Dallas-Area Police Department Rocked By Ransomware Attack, Loses Years Of Critical Video Evidence

Hacker
Police are supposed to catch criminals; not become the victims of their antics. However, one Texas police department is finding out the hard way that ransomware is a big problem, as one of its employees fell for one of the oldest tricks in the [computer hackers’] playbook.

According to a local news report, someone from within the department clicked on an email that featured a cloned address, thinking that it originated from someone within the department. However, all it did was open up the department’s computer network to a ransomware attack.

Once the tainted email was accessed, malware weaved its way through the department network, encrypting files in the process. Once the malware did its dirty deed, an automated message then prompted the victims to pay $4,000 to recover the encrypted files. But here’s the kicker; the Cockrell Hill Police Department did have the ability to backup their computers, but for some reason, automatic backups were not enabled until after the ransomware hit. This means that the files that were backed up were still encrypted.

"This was not a hacking incident," said Cockrell Hill Police Chief Stephen Barlag. "No files or confidential information was breached or obtained by any outside parties."

encrypted files

After consulting with the FBI, Barlaq decided not to pay the ransom, as there was no guarantee that the files would be returned in a usable state. “[The FBI] told us that some people whose files are infected pay, and they get their files back, but sometimes it doesn’t work. So we decided it was not worth it to pay, and potentially, not get anything back anyway.”

So, what did the department do? It completely wiped the computers servers and started over from scratch, losing all of the valuable information that stored on them in the process. While that is definitely a scorched earth approach that gives the ransomware writers nothing in return, those servers stored evidence that pertained to ongoing criminal cases. So, that information could be critical in putting a true criminal behind bars or exonerating an innocent individual. In this case, video evidence was among the files that were encrypted (and subsequently wiped clean).

"It makes it incredibly difficult if not impossible to confirm what's written in police reports if there's no video," stated J. Collin Beggs, a criminal defense attorney representing a client affected by this turn of events. "The playing field is already tilted in their favor enormously and this tilts it even more."

Ransomware attacks have picked up in frequency over the past few years, with hackers often targeting hospitals, where access to critical patient records and information can be a matter of life and death. Hackers likely reason that hospitals would be willing to fork over large sums of money to quickly regain access to their files.

Brandon Hill

Brandon Hill

Brandon received his first PC, an IBM Aptiva 310, in 1994 and hasn’t looked back since. He cut his teeth on computer building/repair working at a mom and pop computer shop as a plucky teen in the mid 90s and went on to join AnandTech as the Senior News Editor in 1999. Brandon would later help to form DailyTech where he served as Editor-in-Chief from 2008 until 2014. Brandon is a tech geek at heart, and family members always know where to turn when they need free tech support. When he isn’t writing about the tech hardware or studying up on the latest in mobile gadgets, you’ll find him browsing forums that cater to his long-running passion: automobiles.

Opinions and content posted by HotHardware contributors are their own.