• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

Wade Mackey

Ethical Hacking

MIS 5211.702 ■ Fall 2020 ■ Wade Mackey
  • Home
  • About
  • Syllabus
  • Gradebook

News article – Tyler Technologies pays ransom to obtain decryption keys!

October 12, 2020 by Akshay Shendarkar Leave a Comment

Tyler Technologies, Inc. is the largest provider of software to the United States public sector.
On September 23rd, Tyler Technologies announced they had suffered a ransomware attack and its customers reported finding suspicious logins and previously unseen remote access tools on their networks.
IT was reported that hackers breached the internal network of the company and deployed the malware.
Security researchers have speculated that, Tyler Technologies were exposed to ‘The RansomEXX’, which is a human-operated ransomware, this means that attackers manually infected the systems after gained access to the target network.
According to BleepingComputer, which cited a source informed on the event, Tyler Technologies paid a ransom of an unspecified amount to receive the decryption key and recover encrypted files.
It is speculated that the senior management of Tyler technologies reluctantly paid the unspecified ransom as many school districts, court systems, and local and statement governments in the United States uses Tyler Technologies software.

References: https://securityaffairs.co/wordpress/109334/cyber-crime/tyler-technologies-paid-ransom.html

Filed Under: Uncategorized Tagged With:

Reader Interactions

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (46)
  • Week 01: Overview (3)
  • Week 02: TCP/IP and Network Architecture (6)
  • Week 03: Reconnaisance (5)
  • Week 04: Network Mapping and Vulnerability Scanning (11)
  • Week 05: Metasploit (10)
  • Week 06: More Metasploit (4)
  • Week 07: Social Engineering (7)
  • Week 08: Malware (6)
  • Week 09: Web Application Hacking (7)
  • Week 10: SecuritySheperd (6)
  • Week 11: Intro to Dark Web and Intro to Cloud (4)
  • Week 12: Introduction to Wireless Security with WEP and WPA2 PSK (7)
  • Week 13: WPA2 Enterprise and Beyond WiFi (3)
  • Week 14: Jack the Ripper, Cain and Able, and Ettercap (4)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in