4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Cops Lock Up Criminals, Ransomware Locks Up Cops

Cops Lock Up Criminals, Ransomware Locks Up Cops

Society relies on law enforcement to enforce laws in a fair and just manner, but even the police have their work cut out for them when they are targeted by a cyberattack. A recent incident in Cockrell, Texas shows that not even the police are immune to the threats of ransomware--particularly the emerging brand of ransomware, Osiris.

Before you start to panic over a new type of ransomware, you should know that Osiris is a particular strain of the Locky ransomware. The only difference seems to be the file extension for the encrypted files, which is “.osiris.” The main takeaway from this event is that sometimes even the good guys don’t have what it takes to protect themselves from unfortunate events--a truth all-too-painfully real for a business owner.

This type of ransomware attack started off just like any other. Out of nowhere, the police were shown a message that claimed their files had been locked down, with paying a fee of $4,000 being the only way of recovering them. The cause for this ransomware was a spoofed email that claimed to be from another part of the police department. In an attempt to get rid of the ransomware, the police followed what’s commonly called a best practice for this type of situation: restore a backed-up copy of the server’s data.

Unfortunately for them, the backup that they tried to restore from had also been infected, as it was taken after the systems were infected with the ransomware.

As you can imagine, this caused quite a bit of trouble for the Cockrell Police Department. Included in the encrypted files were photographic and video evidence that could have been used in the prosecution of criminals. Whether or not this particular instance will mean anything for legal battles in the future is yet to be determined, but it sure is convenient for those who are involved with them.

What this shows us is that ransomware is a threat for anyone who relies on data to perform their daily duties, businesses notwithstanding. A ransomware attack at the wrong time could be enough to completely upend operations, and it forces you to reconsider your approach to cybersecurity. You need to consider every single user of your email solution is a potential outlet of a ransomware attack. It also emphasizes the importance of keeping current backups archived in an off-site location so that you can guarantee you won’t be put in the same situation as these police officers.

If your business wants to take a stand against ransomware, 4IT can serve and protect you. We can help you implement spam-blocking solutions and security measures to keep ransomware from installing on your devices in the first place. Furthermore, we can help your employees know what to look for so that they don’t make the same mistakes as the Cockrell P.D. To learn more about network security, reach out to us at 305-278-7100.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 23 June 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft Internet Business Computing software Hackers Hosted Solutions Productivity Backup Business Management Managed Service Provider Business Malware Google IT Services Innovation Efficiency Windows IT Support Workplace Tips Hardware Disaster Recovery Saving Money Windows 10 Miscellaneous VoIP Business Continuity Upgrade Computer Virtualization Mobile Devices Data Mobile Computing User Tips Mobile Device Management Server Save Money Communication Network Network Security Quick Tips Information Technology Smartphones Going Green Mobile Office Alert Email Small Business Health Smartphone Social Media Microsoft Office BYOD communications Apps Office Gadgets Operating System Application Firewall Managed IT Services Disaster Android Ransomware Tablet Browser Mobility Search WiFi Holiday Chrome The Internet of Things Avoiding Downtime Passwords Remote Computing Unified Threat Management BDR Remote Monitoring History Automation Hacking Best Practice Data Management IT Solutions Vendor Management Outsourced IT Hard Drives Spam Saving Time Risk Management Telephone Systems Employer-Employee Relationship Budget Recovery Customer Relationship Management VPN Wireless Technology Office Tips Apple Facebook Productivity Big Data Marketing Cybercrime Phone System Maintenance Lithium-ion battery Collaboration PowerPoint Current Events Money Antivirus Bring Your Own Device Printer Social USB Content Filtering Password Managed IT Analytics Gmail Router Cybersecurity Computers Telephony Law Enforcement Humor Administration User Error Wearable Technology iPhone Bandwidth Printer Server Virus Laptop Users Windows 8 Education Wireless Trending HaaS Net Neutrality Cloud Computing Save Time Tech Support Phishing Encryption Point of Sale Social Engineering IT COnsultant Hosted Solution Proactive IT Work/Life Balance Computer Repair Government App Private Cloud Cost Management Intranet Social Networking Mouse hacker Personal Information Efficency Transportation Two-factor Authentication OneNote Managing Stress Computer Care Battery SaaS Robot Audit Unsupported Software Automobile End of Support Display Google Drive Shortcut Business Intelligence Internet Exlporer Augmented Reality Update Customer Service Paperless Office Biometrics Network Congestion Internet of Things Retail Identity Theft Virtual Reality Outlook Solid State Drive Help Desk Fax Server Flexibility Workplace Streaming Media Emails Instant Messaging Uninterrupted Power Supply Samsung online currency HIPAA Entertainment Benefits Office 365 DDoS Computer Accessories Consultant Windows 10 Applications 3D Printing Colocation Branding The Blindside Of Compliance Company Culture Black Market Distributed Denial of Service Access Touchscreen Vulnerability Politics Hard Drive ISP WIndows 7 IT Security Inbound Marketing Cleaning eWaste Regulations iOS Experience Uograde Images Programming Avoid Downtime Blogging Keyboard Value Excel Cameras Computer Fan Music Website User Hiring/Firing Data storage Science Virtual Desktop Presentation Dark Web Books OneDrive Video Games Bluetooth Best Available Smart Technology Travel Document Management IT Technicians Amazon Wiring Co-managed IT Data Backup Data Breach Information Advertising Legal SharePoint Mobile Device Windows 10s Debate Touchpad Nanotechnology Managed Security Scam Teamwork Ebay Busines Continuity Hard Disk Drive Computing Networking Near Field Communication Root Cause Analysis Data Protection Employer Employee Relationship Meetings Sports best practices Worker Commute Operating Sysytem PDF Human Resources IT consulting Nokia Scalability Running Cable Files data breach Text Messaging Reliable Computing Safety How To Chromecast Twitter Upgrades risk management Wi-Fi Bloatware Artificial Intelligence Surge Protector Emergency Training Administrator Television Gift Giving Shadow IT Microblogging Youtube Storage Relocation IT service Managed IT Services Sales Domains Managed Service Provder Webinar Webinar IT solutions Buisness Lifestyle Taxes Supercomputer CrashOverride Electronic Medical Records Tutorial IT Budget Reputation