Cybercriminals demanding ransom to liberate elements of New Orleans space sheriff’s workplace pc programs

Date:

Cybercrime Group Claims Responsibility for Hacking Orleans Parish Sheriff’s Office

An international cybercrime group, known as Qilin, is claiming responsibility for a ransomware attack on the Orleans Parish Sheriff’s Office (OPSO) in New Orleans. The group has breached the office’s system and is demanding a ransom in exchange for restoring access to the compromised data. According to a source close to the sheriff’s office, the attack occurred approximately three weeks ago, and Louisiana and New Orleans cybersecurity specialists have been working to resolve the issue.

The OPSO and the state of Louisiana have refused to pay the ransom, citing concerns about the potential consequences of giving in to the hackers’ demands. The amount of the ransom demand has not been disclosed. Qilin has posted screenshots of the compromised data on the dark web, including contracts, inmate intake documents, and expense information. However, the OPSO has stated that the released information does not appear to be sensitive and that no jail security operations have been impacted.

Impact of the Attack on the Sheriff’s Office

The attack has affected the OPSO’s “DocketMaster” system, which manages inmate transfers to and from jail for court appearances and handles inmate releases on bail. As a result, some individuals have experienced delays in being released from jail, even after their bonds have been paid. One woman, who wished to remain anonymous, told CBS News that her husband was not released from jail last week despite her paying his bond. She expressed frustration and concern about the impact on her family, saying, “I have two sons, four and six years old. They miss their dad.”

OPSO officials have implemented a manual workaround to mitigate the effects of the DocketMaster system outage. The temporary solution allows individuals to access information normally obtained through DocketMaster by calling Jail Communications at (504) 202-9386. The source close to the sheriff’s office attributed the attack to malware received via email from another law enforcement agency.

Cybersecurity Concerns and Statistics

The FBI warned of increasing malware attacks in March, following a similar attack on a media company. According to cybersecurity firm Recorded Future, cyberattacks exposing vulnerabilities have increased by 16% this year, with the majority involving malware. An FBI report also noted that about 5.5% of ransomware incidents in 2023 involved government infrastructure. These statistics highlight the growing concern about cybersecurity threats and the need for organizations to take proactive measures to protect themselves against such attacks.

The incident serves as a reminder of the importance of robust cybersecurity measures, particularly for government agencies and law enforcement organizations. As cybercrime groups like Qilin continue to target vulnerable systems, it is essential for organizations to stay vigilant and invest in measures to prevent and respond to such attacks.

For more information on this developing story, visit Here

Image Source: www.cbsnews.com

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Share post:

Subscribe

Subscribe to get our latest news delivered straight to your inbox.

We don’t spam! Read our privacy policy for more info.

Popular

More like this
Related

Mexican environmentalist survives assassination try caught on video: “I instructed the hitman ‘good morning'”

Mexican Environmentalist Survives Assassination Attempt, Highlighting Dangers Faced by...

Woman killed by police at Omaha Walmart after allegedly kidnapping, slashing youngster

Tragic Incident at Omaha Walmart: Police Shoot and Kill...

Amid Uncertainties, Delta CEO Ed Bastian Warns Oil Crisis Could Reshape Airline Industry

Delta CEO Ed Bastian Warns Oil Crisis Could Reshape...

Disney plans intensive spherical of layoffs in the approaching weeks

Disney to Undergo Extensive Layoffs in Coming Weeks According to...