Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Crime Government Security

Police Department Loses Years Worth of Evidence In Ransomware Incident (bleepingcomputer.com) 131

"Police in Cockrell Hill, Texas admitted Wednesday in a press release that they lost years worth of evidence after the department's server was infected with ransomware," reports BleepingComputer. "Lost evidence includes all body camera video, some in-car video, some in-house surveillance video, some photographs, and all Microsoft Office documents." An anonymous reader writes: Most of the data was from solved cases, but some of the evidence was from active investigations. The infection appears to be from the Locky ransomware family, one of the most active today, and took root last December, after an employee opened a document he received via via a spam email. The police department backup system apparently kicked in right after the infection took root, and created copies of the already encrypted data. The department did not pay the $4,000 ransom demand and decided to wipe all its systems.
This discussion has been archived. No new comments can be posted.

Police Department Loses Years Worth of Evidence In Ransomware Incident

Comments Filter:
  • Backups? (Score:4, Informative)

    by WalksOnDirt ( 704461 ) on Saturday January 28, 2017 @04:41PM (#53755863)

    It sounds like they only had one backup, and that promptly got overwritten. It should be standard procedure to have an offsite backup as well. I always did.

    • by rbanffy ( 584143 )

      This.

      Also, didn't they think of properly set file permissions?

    • It sounds like they only had one backup, and that promptly got overwritten. It should be standard procedure to have an offsite backup as well. I always did.

      A backup implies exactly that regardless of medium or location, and if the backup runs after the infection, then you're doing nothing but backing up (ransomware) encrypted data.

      The end result is you're still fucked.

      • What's the point of even doing a backup if you overwrite the only copy every time? If the backup ran after he opened the file you should be able to access the previous backup
        • by vux984 ( 928602 )

          What's the point of even doing a backup if you overwrite the only copy every time?

          This is among the least expensive in terms of storage and in terms of time. You can do an rsync between a local and offsite storage, get a couple redundant copies easily and simply.

          It prevents against a non-malicious system failure... e.g. a hard drive going bad.

          Yes, its wholly inadequate vs ransomware, or malicious file modification, or gradually failing hardware that is corrupting data.

          But even so it remains one of the most common backup strategies because it is simple an inexpensive. And police IT budget

          • by Saithe ( 982049 )
            It's only tight because those that hold the money doesn't have to think about this when it's only a "what if" scenario. Hopefully they now know it's a necessary investment.
            • Re: Backups? (Score:4, Interesting)

              by CaptainDork ( 3678879 ) on Saturday January 28, 2017 @11:09PM (#53757211)

              Retired IT here, after 34 years.

              It's not easy being a cost center.

              I was always on the wrong side of the ledger.

              All of my meetings with management were about spending money that they had to recover.

              Sometimes a new implementation would be an instant money-saver, but that was not very often.

              I insisted on one of two (2) things:

              1.) Acceptance of my recommendations or
              2.) An official email quoting my recommendation, along with the rejection of same.

              2.) was, on occasion, the answer to the question, "How in the hell could you let this happen?"

              • by sjames ( 1099 )

                The whole cost center thing is a silly over-simplification anyway. If it enables the company to have revenue it is a profit center. The question they should be asking is if we replaced all of this IT stuff with a building full of people with spindles and adding machines, a big warehouse full of documents and a bunch of people to run documents back and forth, how much extra would that cost and how much would it slow us down.

                IT is a cost center like sales and marketing is a cost center. You have to pay sales

                • TL;DR but a scan informs that IT is a cost center.

                  • by sjames ( 1099 )

                    In the sense that EVERYTHING is a cost center yes. It is not as the management over-simplification where soem departments are macically profit centers even though they also cost money.

                    • My wheelhouse is small in that I was the systems department.

                      I'm not qualified to fantasize about the cost of light bulb changers and shit.

                      I am an eye-witness to my own lengthy career and it's my call, not yours, regarding my position on the ledger that put me in the category of cost center.

                      So it is written, so let it be done.

                    • by Agripa ( 139780 )

                      It it is not sales, then it is overhead.

                    • by sjames ( 1099 )

                      I didn't claim management didn't do that, just that it is wrong headed and results in problems.

                    • It is wrong-headed for business managers to do risk analysis of data security.

                      In my world of IT management, we all knew, from firm to firm, what best practices would allow us to be top-notch gatekeepers.

                      Business made the decisions because they were the owners of the data.

                      IT managers and staff were simply the custodians.

                    • by sjames ( 1099 )

                      No, wrong headed to decide one department is a profit center and gets gold toilets and another gets scraps because they are a cost center.

                      Risk analysis is fine, but only when that analysis is done by people smart enough to know that every center has a cost and every center brings profits. Those odd ideas about cost centers and profit centers lead to poor decisions which lead to bad results, like a police department that's loaded for bear but then loses all the digital evidence.

                      The fact that you had to keep

                    • We didn't have gold toilets.

                      Perhaps you're thinking of this case [youtube.com].

                    • by sjames ( 1099 )

                      Of course not, you were a "cost center". Also apparently bad at metaphor.

                    • I never met a 4 I didn't like.

