A ransomware scare has made the New York Police Department (NYPD) pull-down its fingerprints database offline. However, an official statement released by the law enforcement agency says that none of the stored data records were impacted by the file encryption malware as the ransomware was contained in the initial stage of a cyber attack.
Highly placed sources say that the file-encrypting virus was introduced into the network by a contractor who was working on a project of replacing digital displays. Going deep, Cybersecurity Insiders has learned that the contractor might have probably introduced the malware through his Mini NUC PC which might have been infected by the malware already.
When the IT officials of the NYPD probed into the matter they found that the contractor was innocent making the incident inadvertent. But they also learned the fact that the ransomware proliferated to around 23 machines connected to LiveScan Fingerprint- Tracking system on a rapid note forcing the officials to knock down all the servers offline to keep the malware spread contained.
Jessica Tisch, the Deputy Commissioner for IT, NYPD said that the malware made the LiveScan machine go offline and over 200 computers connected to the network might need a software installation re-jig as early as possible.
“The Catastrophic repercussions of ransomware attacks on public utilities are known and would qualify for a national emergency if the situation deteriorates”, says Ms. Tisch.
Sources say that the offline systems reportedly belonged to the Joint Terrorism Task Force and the NYPD’s Cyber Command.
Ransomware spreading threat actors are increasingly targeting public institutions and it’s best if these agencies start taking proactive measures to tackle such cyber threats from the bud.