Categories: Ransomware

Police Department Infected Again by Ransomware Attack that Already Locked 1 Year of Work Related Files

Ransomware attack again took place on Riverside, Texas Police department computer server that already lost around 10 months of sensitive data by previous ransomware attack.

Ransomware has been locked the files and also it delete some of the files which was stored in the infected computer server.

U.S. Secret Service agents involved in this case and the investigation has been conducted on the infected servers.

First Ransomware attack has been reported on April 23 that cause police officials unable to access about a year’s worth of files.

The second attempt of this ransomware attack has been discovered on may 4  and now the US Secret Service agents started the further investigation.

Riverside officials have determined that it was unclear how this attack has been taken place and they planned to meet May 15 with the city’s third-party information technology company.

Ransomware Attack Motivation

Cyber Criminals infect the police department computer server via Email based infection vectors and demand to pay ransom amount in bitcoin.

Riverside Carpenter said, “We’re still trying to get to the bottom of how the attack was initiated and the recent virus attacked the city’s server Friday afternoon and erased about eight hours worth of data.”

During the first attack that happened on April 23 cause, many of the sensitive files were not able to access.

In this case, Officials said, “Everything was backed-up, but we lost about eight hours worth of information we have to re-enter,” he said. “It was our police and fire records, so we just re-enter the reports.”

Infected files contain the host of personal data about individuals — victims, suspects, witnesses and police officers themselves and also some of the other personal information such as include Social Security numbers, birth dates, addresses, insurance policy numbers, medical information.

You can read the complete Ransomware Attack Response and Mitigation Checklist to protect yourself from ransomware attacks.

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Google Issues Warning on Phishing Campaigns Targeting Higher Education Institutions

Google, in collaboration with its Mandiant Threat Intelligence team, has issued a warning about a…

6 hours ago

TgToxic Android Malware Updated it’s Features to Steal Login Credentials

The TgToxic Android malware, initially discovered in July 2022, has undergone significant updates, enhancing its…

6 hours ago

Hackers Exploiting Cisco Small Business Routers RCE Vulnerability Deploying Webshell

A critical remote code execution (RCE) vulnerability, CVE-2023-20118, affecting Cisco Small Business Routers, has become…

6 hours ago

Malicious npm Package Targets Developers for Supply Chain Attack

The Socket Research Team has uncovered a malicious npm package@ton-wallet/create designed to steal sensitive cryptocurrency…

7 hours ago

New Auto-Color Malware Attacking Linux Devices to Gain Full Remote Access

Researchers at Palo Alto Networks have identified a new Linux malware, dubbed "Auto-Color," that has…

7 hours ago

Lumma Stealer Malware Delivered Through Weaponized Files Disguised as Videos

The Lumma Stealer malware, a sophisticated infostealer, is being actively distributed through malicious files disguised…

7 hours ago