                    • by sjames ( 1099 )

                      That seems to be the misguided belief. Naturally, they would like for the product to just appear in the warehouse for free, but likewise as long as they're wishing, they would like the potential customers to spontaneously wire money to them. Thus, in reality sales is also overhead.

                      Even janitorial services should be counted as savings since otherwise they would have >100K/year engineers or multi-million a year CEOs spending their expensive time waxing the floor in the lobby. Alternatively, they would lose

                    • by Agripa ( 139780 )

                      I do not disagree with anything you said. I just have run across this attitude before.

          • "This is among the least expensive in terms of storage and in terms of time."

            No, it isn't. In terms of time is much quicker to backup to /dev/null, and even backups to /dev/null get surpassed both in time and storage by not doing backup at all.

            And, in this case, it seems they offer exactly the same result so, why don't they make it clear -and cheaper, what are they really acomplishing?

            • by vux984 ( 928602 )

              And, in this case, it seems they offer exactly the same result

              Yes *In this case*.

              But in other cases -- such as the building it is in being destroyed in a fire or the hard drive/raid array getting fried by lighting or a power surge etc -- a simple rsync job offers an actual offsite backup copy that they can restore data from.

              Its a legitimate backup strategy for a lot of use cases. In terms of risk management guarding against hardware loss or failure was historically the big one. Only recently has the 'malicious modification of files' rocketed to the top of the list bo

              • "a simple rsync job offers an actual offsite backup"

                You don't understand what a back up is.

                Hint: if it is not fully decoupled from the original source (as in "air gap") is not a backup. So an off-site rsync is not a backup; an off-site rsync and tarring the result from time to time to an external device, *may* be a backup.

                You are probably in the league of those that think RAID5 is also a backup strategy ("sure, not always, not perfect, but in some simple cases...").

                "Only recently has the 'malicious modifica

                • by vux984 ( 928602 )

                  You don't understand what a back up is.

                  Give it a rest. I know full well what a back up is.

                  Hint: if it is not fully decoupled from the original source (as in "air gap") is not a backup.

                  Someone running crashplan or carbonite etc has a backup that is resilient to ransomeware, hardware failure, malicious tampering, etc. That is enough of a backup to mitigate most modern threats. It has incremental backups and versioning, and preserves deleted files. And it's not a mounted remote folder so a malicious process/user running your computer can't run amok and delete the backups. By itself, its not perfect, but its sufficient for a lot of entities.

        • What's the point of even doing a backup if you overwrite the only copy every time?

          Like many, you don't understand the difference between a backup and an archive. A backup is meant to preserve data in the event of a hardware or other failure. An archive is supposed to preserve the data as it was at some point in history.

          • by Sabriel ( 134364 )

            Your assumption of whether GP understands the difference is irrelevant to their argument: that during the period where your system is overwriting the only copy, you don't have a backup* to "preserve data in the event of a hardware or other failure"...

            Oh, and also? While an archive is not necessarily a backup, a backup is inherently an archive.

            * (you may have part of a backup, maybe even parts of two backups, depending on how your backup process overwrites the old one with the new one, but I certainly wouldn

          • For me, the difference between an archive and a backup is that a backup is usually offline (i.e. unavailable and not intended to be available) while an archive is usually 'live' in some way. It makes sense to me to make backups of your archives (although possibly at a lower frequency than your 'live' data). It also makes perfect sense to use your backups to make an archive.

            By this rule 'live backups' that are (semi) online and available for users without other human interaction are actually archives. T

      • by bsolar ( 1176767 )

        A backup implies exactly that regardless of medium or location, and if the backup runs after the infection, then you're doing nothing but backing up (ransomware) encrypted data.

        The end result is you're still fucked.

        Only if you foolishly overwrite all previous backups so that only the last version remains. If that's how their backup works, then it's severely lacking given the importance of the data in question. What if you need a file and discover it got corrupted, and it might have been corrupted months ago?

        • You can also run into backup drive space issues with locky if you run incrementals and keep historical backups on a space-available basis only. If you have less than ~300% space on your backup system this can become an issue pretty easily. When you are set up for incrementals, often a full backup will take several cycles and require even more space.

          Doesn't excuse not having offline backups, but in the post-tape world that gets harder and harder.
      • by guruevi ( 827432 )

        Not what backup means, you're describing a RAID or other sort of mirror (even if it is delayed). Redundancy is not the same as a backup.

        A backup has history, you could use snapshots or tape rotations or whatever, but older versions cannot be overwritten by newer versions, in most (best) cases, older versions cannot be written to period (the tape could have a physical tab or the storage system does not allow writing). When things change (eg. they are encrypted), you would see a very large backup if you're do

      • Yeah, but what about the day BEFORE the infection?

        And the day before that, going back in time.

        I worked two law firms -- half day each -- and one wanted 7 days of rolling backup. The other wanted 30 days of rolling backup.

        For the first site, 6 external hard drives (EHD) were always offsite, and for the second, 29 EHD were always offsite.

        In both cases, the firms' management made the call regarding:

        1.) Cost of backup hardware and offsite storage
        2.) Risk of record retention -- especially email.

