Tuesday, February 27, 2024

Atlanta Police Department Ransomware Incident leads to lost Years Worth of Police Car Dashcam Videos

The police department of Atlanta lost years of dashcam videos after the March ransomware attack that hit’s their computer systems.

Attackers encrypt their computer systems with SamSam ransomware strain and demand ransom of US$6,800 to unlock one computer or $51,000 to provide decryption keys for all the infected machines.

The incident affected several internal and external application such as web portal used to pay city bills and judiciary documents.

In an exclusive interview with The Atlanta Journal, the Atlanta Chief of Police Erika Shields told that the dashcam footage “is lost and cannot be recovered.”

Shields assured the public that her department investigatory files or other crucial evidence were not lost. Initially, the department had limited access to investigative files on its servers, but she said access was quickly restored.

https://twitter.com/_myAJC/status/1002814121958690816

The chief also said “the lost footage could compromise DUI cases if an officer’s testimony isn’t sufficient. It’s unclear how many investigations might be affected.”

She said the hack not compromised any other video sources such as police bodycam and none of the criminal case files were lost as it was stored on their servers.

The ransomware is a turnkey business for some criminals, and victims still pay the ever-increasing demands for ransom, it’s become a billion-dollar industry that shows no signs of going away anytime soon.

Taking regular backup is the best practice to defend against the ransomware and scanning your emails for malicious links, content, and attachment can reduce the risks of getting infected.

Also Read:

Police Department Infected Again by Ransomware Attack that Already Locked 1 Year of Work-Related Files

New Gandcrab Ransomware Attack Windows Users via Compromised Websites

SynAck Ransomware Attack Using Sophisticated Process Doppelgänging Technique to Bypass the AV Detection

Website

Latest articles

Zyxel Firewall Flaw Let Attackers Execute Remote Code

Four new vulnerabilities have been discovered in some of the Zyxel Firewall and access...

Hackers Abuse Telegram API To Exfiltrate User Information

Attackers have been using keywords like "remittance" and "receipts" to spread phishing scripts using...

ThreatHunter.ai Stops Hundreds of Attacks in 48 Hours: Fighting Ransomware and Nation-State Cyber Threats

The current large surge in cyber threats has left many organizations grappling for security...

WordPress Plugin Flaw Exposes 200,000+ Websites for Hacking

A critical security flaw has been identified in the Ultimate Member plugin for WordPress,...

Hackers Actively Hijacking ConnectWise ScreenConnect server

ConnectWise, a prominent software company, issued an urgent security bulletin on February 19, 2024,...

Heavily Obfuscated PIKABOT Evades EDR Protection

PIKABOT is a polymorphic malware that constantly modifies its code, making it hard to...

Anonymous Sudan Promoting New DDoS Botnet: Beware

It has come to light that a group known as Anonymous Sudan is actively...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Live Account Takeover Attack Simulation

Live Account Take Over Attack

Live Webinar on How do hackers bypass 2FA ,Detecting ATO attacks, A demo of credential stuffing, brute force and session jacking-based ATO attacks, Identifying attacks with behaviour-based analysis and Building custom protection for applications and APIs.

Related Articles