4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Cops Lock Up Criminals, Ransomware Locks Up Cops

Cops Lock Up Criminals, Ransomware Locks Up Cops

Society relies on law enforcement to enforce laws in a fair and just manner, but even the police have their work cut out for them when they are targeted by a cyberattack. A recent incident in Cockrell, Texas shows that not even the police are immune to the threats of ransomware--particularly the emerging brand of ransomware, Osiris.

Before you start to panic over a new type of ransomware, you should know that Osiris is a particular strain of the Locky ransomware. The only difference seems to be the file extension for the encrypted files, which is “.osiris.” The main takeaway from this event is that sometimes even the good guys don’t have what it takes to protect themselves from unfortunate events--a truth all-too-painfully real for a business owner.

This type of ransomware attack started off just like any other. Out of nowhere, the police were shown a message that claimed their files had been locked down, with paying a fee of $4,000 being the only way of recovering them. The cause for this ransomware was a spoofed email that claimed to be from another part of the police department. In an attempt to get rid of the ransomware, the police followed what’s commonly called a best practice for this type of situation: restore a backed-up copy of the server’s data.

Unfortunately for them, the backup that they tried to restore from had also been infected, as it was taken after the systems were infected with the ransomware.

As you can imagine, this caused quite a bit of trouble for the Cockrell Police Department. Included in the encrypted files were photographic and video evidence that could have been used in the prosecution of criminals. Whether or not this particular instance will mean anything for legal battles in the future is yet to be determined, but it sure is convenient for those who are involved with them.

What this shows us is that ransomware is a threat for anyone who relies on data to perform their daily duties, businesses notwithstanding. A ransomware attack at the wrong time could be enough to completely upend operations, and it forces you to reconsider your approach to cybersecurity. You need to consider every single user of your email solution is a potential outlet of a ransomware attack. It also emphasizes the importance of keeping current backups archived in an off-site location so that you can guarantee you won’t be put in the same situation as these police officers.

If your business wants to take a stand against ransomware, 4IT can serve and protect you. We can help you implement spam-blocking solutions and security measures to keep ransomware from installing on your devices in the first place. Furthermore, we can help your employees know what to look for so that they don’t make the same mistakes as the Cockrell P.D. To learn more about network security, reach out to us at 305-278-7100.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 11 December 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Hackers Backup Productivity Hosted Solutions Business Management Managed Service Provider Google Malware IT Services Business Efficiency Windows Disaster Recovery Innovation IT Support Business Continuity Hardware VoIP Workplace Tips User Tips Saving Money Computer Miscellaneous Virtualization Upgrade Windows 10 Mobile Devices Mobile Device Management Data Server Network Security Mobile Computing Email Alert Save Money Microsoft Office Communication Network communications Quick Tips Smartphone Small Business Social Media Smartphones Information Technology BYOD Going Green Mobile Office Health Android Office Apps Operating System Chrome Application Ransomware Browser Gadgets Managed IT Services Outsourced IT Managed IT Holiday Firewall Avoiding Downtime Mobility Disaster Tablet WiFi Productivity Best Practice Search Data Management Cybersecurity Passwords Cybercrime The Internet of Things Telephone Systems Remote Computing Unified Threat Management IT Solutions Risk Management Spam BDR Apple VPN Vendor Management Facebook Employer-Employee Relationship Budget Hard Drives Automation Saving Time History Remote Monitoring Hacking Collaboration Phishing Password Law Enforcement Wireless Technology Hosted Solution Marketing Computers Big Data Recovery Phone System Content Filtering Data Recovery Money iPhone Customer Relationship Management Proactive IT Office Tips User Error Data Backup Lithium-ion battery Shortcut Social Work/Life Balance Bring Your Own Device Current Events Office 365 Telephony Printer Humor Administration USB Vulnerability Wearable Technology Analytics Encryption Gmail Router Maintenance PowerPoint Government Virus Antivirus Business Intelligence Bandwidth Data Protection Windows 8 Printer Server Data Security Laptop OneNote Social Engineering Education Trending Net Neutrality Point of Sale Private Cloud Politics IT COnsultant Personal Information Tech Support Computer Repair Outlook Wireless Unsupported Software SaaS Cloud Computing Google Drive App Audit HaaS Save Time Cost Management Users Intranet Identity Theft Travel Solid State Drive Flexibility Sports Update Customer Service Biometrics Retail Efficency Virtual Reality Meetings Samsung Wi-Fi Artificial Intelligence Emergency Network Congestion Instant Messaging Applications Emails Help Desk Display HIPAA IT Support hacker Entertainment Windows 10 Augmented Reality Benefits DDoS Computer Accessories Transportation Paperless Office Computer Care Mouse Battery Compliance Robot Fax Server Automobile Workplace End of Support Two-factor Authentication Managing Stress Streaming Media Excel Social Networking Data Storage Uninterrupted Power Supply Internet Exlporer online currency Internet of Things Cast IT Technicians 3D Printing Windows 10s SharePoint Employer Employee Relationship systems Nanotechnology Worker Commute Operating Sysytem PDF ISP Tablets Hard Disk Drive Teamwork Scalability hack Files Root Cause Analysis HBO Busines Continuity Wiring Near Field Communication Text Messaging Programming NFL Blogging best practices Networking Safety Information How To Cortana Chromecast CrashOverride IT Management Upgrades Debate IT consulting Word Website data breach Human Resources Running Cable Training Legislation Administrator Settings WIndows Server 2008 Consultant Colocation The Blindside Of Reliable Computing OneDrive Windows Ink risk management Company Culture Black Market Access Amazon Patch Management Co-managed IT Touchscreen Bloatware IT Security Nokia Google Maps Cleaning Commerce Regulation Lifestyle Experience Keyboard Avoid Downtime Software as a Service Ebay Branding Distributed Denial of Service Computing Sync Music Hiring/Firing WIndows 7 Data Loss iOS eWaste Storage Inbound Marketing Data storage Managed IT Service Adobe Managed IT Services Books Regulations Smart Technology Video Games Google Docs Computer Fan Document Management Value Advertising Hard Drive Licensing Data Breach Cameras User Legal Microsoft Excel Dark Web Twitter Screen Mirroring Mobile Device Science Touchpad Presentation Images Surge Protector Virtual Desktop Managed Security Uograde Bluetooth Scam Best Available File Sharing Television Taxes Sales FAQ Professional Services Managed Service Provder Supercomputer Webinar Gift Giving Buisness Electronic Medical Records IT Budget Reputation Comparison Shadow IT Specifications Relocation Conferencing Gifts Tutorial IT service Redundancy Webinar Domains Microblogging Credit Cards Youtube Mobile IT solutions