Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Sheriff's department files held for ransom by malware
Odd_News ^ | Nov. 13, 2014 | Ben Hooper

Posted on 11/14/2014 7:01:23 AM PST by Brother Cracker

DICKSON, Tenn., - A Tennessee sheriff's department said it paid more than $500 ransom to release files locked away by malicious software accidentally downloaded into the system.

Detective Jeff McCliss, IT director for the Dickson County Sheriff's Office, said the "Cryptowall" program was installed into the department's computer system in late October when someone streaming local radio station WDKN accidentally clicked on a rotating ad that had been infected with the malware.

McCliss and Sheriff Jeff Bledsoe said Cryptowall put a lock on the department's case folder and demanded $572 worth of anonymous online currency Bitcoins to unlock the files.

"Every sort of document that you could develop in an investigation was in that folder. There was a total of 72,000 files," McCliss told WTVF-TV.

McCliss said he consulted with experts including those affiliated with the FBI and the military, but the consensus was the only way to unlock the files was to pay.

The payment was made to a person identified only as "Nimrod Gruber."

"Although a substantial portion of the data encrypted on the report management server was able to be restored from backups, there were still approximately 72,000 files affected on the host computer, which introduced the malware to the network and the report management system and the attached drives," Bledsoe told the Dickson Herald.

Luke Vincent, information technology director for the town of Durham, N.H., said police in his town were targeted by a similar "ransomware" scheme, but officials decided not to pay. He said the affected files were "administrative" rather than "critical."

"We knew we were never going to pay that ransom," Vincent said. "We were able to restore all the files...so there was never a thought of paying the ransom in that case."

However, he said the town did end up spending about $3,000 to a contractor to help with "cleanup" following the breach.


TOPICS: Computers/Internet
KEYWORDS: malware
Navigation: use the links below to view more comments.
first 1-2021-22 next last


1 posted on 11/14/2014 7:01:23 AM PST by Brother Cracker
[ Post Reply | Private Reply | View Replies]

To: Brother Cracker

They need to hunt down who created this malware and summarily execute them.


2 posted on 11/14/2014 7:03:08 AM PST by dfwgator (The "Fire Muschamp" tagline is back!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Brother Cracker

That’s why you don’t let your users have local admin privileges.


3 posted on 11/14/2014 7:08:39 AM PST by miliantnutcase
[ Post Reply | Private Reply | To 1 | View Replies]

To: miliantnutcase

NoScript Security Suite

https://addons.mozilla.org/en-US/firefox/addon/noscript/


4 posted on 11/14/2014 7:12:54 AM PST by Brother Cracker (You are more likely to find krugerrands in a Cracker Jack box than 22 ammo at Wal-Mart)
[ Post Reply | Private Reply | To 3 | View Replies]

To: miliantnutcase

Small town departments aren’t bright enough to pay a consultant to come in for a week and streamline things to prevent accidents like this. And yes, limiting users to minimal privileges is in the top five things that ought to be done. I’d even lock down users to no more than thirty minutes a day of browsing.


5 posted on 11/14/2014 7:14:01 AM PST by pepsionice
[ Post Reply | Private Reply | To 3 | View Replies]

To: pepsionice

That’s an uncalled for insult of small town cops.


6 posted on 11/14/2014 7:18:05 AM PST by Balding_Eagle (Let's begin impeaching unconstitutional Leftist judges, and remove them from the bench.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Balding_Eagle

I’ll take the small town cops over larger departments any day of the week.


7 posted on 11/14/2014 7:20:26 AM PST by cripplecreek (You can't half ass conservatism.)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Brother Cracker

A brother of mine got a similar malware program on his home computer. The outift that made the malware even provided contact information and methods of payment needed to have the malware removed. He immediately contacted some tech people he uses sometimes. They said they had heard of that malware before and that Microsoft had been trying “to get” the outfit that makes it. To clean it off of his system, they were able to get all his personal files off and clean, but they had to reinstall Windows and all his programs.


8 posted on 11/14/2014 7:20:49 AM PST by Wuli
[ Post Reply | Private Reply | To 1 | View Replies]

To: dfwgator

They would probably have to go to Russia to find them.


9 posted on 11/14/2014 7:21:21 AM PST by Blood of Tyrants (Good Muslims, like good Nazis or good Communists, are terrible human beings.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Brother Cracker

also

http://www.freerepublic.com/focus/f-news/3226679/posts


10 posted on 11/14/2014 7:22:26 AM PST by don-o (He will not share His glory and He will NOT be mocked! Blessed be the name of the Lord forever!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Balding_Eagle

Pick out a state and look for a dozen departments of twenty to forty personnel. Ask them if they back up their data daily. Ask them if they have a dual-storage policy. Ask them about the legit anti-virus software package they are using and if they actually paid for it. Ask about their firewall. Ask about the number of viruses they encounter on a weekly basis. As a minimum....I would hope they’ve hire some semi-smart geeky guy who will at least give them minimum protection. But no one is standing there and to audit or force them to take protective measures. And a big mess occurs every two or three months...how many hours do they waste trying to recover from their mess....which they never seem to realize that they need a good technician, stringent rules on back-ups, and absolutely limit users to only basic functions in support of their jobs.


