Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

These Police Officers Called for Backup... and it was Infected with Ransomware

These Police Officers Called for Backup... and it was Infected with Ransomware

The police exist to serve, protect, and enforce the law, but who can we turn to if even the cops are made victim of a cyberattack? This is the question the residents of Cockrell, Texas have to answer, as their police department fell victim to a ransomware attack known as the Osiris Ransomware.

Before you start to worry too much about this terrible new strain of ransomware, you should know that “Osiris” has been identified as a recent version of the Locky ransomware. The police department likely only referred to it as “Osiris” due to their encrypted files all sporting the extension “.osiris.”

This began as many ransomware attacks do; an on-screen message notified the police that their files had been locked, and would only be unlocked if the department paid up the demanded $4,000. As happens far too often, the ransomware was introduced into their system when a member of the department opened a spoofed email that appeared to be an official department communication. In keeping to best practices, the police’s IT department elected to restore the infected server’s files from a backup.

Unfortunately, the backup they had to restore from was taken after their systems had been infected, meaning that all they had were more locked and infected files.

This caused Cockrell authorities no small amount of trouble, as the encrypted files included years and years of photographic and video evidence to be used to prosecute cases. Time will only tell how much of an impact this will have on legal proceedings.

These events serve as a warning to all who rely on data in order to do their job, including businesses everywhere. It is essential to remember that your security is only as good as the people who are given access to your data. Furthermore, it reinforces the importance of keeping more than just one backup of your system. Backing up incrementally, and storing archived backups off site will usually safeguard a business from having the entire backup corrupted in the event of ransomware like this.


Reach out to us at 866-348-2602 so we can optimize your IT to protect you against ransomware and other critical issues.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 06 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications IT Support Business Continuity Smartphones Communication Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Quick Tips Cybersecurity Users Business Management Phishing Windows Managed IT Services Upgrade Outsourced IT Ransomware Data Backup Windows 10 Save Money Cloud Computing Office Data Recovery Server Passwords Windows 10 Tech Term Chrome Virtualization Saving Money Holiday Gadgets Social Media Microsoft Office Managed IT Services Automation Managed Service Operating System Cybercrime Computers Facebook Artificial Intelligence Hacking Health BYOD Internet of Things Mobile Device Management Networking IT Support Wi-Fi Managed Service Provider Spam Remote Office 365 Telephone Systems Alert Information Information Technology Covid-19 Recovery Employer-Employee Relationship Social Engineering Mobility Router BDR Bandwidth Password Big Data Money Human Resources Encryption Applications Remote Monitoring Mobile Computing Law Enforcement Application Data Breach App History Apps How To Remote Computing Mobile Office Data Storage Patch Management Government Blockchain Private Cloud Office Tips Paperless Office Training Managed IT VPN Data Security Work/Life Balance Settings Infrastructure Voice over Internet Protocol Two-factor Authentication Flexibility Mouse Google Drive Marketing HaaS WiFi IT solutions Vulnerability Entertainment Avoiding Downtime Windows 7 Website Budget Word Servers Wireless Bring Your Own Device Gmail Data Management Cleaning Firewall Employee/Employer Relationship RMM End of Support Virtual Reality Apple Education Physical Security Safety Social Data Protection Sports HIPAA Redundancy User Error Conferencing Keyboard Meetings Scam USB Risk Management Hacker Staff Vendor Management Software as a Service Telephone System Vendor Save Time Machine Learning The Internet of Things Lithium-ion battery Managed Services Display Connectivity Remote Work Customer Service Current Events Identity Theft Computing Infrastructure Going Green Telephony Environment Samsung Hard Drive Fax Server Augmented Reality Value Battery Computing Shadow IT SaaS Fraud Electronic Medical Records Virus Legal Spam Blocking Remote Worker Unified Threat Management Internet Exlporer Hiring/Firing Computer Accessories Network Congestion Cryptocurrency eWaste PDF Digital Signage Comparison Proactive IT CES Printer Best Practice Wearable Technology Business Intelligence Bluetooth Procurement YouTube Net Neutrality Retail Hard Drives Workplace Strategy Audit Instant Messaging Content Management Worker Black Market Business Technology Help Desk IT Management Robot Access Control Excel Printing Biometrics Botnet Virtual Assistant IT Plan IT Consultant Virtual Desktop Authentication Document Management Solid State Drive Wireless Technology How to Downtime Managed Services Provider DDoS Unsupported Software Humor Database Charger Update Data storage SharePoint Remote Workers Automobile Compliance OneNote Computer Care Google Docs Processor Managed IT Service Administrator Security Cameras Devices Computer Tips Virtual CIO Two Factor Authentication OneDrive Biometric Security Enterprise Content Management Netflix Best Available MSP Root Cause Analysis WIndows 7 Accountants Peripheral Reputation Streaming Media Antivirus Using Data Tech Support Microchip HBO Thought Leadership Knowledge Windows 8 Content Credit Cards Digital Security Cameras Music Password Manager Techology Copiers Laptop 5G Skype IT service Password Management Data loss Multi-Factor Security Quick Tip Customers Search Engine Smartwatch Outlook Twitter Leadership Tablet Audiobook Ergonomics Troubleshooting Business Mangement Development Touchpad OLED Start Menu Domains NIST Screen Mirroring User Smart Tech Loyalty PowerPoint Trending PCI DSS Windows Media Player Virtual Machine Advertising Fiber Optics IaaS Employee Frequently Asked Questions Maintenance Addiction Politics Amazon 2FA Books Bloatware Recycling Messaging Cabling Mobile Windows 10s Notifications Wiring Cast Managing Stress Practices Policy Hypervisor Trend Micro Tip of the week Cache webinar Tablets Amazon Web Services Dark mode Emergency Entrepreneur Criminal Employer Employee Relationship Cameras SMS Default App Professional Services Safe Mode Public Cloud GDPR Hosted Computing Assessment Procedure Relocation Saving Time Shopping Google Search Windows Server 2008 Shortcut Wireless Internet Online Shopping dark theme Cost Management Video Games AI IT Infrastructure Tools File Sharing Camera Bing Social Networking Inventory Television Worker Commute Specifications FinTech Social Network Wire Experience Evernote Printer Server Scalability Travel Investment Running Cable Printers Public Computer Business Owner Millennials Employees Employee/Employer Relationships Transportation NarrowBand ISP Regulations Smart Office Memory Wireless Charging Windows 365 Computer Fan Rootkit Search Video Conferencing ROI Virtual Private Network Shortcuts Workforce Sales iPhone Bitcoin Benefits Personal Cryptomining Workers Cables Point of Sale FENG Supply Chain Management Project Management Nanotechnology IBM Science Telecommuting Monitoring Files Batteries Windows 8.1 Smart Technology Digitize Chromecast Flash Cortana Digital Signature Windows Server 2008 R2 Uninterrupted Power Supply Distributed Denial of Service Warranty Software Tips Customer Relationship Management Supercomputer Customer relationships Colocation Email Best Practices IT Assessment Manufacturing Sync HVAC Emails Consultant Analyitcs Google Apps Programming Analysis Analytics Monitor

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code