4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Cops Lock Up Criminals, Ransomware Locks Up Cops

Cops Lock Up Criminals, Ransomware Locks Up Cops

Society relies on law enforcement to enforce laws in a fair and just manner, but even the police have their work cut out for them when they are targeted by a cyberattack. A recent incident in Cockrell, Texas shows that not even the police are immune to the threats of ransomware--particularly the emerging brand of ransomware, Osiris.

Before you start to panic over a new type of ransomware, you should know that Osiris is a particular strain of the Locky ransomware. The only difference seems to be the file extension for the encrypted files, which is “.osiris.” The main takeaway from this event is that sometimes even the good guys don’t have what it takes to protect themselves from unfortunate events--a truth all-too-painfully real for a business owner.

This type of ransomware attack started off just like any other. Out of nowhere, the police were shown a message that claimed their files had been locked down, with paying a fee of $4,000 being the only way of recovering them. The cause for this ransomware was a spoofed email that claimed to be from another part of the police department. In an attempt to get rid of the ransomware, the police followed what’s commonly called a best practice for this type of situation: restore a backed-up copy of the server’s data.

Unfortunately for them, the backup that they tried to restore from had also been infected, as it was taken after the systems were infected with the ransomware.

As you can imagine, this caused quite a bit of trouble for the Cockrell Police Department. Included in the encrypted files were photographic and video evidence that could have been used in the prosecution of criminals. Whether or not this particular instance will mean anything for legal battles in the future is yet to be determined, but it sure is convenient for those who are involved with them.

What this shows us is that ransomware is a threat for anyone who relies on data to perform their daily duties, businesses notwithstanding. A ransomware attack at the wrong time could be enough to completely upend operations, and it forces you to reconsider your approach to cybersecurity. You need to consider every single user of your email solution is a potential outlet of a ransomware attack. It also emphasizes the importance of keeping current backups archived in an off-site location so that you can guarantee you won’t be put in the same situation as these police officers.

If your business wants to take a stand against ransomware, 4IT can serve and protect you. We can help you implement spam-blocking solutions and security measures to keep ransomware from installing on your devices in the first place. Furthermore, we can help your employees know what to look for so that they don’t make the same mistakes as the Cockrell P.D. To learn more about network security, reach out to us at 305-278-7100.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 18 February 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Hackers Backup Productivity Business Management Hosted Solutions Managed Service Provider Google Malware Business IT Services Efficiency Windows IT Support Disaster Recovery Innovation Business Continuity Hardware Workplace Tips VoIP Mobile Devices User Tips Saving Money Computer Miscellaneous Virtualization Windows 10 Network Security Upgrade Mobile Device Management Data Server Email communications Mobile Computing Alert Network Save Money Microsoft Office Communication Small Business Social Media Quick Tips Smartphone Information Technology Smartphones BYOD Going Green Managed IT Services Mobile Office Outsourced IT Apps Health Android Office Browser Gadgets Operating System Chrome Application Ransomware Cybersecurity WiFi Mobility Holiday Firewall The Internet of Things Avoiding Downtime Productivity Disaster Managed IT Tablet History Search Best Practice Data Management Cybercrime Data Recovery Remote Computing Passwords Telephone Systems Unified Threat Management IT Solutions Data Backup Spam BDR Risk Management Hacking Remote Monitoring VPN Apple Facebook Employer-Employee Relationship Budget Vendor Management Marketing Hard Drives Automation Saving Time User Error iPhone Customer Relationship Management Law Enforcement Collaboration Phishing Wireless Technology Password Hosted Solution Computers Money Big Data Content Filtering Recovery Phone System Proactive IT Office Tips Wearable Technology Intranet Work/Life Balance Lithium-ion battery Antivirus Maintenance PowerPoint Shortcut Virus Office 365 Social Current Events Vulnerability Telephony Printer Bring Your Own Device USB Analytics Encryption Gmail Router Humor Government Administration Audit HaaS Bandwidth Printer Server Business Intelligence Laptop OneNote Users Windows 8 Politics Personal Information Education Social Engineering Trending Net Neutrality Wireless Unsupported Software Private Cloud Tech Support Cloud Computing Google Drive Outlook Point of Sale IT COnsultant Save Time Data Security Computer Repair App Data Protection SaaS Flexibility Cost Management Social Networking Samsung Travel Wi-Fi Artificial Intelligence Emergency IT Support Update Customer Service Efficency Biometrics Applications Windows 10 Retail Virtual Reality hacker Meetings Transportation Data Loss Display Computer Care Battery Instant Messaging Robot Emails Data Storage HIPAA Redundancy Augmented Reality Automobile Entertainment Network Congestion Paperless Office Benefits End of Support DDoS Computer Accessories Fax Server Help Desk Data Breach Mouse Internet Exlporer Compliance Workplace Streaming Media Internet of Things Identity Theft Two-factor Authentication Solid State Drive Managing Stress Uninterrupted Power Supply Excel Sports online currency PDF User Cortana Surge Protector CrashOverride Television IT Management Scalability Science Files 3D Printing Presentation Project Management Word data breach Virtual Desktop Bluetooth Text Messaging Best Available Legislation Safety Settings WIndows Server 2008 IT Technicians How To Chromecast MSP Upgrades Windows Ink Hard Drive risk management SharePoint ISP Training Patch Management Administrator Uograde Consultant Google Maps Images Colocation Teamwork Programming Blogging The Blindside Of Commerce Company Culture Regulation Black Market Access Busines Continuity Near Field Communication Touchscreen Software as a Service Networking Website IT Security Cleaning Sync IT consulting Experience iOS Human Resources Running Cable Avoid Downtime OneDrive Keyboard Managed IT Service Adobe Wiring Managed IT Services Amazon Reliable Computing Information Co-managed IT Google Docs Music Computer Fan Hiring/Firing Debate Licensing Bloatware Data storage Microsoft Excel Lifestyle Books Dark Web Smart Technology Screen Mirroring Video Games Ebay Document Management Computing Branding Advertising File Sharing Cast Distributed Denial of Service Legal Mobile Device Windows 10s Touchpad WIndows 7 Nokia systems Managed Security Nanotechnology Scam eWaste Storage Inbound Marketing Regulations Tablets Hard Disk Drive hack Root Cause Analysis Twitter Employer Employee Relationship HBO Value Cameras NFL Worker Commute best practices Operating Sysytem Domains Electronic Medical Records WannaCry IT Budget Evernote Reputation Comparison Gift Giving Microblogging Youtube Workers Blockchain Buisness Specifications Sales Updates Identities Managed Service Provder Conferencing Webinar Shadow IT Microsoft Word Relocation Gifts Device Security Devices Webinar Credit Cards Spyware Mobile IT solutions FAQ Fraud Professional Services Tutorial Charger Edge Taxes IT service Wireless Charging Ciminal Supercomputer