Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

These Police Officers Called for Backup... and it was Infected with Ransomware

These Police Officers Called for Backup... and it was Infected with Ransomware

The police exist to serve, protect, and enforce the law, but who can we turn to if even the cops are made victim of a cyberattack? This is the question the residents of Cockrell, Texas have to answer, as their police department fell victim to a ransomware attack known as the Osiris Ransomware.

Before you start to worry too much about this terrible new strain of ransomware, you should know that “Osiris” has been identified as a recent version of the Locky ransomware. The police department likely only referred to it as “Osiris” due to their encrypted files all sporting the extension “.osiris.”

This began as many ransomware attacks do; an on-screen message notified the police that their files had been locked, and would only be unlocked if the department paid up the demanded $4,000. As happens far too often, the ransomware was introduced into their system when a member of the department opened a spoofed email that appeared to be an official department communication. In keeping to best practices, the police’s IT department elected to restore the infected server’s files from a backup.

Unfortunately, the backup they had to restore from was taken after their systems had been infected, meaning that all they had were more locked and infected files.

This caused Cockrell authorities no small amount of trouble, as the encrypted files included years and years of photographic and video evidence to be used to prosecute cases. Time will only tell how much of an impact this will have on legal proceedings.

These events serve as a warning to all who rely on data in order to do their job, including businesses everywhere. It is essential to remember that your security is only as good as the people who are given access to your data. Furthermore, it reinforces the importance of keeping more than just one backup of your system. Backing up incrementally, and storing archived backups off site will usually safeguard a business from having the entire backup corrupted in the event of ransomware like this.


Reach out to us at 866-348-2602 so we can optimize your IT to protect you against ransomware and other critical issues.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Google Business Internet Microsoft Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications Smartphones Communication Business Continuity IT Support Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Quick Tips Cybersecurity Users Business Management Phishing Upgrade Managed IT Services Windows Data Backup Outsourced IT Ransomware Windows 10 Cloud Computing Office Data Recovery Server Save Money Windows 10 Passwords Chrome Virtualization Tech Term Gadgets Saving Money Holiday Social Media Microsoft Office Managed Service Managed IT Services Automation Operating System Computers Facebook Artificial Intelligence Cybercrime Hacking Internet of Things BYOD Mobile Device Management Wi-Fi Networking IT Support Health Information Spam Covid-19 Office 365 Telephone Systems Alert Information Technology Remote Managed Service Provider Social Engineering Mobility Router BDR Bandwidth Recovery Employer-Employee Relationship Big Data Encryption Applications Remote Monitoring Law Enforcement Mobile Computing App History Application Password Money Human Resources Data Breach Mobile Office Government How To Office Tips Private Cloud Training Managed IT VPN Data Storage Patch Management Apps Blockchain Paperless Office Remote Computing Servers Mouse HaaS Google Drive Infrastructure Data Security Flexibility Voice over Internet Protocol Avoiding Downtime Marketing WiFi IT solutions Wireless Entertainment Website Budget Gmail Bring Your Own Device Data Management Settings Work/Life Balance Vulnerability Windows 7 Word Two-factor Authentication Education Physical Security Machine Learning Social Vendor Management Safety Vendor Remote Work Connectivity HIPAA User Error Managed Services Sports Redundancy Display Meetings Keyboard Employee/Employer Relationship Risk Management RMM Hacker Data Protection The Internet of Things USB Save Time Lithium-ion battery Conferencing Cleaning Firewall Scam Virtual Reality Apple End of Support Telephone System Staff Software as a Service Network Congestion eWaste Managed Services Provider Internet Exlporer Unsupported Software Update Database PDF Charger Virus Remote Workers Google Docs Identity Theft Compliance Wearable Technology OneNote Processor Computer Care Unified Threat Management Proactive IT Computer Accessories Hard Drives Retail Current Events Instant Messaging Best Practice Telephony Robot Hard Drive Samsung YouTube Excel Black Market Augmented Reality Fraud Biometrics Virtual Desktop Value Printer Remote Worker Computing Bluetooth Document Management Spam Blocking Electronic Medical Records Cryptocurrency DDoS Solid State Drive Wireless Technology Downtime How to SharePoint Hiring/Firing Comparison Data storage Digital Signage IT Consultant Automobile CES Customer Service Environment Humor Computing Infrastructure Business Technology Content Management Business Intelligence Fax Server Procurement Going Green Net Neutrality Workplace Strategy Access Control Audit Worker Help Desk Virtual Assistant SaaS IT Management Battery Printing Authentication Botnet Shadow IT IT Plan Legal WIndows 7 Personal Telecommuting Workers Bloatware Cryptomining Benefits Project Management Point of Sale Nanotechnology Politics Supply Chain Management Cortana FENG Advertising Tablets Monitoring Digital Signature Batteries IBM Digitize Entrepreneur Smart Technology Notifications Warranty Windows 8.1 Flash HVAC Google Apps Windows Server 2008 R2 Customer relationships Analysis Software Tips Shortcut Supercomputer User IT Assessment Emails PowerPoint Relocation Cost Management Manufacturing Windows Media Player Administrator Email Best Practices Devices Sync Enterprise Content Management Social Networking Security Cameras MSP Computer Tips Accountants Video Games Managed IT Service Managing Stress Worker Commute OneDrive Credit Cards Netflix Biometric Security Two Factor Authentication Microchip Virtual CIO Thought Leadership Password Management Experience Running Cable Peripheral Password Manager Root Cause Analysis Cameras Memory Music Digital Security Cameras HBO Scalability Using Data Multi-Factor Security Knowledge Twitter Skype Business Owner Copiers 5G Search Engine NIST Quick Tip Business Mangement Data loss NarrowBand Trending Leadership Smartwatch Troubleshooting Ergonomics Smart Tech Outlook Search Addiction Start Menu Development Amazon iPhone OLED PCI DSS Recycling Screen Mirroring Virtual Machine Loyalty Science Fiber Optics Printer Server Employee Books Wiring 2FA Practices Frequently Asked Questions Cache Mobile Messaging Amazon Web Services Windows 10s Files Cabling Safe Mode Distributed Denial of Service Policy Criminal Cast Customer Relationship Management Hypervisor Chromecast Trend Micro webinar Analyitcs Emergency GDPR Dark mode Hosted Computing Tip of the week Wireless Internet Professional Services SMS Online Shopping Public Cloud Colocation Programming Default App Employer Employee Relationship Uninterrupted Power Supply File Sharing Procedure Saving Time Assessment Shopping Specifications Monitor Google Search Camera dark theme Inventory Windows Server 2008 Wire Tools Antivirus AI Evernote IT Infrastructure Bing FinTech Travel Television Windows 8 IT service Social Network Millennials Reputation Streaming Media Printers Smart Office Content Wireless Charging Investment Tech Support Laptop Tablet Employees Consultant Techology Employee/Employer Relationships Public Computer Domains Workforce Analytics Customers ISP Transportation Virtual Private Network Windows 365 Regulations Audiobook Video Conferencing Cables Computer Fan ROI Rootkit Touchpad Shortcuts IaaS Sales Best Available Maintenance Bitcoin

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code