11 posted on 11/14/2014 7:26:25 AM PST by pepsionice
[ Post Reply | Private Reply | To 6 | View Replies]

To: don-o

Good. You can’t warn people about about taking security measures for their computers.


12 posted on 11/14/2014 7:53:03 AM PST by Brother Cracker (You are more likely to find krugerrands in a Cracker Jack box than 22 ammo at Wal-Mart)
[ Post Reply | Private Reply | To 10 | View Replies]

To: don-o

You can’t warn people enough


13 posted on 11/14/2014 8:01:54 AM PST by Brother Cracker (You are more likely to find krugerrands in a Cracker Jack box than 22 ammo at Wal-Mart)
[ Post Reply | Private Reply | To 10 | View Replies]

To: Brother Cracker

No script is a must have.


14 posted on 11/14/2014 8:31:08 AM PST by miliantnutcase
[ Post Reply | Private Reply | To 4 | View Replies]

To: Brother Cracker
"Vicious Malware Canine Culprits Capture Cop Computers"

A team of highly skilled dog criminals have been wreaking havoc on local law enforcement departments by planting a computer virus on their computers. The pilfering pooches then demand a reward in order to free up the computer. In a statement to the press, the dog team's leader claims they are taking these actions as a result of officer's unreasonable shooting of dogs. For additional information, please visit: www.pawsupdontshoot.com.


15 posted on 11/14/2014 9:09:53 AM PST by moovova
[ Post Reply | Private Reply | To 1 | View Replies]

To: Brother Cracker

Stop browsing pornsites and these issues go away.


16 posted on 11/14/2014 4:46:18 PM PST by Rodamala
[ Post Reply | Private Reply | To 1 | View Replies]

To: Rodamala

Malicious ads on major websites held users’ files to ransom

http://www.engadget.com/2014/10/24/cryptowall-ransomware-attack-proofpoint-report/


17 posted on 11/14/2014 5:01:17 PM PST by Brother Cracker (You are more likely to find krugerrands in a Cracker Jack box than 22 ammo at Wal-Mart)
[ Post Reply | Private Reply | To 16 | View Replies]

To: miliantnutcase
That’s why you don’t let your users have local admin privileges.

That is a good not just for computers on a business network but also for your home PC. I have my computer set up (Windows 7) with an account for full administrator access rights but that requires a strong password to log into and I change it regularly and I never, ever, ever surf the net or even login as the admin unless absolutely necessary. For daily use including getting on the internet or checking my email, I log into a “guest” account set up with absolutely no admin rights and that log on requires a different log on password.

Anytime I get a request for a software update installation such as for Adobe or Java or try to download and or install a program or make any system setting changes, etc. while logged in as the non-admin guest, I will get prompted for the admin password.

This is of course not 100% foolproof I know, but it helps.

18 posted on 11/14/2014 6:04:28 PM PST by MD Expat in PA
[ Post Reply | Private Reply | To 3 | View Replies]

To: Brother Cracker
Stop browsing pornsites and these issues go away.

Malicious ads on major websites held users’ files to ransom

And you can pick up some very nasty malware from emails, emails that “may” sometimes look very legitimate.

I am the payroll and HRIS manager for the company I work for and yesterday morning an employee forwarded an email just as described in the two links below.

http://www.threattracksecurity.com/it-blog/adp-past-due-invoice-spam/

http://www.adp.com/who-we-are/data-security-and-privacy/security-alerts/gso-security-alert-adp-past-due-invoice-082714.aspx

Fortunately she realized it was suspect especially since she is in sales and not in accounts payable and let me know right away without (hopefully) clicking on the links. I contacted our IT manager and let her know and then sent out a companywide email advising employees to be on the lookout for fraudulent emails purporting to be from ADP and the warning: DO NOT OPEN AND DO NOT CLICK ON THE LINKS, DELETE THE EMAIL AND IF YOU DID CLICK ON THE LINKS, NOTIFY IT IMMEDIATELY. (OK, I didn’t send in all caps but I did bold and underline : ), )

Unfortunately the timing of these phishing emails with their malware links comes at an especially bad time since we are having our annual benefits open enrollment and many employees who don’t regularly log into our ADP self service site are doing so right now and some having forgotten their passwords are requesting password resets and may mistakenly think this is actually from ADP.

19 posted on 11/14/2014 6:36:52 PM PST by MD Expat in PA
[ Post Reply | Private Reply | To 17 | View Replies]

To: Rodamala

I wonder what if it’s the same part of Tennessee as this cop...

https://www.youtube.com/watch?v=_1XyDXKyFAY


20 posted on 11/14/2014 6:41:14 PM PST by Joe 6-pack (Qui me amat, amat et canem meum.)
[ Post Reply | Private Reply | To 16 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-22 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson