Skip to main content

Hackers are giving police departments a hard time with ransomware

exploit
Image used with permission by copyright holder
Hackers are finding it easier than ever to compromise police departments’ systems and hold them hostage until the cops pay the hackers’ ransom fee, reports ABC News. In the meantime, the hackers have access to all the department’s files.

“Ransomware” is a term used when hackers gain entry into someone’s computer, encrypt documents found on the computer, and demand payment before a certain deadline. If the victims pay the hackers before the deadline expires, the victims are usually given a decryption key. Of course, even if you get the decryption key, your system could still be compromised.

Recommended Videos

However, some forms of ransomware simply restrict interaction with your computer until you shell out money to regain full interaction. No matter what the form of ransomware, though, the main goal is to extort money from victims. Ransomware is usually spread if the victim clicks on a suspicious link or downloads materials made to look like something legitimate.

According to ABC News, several Maine police agencies reported being hit by ransomware, while a police department in Tewksbury, Massachusetts had to pay $500 in order to get back its data. Unfortunately, Intel Security online safety expert Robert Siciliano said hackers have successfully carved out a niche targeting law enforcement, with no end in sight.

“It’s a multi-million dollar business,” said Siciliano. “They’re getting paid and they’re getting paid well.”

One way to deter ransomware is to simply not click on such suspicious links, but backing up your data in multiple locations will also go a long way. Unfortunately, it’s very easy to masquerade your message as a work email, so it’s always a good idea to be on guard.

Williams Pelegrin
Former Digital Trends Contributor
Williams is an avid New York Yankees fan, speaks Spanish, resides in Colorado, and has an affinity for Frosted Flakes. Send…
Razer mice could give hackers wide-open local access to your Windows PC
Razer Viper Ultimate Mouse

The security problems just keep coming for Windows. In the latest, a hacker has discovered that by simply using a Razer mouse, someone with bad intent who already has full physical access to your PC can run their own payloads and even abuse and enter the PowerShell command terminal.

A bit like the ongoing PrintNightmare vulnerability issue of injecting bad drivers via Point and Print, this new flaw has to deal with the way that Razer's gaming software works. Once a Razer mouse is plugged into a PC, Windows Update downloads and runs a "Razer installer" as a system process. This installer then allows hackers to open an elevated version of Windows Explorer to choose where to install drivers, and they can simply then open PowerShell by pressing the Shift and the right-click buttons on the keyboard. You can see this in action below.

Read more
This Windows 10 trick gives your PC built-in ransomware protection
microsoft surface laptop 4 vs 3 microsoftsurfacelaptop3 10 1500x1000

Ransomware is quite dangerous, as hackers use it to hold your important files hostage until you pay them a high price. There are many ways to protect yourself against this, but it turns out that Windows 10 has a trick that can allow you to turn on built-in ransomware protection in just a few clicks.

The trick involves just going to your Windows 10 Start Menu and searching for "ransomware protection," as discovered by PCGamesSN. This will then prompt you to open up the Ransomware protection page in Windows Security. From here, you're able to toggle a switch for Controlled folder access.

Read more
No, the Minneapolis Police Department didn’t shut down its email account
Minneapolis police at protest on the death of George Floyd

On Wednesday afternoon, social media users began posting about receiving a bounce-back email -- or delivery failure notification -- from the Minneapolis Police Department after writing to express concern over the murder of George Floyd, and many wondered why, and whether it was intentional.

But Minneapolis Police Department Director of Public Information John Elder told Digital Trends that the bounce-back was not intentional. There's a much more mundane explanation: Overwhelmed servers.

Read more