Thursday, March 28, 2024

Atlanta Police Department Ransomware Incident leads to lost Years Worth of Police Car Dashcam Videos

The police department of Atlanta lost years of dashcam videos after the March ransomware attack that hit’s their computer systems.

Attackers encrypt their computer systems with SamSam ransomware strain and demand ransom of US$6,800 to unlock one computer or $51,000 to provide decryption keys for all the infected machines.

The incident affected several internal and external application such as web portal used to pay city bills and judiciary documents.

In an exclusive interview with The Atlanta Journal, the Atlanta Chief of Police Erika Shields told that the dashcam footage “is lost and cannot be recovered.”

Shields assured the public that her department investigatory files or other crucial evidence were not lost. Initially, the department had limited access to investigative files on its servers, but she said access was quickly restored.

https://twitter.com/_myAJC/status/1002814121958690816

The chief also said “the lost footage could compromise DUI cases if an officer’s testimony isn’t sufficient. It’s unclear how many investigations might be affected.”

She said the hack not compromised any other video sources such as police bodycam and none of the criminal case files were lost as it was stored on their servers.

The ransomware is a turnkey business for some criminals, and victims still pay the ever-increasing demands for ransom, it’s become a billion-dollar industry that shows no signs of going away anytime soon.

Taking regular backup is the best practice to defend against the ransomware and scanning your emails for malicious links, content, and attachment can reduce the risks of getting infected.

Also Read:

Police Department Infected Again by Ransomware Attack that Already Locked 1 Year of Work-Related Files

New Gandcrab Ransomware Attack Windows Users via Compromised Websites

SynAck Ransomware Attack Using Sophisticated Process Doppelgänging Technique to Bypass the AV Detection

Website

Latest articles

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...

Hackers Actively Exploiting Ray AI Framework Flaw to Hack Thousands of Servers

A critical vulnerability in Ray, an open-source AI framework that is widely utilized across...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles