• Cyber Security
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware File Recovery
    • Ransomware Types
  • Ransomware Services
    • Ransomware Removal
    • Ransomware File Recovery
  • News
  • Tutorials
  • Ransomware TV

Ransomware Hits Salisbury Police Department

February 6, 2019Simeon Georgiev

With their latest  shenanigans, cryptovirological operators have managed to disturb Salisbury, a peaceful cathedral city in Wiltshire, England, by targeting its Police Department. The administration came to know about an anomaly in the digital system of the department when some officers couldn’t access their email and filed complaints with the city’s Information Services. However, after initial shock and surprise, the Information Services experts declared that the city’s Police Department had been hit by a ransomware attack.

As soon as experts understood the nature of the cyber attack, they employed ransomware removal and containment measures. First of all, the experts isolated the infected workstations from the rest of the system to prevent the spread of cryptovirological infection.

The Administration Tried to Engage With the Attackers

Ransomware removal experts strongly advise against getting in negotiations with the perpetrators of the attack to get the decrypter. Salisbury city administration initially tried to engage with the attackers who were asking for an undisclosed amount of ransom to provide the decryption key. However, the negotiations immediately fell out and the administration commenced its ransomware removal activity.

This Is the Biggest Cyber Attack Faced by the SPD

In the last five years, Salisbury Police Department (SPD) experienced three cyber attacks, but all of them had been tackled before they could infect the network. On January 9, the cybersecurity measures employed by the department couldn’t stop the cryptovirological virus. Experts strongly believe that the ransomware attackers enabled to infiltrate the system through a malicious mail.

Backups Saved the Day

One can’t stress enough on the importance of data backups for neutralizing cryptovirological attacks.  SPD succeeded in recovering from the attack because all its critical data, like system files and criminal records, was backed up on regular basis.

In the attack, the email network, record management system and network servers took the hit. As a precautionary measure, the department immediately disconnected the network connections to state and national databases. According to cybersecurity experts, there is no evidence that the attackers have stolen or downloaded any of the affected files.

The Inevitable Reality of Downtime

Even though SPD was maintaining data backups, it still had to incur five-day downtime. The major digital operations of the department were up and running from January 11 and the entire restoration completed at January 14. This inevitability of downtime shows that taking up ransomware removal measures are really crucial in the wake of any cryptovirological attack, whether there are data backups or not.

SPD along with many other ransomware victim entities are working with the FBI to track down the attackers. It is important to mention here that the department hasn’t shared any details regarding which cryptovirological strain was used in the attack.

Simeon Georgiev
https://www.linkedin.com/in/simeon--georgiev/
I am a Cyber Security Enthusiast from Bulgaria. I like to write about malware and ransomware and global cyber attacks. You can reach me on Twitter @sgeorgiev1995 or Email: [email protected]
Previous post Experts Discover a New Variant of MongoLock Ransomware Next post Matrix Ransomware: A Growing Threat to Single Machines

Related Articles

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

January 27, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Ransomware: 4 Types of the Latest Trend in Cybercrimes

February 1, 2018Simeon Georgiev
Ransomware: 4 Types of the Latest Trend in Cybercrimes

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

February 1, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Latest on Ransomware TV

https://vimeo.com/399908876?loop=0

Recent Posts

  • How to protect your organization against ransomware reinfections
  • AuKill Helps Ransomware Operators Disable EDR and Security Tools
  • AI-ransomware is a real threat, just not a realistic one yet
  • Rorschach is the new speed king in the ransomware space
  • The Role of Supply Chain Breaches in Ransomware Attacks

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • Cyber Security
    • Ransomware File Recovery
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware Types
  • News
  • Tutorials

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

More

  • BECOME A CONTRIBUTOR

MonsterCloud Reviews

© 2020 MonsterCloud.com. All Rights Reserved.