• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • January 19th, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Security
Malware

Police Dept. in Massachusetts Paid Crypto-Malware Ransom to Retrieve Files

April 12th, 2015 Waqas Cyber Crime, Malware 0 comments
Police Dept. in Massachusetts Paid Crypto-Malware Ransom to Retrieve Files
Share on FacebookShare on Twitter

Ransomware equipped with encryption capabilities has been victimizing police departments rather indiscriminately nowadays.

Although paying ransom to hackers is not recommended because it encourages cybercriminals to continue adopting these measures to obtain money via blackmailing but in order to avoid losing data that has been encrypted through malware activity is next to impossible.

The only remedy is to create regular backups but apparently Tewksbury Police Department couldn’t maintain the backup and therefore, when ransomware penetrated its systems, the entire system became useless.

  • Must Read: New crypto-ransomware encrypts files then disguises them as quarantined

In December 2014, the town of Tewksbury learned it the hard way when the police had to pay ransom to retrieve the data encryption key from the hackers.

The hackers then asked for €460/$500 in bitcoins and they received the fee they demanded. Through the hidden Command and Control (C&C) services of TOR and by asking for the ransom in digital currency that’s hard to track, the hackers ensures safe profit for themselves.

Evidently, one of the officers fall prey to phishing, which is amongst the most commonly adopted tricks in the online scam methodologies, and opened an infected email attachment that ultimately got the crypto-malware installed on the computer system.

  • Must Read: Famous Games Hijacked for Ransom Through TeslaCrypt Ransomware

Soon after installation, routines of malware were deployed that led to encryption of the biggest data server used by the police.

It is reported that the threat is a variant of Cryptolocker but it also can be from any of the families that over the past year had been detected, that is, TorrentLocker, CryptoWall and TeslaCrypt. All of these include powerful, public-key encryption that depends on a public key for encryption but a private key for decryption.

massachusetts-police-dept-paid-crypto-malware-ransom-to-retrieve-documents

An example of browser locking for Ransomware.

Due to the infection, all the essential data such as arrest logs, motor vehicle matters, service calls and all sorts of records that the police required to conduct their day-to-day professional activities were locked.

This jamming of data could have been avoided it the police department had maintained an up-to-date data backup and had relied upon a fool-proof backup plan. Conversely, the police ignored this requirement and did not create updated backup copies nor did they store data at a location that was isolated from the regular network. The latest copies of recoverable files were created almost 18 months before the incident occurred.

Must Read: Romanian Man Kills 4 Year Old Son, commits Suicide After Police Ransomware Tells Him He Must Pay Fine

According to police chief, Timothy Sheehan, “nothing was lost,” informing the state of stored data on police computers. Nonetheless, once again the services of cybercriminals were required to teach law enforcement a lesson that the cyber security community has been preaching ever since crypto-malware emerged.

This is not the first time when a police department in the United States has to pay ransomware in order to get hold of their own documents. Last month Midlothian Village, Illinois, Police Department became the target of ransomware having file-encryption capabilities and hence, the department had to give in to the demands of the hackers for retrieving sensitive police records.

Follow @HackRead

  • Tags
  • Crypto-Malware
  • Cybercriminals
  • Malware
  • Phishing
  • Police
  • Ransomware
  • security
  • USA
Facebook Twitter LinkedIn Pinterest
Previous article OpIsrael: Anonymous Hacks Israeli Arms Importer Website, Leaks Thousands of Login Data
Next article 'Great Cannon' of China Blocks Websites Like No One Else Can
Waqas

Waqas

I am a UK-based cybersecurity journalist with a passion for covering the latest happenings in cyber security and tech world. I am also into gaming, reading and investigative journalism

Related Posts
Online scams: How to give scammers a taste of their own medicine

Online scams: How to give scammers a taste of their own medicine

Infamous cybercrime, carding market Joker's Stash is shutting down

Infamous cybercrime, carding market Joker's Stash is shutting down

Facebook sues developer of data scraping extensions for Chrome

Facebook sues developer of data scraping extensions for Chrome

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
Hackers compromised IObit forum to spread DeroHE ransomware
Hacking News

Hackers compromised IObit forum to spread DeroHE ransomware

52
X-rated social media app Fleek exposed explicit photos of users
Leaks

X-rated social media app Fleek exposed explicit photos of users

67
Top learning management system (LMS) software for small businesses
Technology News

Top learning management system (LMS) software for small businesses

584

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us