Categories: Ransomware

Atlanta Police Department Ransomware Incident leads to lost Years Worth of Police Car Dashcam Videos

The police department of Atlanta lost years of dashcam videos after the March ransomware attack that hit’s their computer systems.

Attackers encrypt their computer systems with SamSam ransomware strain and demand ransom of US$6,800 to unlock one computer or $51,000 to provide decryption keys for all the infected machines.

The incident affected several internal and external application such as web portal used to pay city bills and judiciary documents.

In an exclusive interview with The Atlanta Journal, the Atlanta Chief of Police Erika Shields told that the dashcam footage “is lost and cannot be recovered.”

Shields assured the public that her department investigatory files or other crucial evidence were not lost. Initially, the department had limited access to investigative files on its servers, but she said access was quickly restored.

The chief also said “the lost footage could compromise DUI cases if an officer’s testimony isn’t sufficient. It’s unclear how many investigations might be affected.”

She said the hack not compromised any other video sources such as police bodycam and none of the criminal case files were lost as it was stored on their servers.

The ransomware is a turnkey business for some criminals, and victims still pay the ever-increasing demands for ransom, it’s become a billion-dollar industry that shows no signs of going away anytime soon.

Taking regular backup is the best practice to defend against the ransomware and scanning your emails for malicious links, content, and attachment can reduce the risks of getting infected.

Also Read:

Police Department Infected Again by Ransomware Attack that Already Locked 1 Year of Work-Related Files

New Gandcrab Ransomware Attack Windows Users via Compromised Websites

SynAck Ransomware Attack Using Sophisticated Process Doppelgänging Technique to Bypass the AV Detection

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate search…

13 hours ago

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as the…

13 hours ago

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains, posing…

14 hours ago

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty ransomware,…

14 hours ago

RansomHub Ransomware Group Hits 84 Organizations as New Threat Actors Emerge

The RansomHub ransomware group has emerged as a significant danger, targeting a wide array of…

14 hours ago

Threat Actors Leverage Email Bombing to Evade Security Tools and Conceal Malicious Activity

Threat actors are increasingly using email bombing to bypass security protocols and facilitate further malicious…

1 day ago