News

1/30/2017
09:20 AM
50%
50%

Texas Police Unit Loses Years Of Evidence To Ransomware

Police in Cockrell Hill, Tex., lost eight years of documents, photos, and videos when a ransomware attack corrupted files on its server.

The server of a police department in Cockrell Hill, Tex., was recently the victim of ransomware. The attack wiped out eight years worth of evidence, including Microsoft documents, photos, body camera video, in-house surveillance video, and in-car camera video, reports BleepingComputer. Officials said they were unsure how this loss would affect ongoing investigations, but few prosecutions are expected to suffer.

Data lost in the attack dates back to 2009, the department reported. Information stored on CDs and DVDs remains intact, but officials are more concerned about data that relates to ongoing investigations.

The hackers used an email with a spoofed address to infect the system and demanded $4,000 to unlock the files. After consulting the FBI, the police ignored the demand. Instead, they wiped the server clean and reinstalled everything.

Although the police claimed to have been attacked by OSIRIS virus, BleepingComputer says the ransomware used was possibly a new version of Locky, which affixes the ".osiris" extension at the end of infected files.

Click here for full story.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
More Than Half of Users Reuse Passwords
Curtis Franklin Jr., Senior Editor at Dark Reading,  5/24/2018
Is Threat Intelligence Garbage?
Chris McDaniels, Chief Information Security Officer of Mosaic451,  5/23/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11506
PUBLISHED: 2018-05-28
The sr_do_ioctl function in drivers/scsi/sr_ioctl.c in the Linux kernel through 4.16.12 allows local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact because sense buffers have different sizes at the CDROM layer and the SCSI layer.
CVE-2018-11507
PUBLISHED: 2018-05-28
An issue was discovered in Free Lossless Image Format (FLIF) 0.3. An attacker can trigger a long loop in image_load_pnm in image/image-pnm.cpp.
CVE-2018-11505
PUBLISHED: 2018-05-26
The Werewolf Online application 0.8.8 for Android allows attackers to discover the Firebase token by reading logcat output.
CVE-2018-6409
PUBLISHED: 2018-05-26
An issue was discovered in Appnitro MachForm before 4.2.3. The module in charge of serving stored files gets the path from the database. Modifying the name of the file to serve on the corresponding ap_form table leads to a path traversal vulnerability via the download.php q parameter.
CVE-2018-6410
PUBLISHED: 2018-05-26
An issue was discovered in Appnitro MachForm before 4.2.3. There is a download.php SQL injection via the q parameter.