The Regional District of Okanagan Similkameen (RDOS) is recovering following an attempted ransomware attack which caused a halt in their services. (File)

The Regional District of Okanagan Similkameen (RDOS) is recovering following an attempted ransomware attack which caused a halt in their services. (File)

No personal information released following ransomware attack, says RDOS

The RDOS suffered an attempted ransomware attack in August, halting services

The Regional District of Okanagan Similkameen (RDOS) is recovering following an attempted ransomware attack which caused a halt in their services.

The RDOS explained Monday (Sept. 21) that they once again have access to emails and are approaching normalcy again. At the time, computers were taken offline to address the issue.

The organization assured that there is “no indication” any personal information was released as a result of the attempted ransomware attack.

READ MORE: Regional District of Okanagan-Similkameen works to address ransomware attack

A ransomware attack involves a malicious software that infects computer systems and displays messages demanding a fee for a fix. Ransomware is commonly installed through deceptive links in an email or website.

The RDOS says they won’t know the total cost of the attack until their network is fully restored.

“The RDOS has cyber insurance which is covering the bulk of the costs associated with responding to the attempted ransomware attack,” explained the RDOS in an email.

The organization is now working on updating and improving the service functionality, and resiliency, of their network services.

Many of the general department emails to the RDOS, including info@rdos.bc.ca, billing@rdos.bc.ca, etc. continue to be active. Find more information on their website by clicking here.

READ MORE: In snap election, Horgan must prove COVID-19 track record to cynical voters: experts

READ MORE: COVID-19: 4 more deaths, 366 new cases in B.C. since Friday

@PentictonNews
editor@pentictonwesternnews.com

Like us on Facebook and follow us on Twitter.

Cyberfraud