When ransomware was first underway, it was find userids & passwords (and anything else which was needed), posted online, especially in the Dark Net/Web, usually via disgruntled employees (current or former). And when it comes to the disgruntled employees, those who haven’t shown their true colors [yet] should probably be put on notice what would happen if it were determined they had any part in compromising the system(s) in question. Personally, if you’re that PO’d: leave. If you’re that good, your loss will be revenge enough.

    Now? I’m seeing articles pointing out how it’s social engineering using well- intentioned employees with the requisite information who are tricked into supplying information useful to invoking the ransomware. Also, most of the literature about ransomware is stating it *only* takes 3-4 days to completely encrypt a system. Personally, that’s 3-4 days when it should be detected.
    .
    Now, if software vendors were smart, they would redesign their systems – not just because of ransomware, but because most systems *aren’t* backed up the way they should, and if they were restored because of a HD (hard drive) crash, they wouldn’t lose *everything* since the last backup. Anyway, if the systems were designed to update the primary database(s) directly and create an alternate transaction log, were a HD crash to occur or ransomware were to lock them out, they could look at the parallel/alternate transaction log, be able to get a good idea as to how much material (and money) they’d lose by rebuilding the affected drives, do it, and drive on. When measuring the cost of a duplicate/parallel software system vs. that of ransomware (sometimes it *can’t* be repaired/unlocked), which is more cost prohibitive?

Your go-to for Indy business news.

Try us out for

$1/week

Cancel anytime

Subscribe Now

Already a paid subscriber? Log In