        The law firms wer

        • by sjames ( 1099 )

          Unless they routinely deleted email on reading, the backups might contain inboxes containging years of emails.

          OTOH, unless there is a specific data retention requirement, discovery is for things you have. If things missing from discovery are consistent with your retention policy (showing that you didn't make a mad rush to delete things to avoid discovery), you're fine.

          • Your point is well-taken.

            The only real protection from discovery would be the non-existence of emails (or other data) deliberately deleted prior to any overwrites with the backup.

      • So you restore from the day before that instead of the most recent one.

        The whole idea of backups is you can restore to some point in the past - with the size of that window and the granularity within it depending on how much you want to spend...

        If you just have one copy then you don't have a backup, you have a really slow RAID.

      • Proper backups would be able to go back to a certain date and recover the data from before the files were locked out. Even if one set of backup data was completely lost, an older backup set should have been available to get back 99% of the data minus maybe very recent changes, and even that is normally considered a worse case scenario in restoring backups.

        It's best to be able to get up to the minute backups, or roll back file versions. But the reality is, you might be so screwed that you have to go bac
    • by bsolar ( 1176767 )
      Not to mention archived backups from various points in time.
    • by dgatwood ( 11270 )

      The phrase that comes to mind is, "An automatically mirrored copy is not a backup."

      Any real backup strategy requires versioning. For example, my personal data backups involve a NAS providing storage for Time Machine. If a ransomware attack screwed up my Mac, I would have multiple backups that I could restore from, and if the ransomware attacked while the backup was running and corrupted the entire backup volume, I could still roll back the NAS volume to its most recent daily snapshot and restore the Time

      • by guruevi ( 827432 )

        Hell no, a federal government IT department? You mean, a bunch of bureaucrats charging $100k/y for a 10TB storage unit because 'vendors' from the Gartner Triangle recommended it to them and attached a huge IBM and Oracle contract to it.

        What these small departments need is to find and hire a local IT person or if they can't afford an IT person (if you have less than 200 devices, you don't need a dedicated IT person), contract with a local company, there are plenty everywhere, they will take care of these sor

    • Incremental or differential backups would've noticed "Hey, this file has changed from before. I'd better keep a copy of the previous version around just in case."
    • exactly.
      Something is REALLY fishy about this one.
      Hopefully, the FBI looks into it, but with this admin, I doubt it.
    • Meh, it's only evidence. We all know that police don't care about that.

  • by akozakie ( 633875 ) on Saturday January 28, 2017 @04:45PM (#53755879)

    The police department backup system apparently kicked in right after the infection took root, and created copies of the already encrypted data.

    Backup. You keep using that word. I don't think it means what you think.

    If you automatically overwrite previous data with no way to restore some older state, meaning that at a given moment you may only have a copy a few minutes old and no older state - it's not backup. It's just a secondary remote copy. Useful against heavy physical damage to the primary storage (or the whole machine), but nothing else. If it's not even remote, it's not useful for anything.

  • by geekmux ( 1040042 ) on Saturday January 28, 2017 @04:54PM (#53755933)

    "Most of the data was from solved cases, but some of the evidence was from active investigations...the department did not pay the $4,000 ransom demand and decided to wipe all its systems."

    I'm sorry, but one legal firm can rack up more than $4000 in legal fees in a single day.

    You're going to tell me that the active investigations along with the potential liability of not holding data for years worth of solved cases was somehow not worth $4000?

    The numbers just don't add up here. At all. Hate to go all conspiracy theory, but this sounds more like an intentional infection and a premature decision to wipe data that might have shown a bad light on a certain law enforcement actions.

    • by Kohath ( 38547 ) on Saturday January 28, 2017 @05:04PM (#53755993)

      Any evidence that was altered by ransomware would get challenged by a defense attorney. Maybe they decided they didn't need to pay ransom for evidence that had built-in reasonable doubt.

    • Re: (Score:3, Insightful)

      by Anonymous Coward

      Maybe they decided to do the right thing and not fund criminals. We need more people to do the same thing. If nobody payed, ransomeware would stop being a thing. Plus, the evidence should now be considered compromised anyway.

    • by gravewax ( 4772409 ) on Saturday January 28, 2017 @05:12PM (#53756025)
      The numbers add up perfectly, you just aren't adding up the right numbers. system has already been compromised, how could they possibly trust any data as evidence after recovery? On top of that you have the government stance of never paying ransom. Looks to me like they took the right approach.
      • by bsolar ( 1176767 ) on Saturday January 28, 2017 @05:27PM (#53756083)
        They can trust the data by recovering it from the tamper-proof archived backups they *should* have. If they lack them, they failed and in this case it seems they failed big time.
        • exactly, so under no circumstances does paying the ransom make sense. Either they have proper backups with non repudiation in which case it is not necessary or they don't in which case you can't trust what is recovered anyway
      • How could you trust any evidence once you know the system is open to change? More than one person should be fired for this.

        • completely agree. A properly audited and controlled system can be subject to change and still able to be trusted and I am somewhat stunned that this is not what they had given it is evidence that will be used in court.
    • by guruevi ( 827432 ) on Saturday January 28, 2017 @05:21PM (#53756061)

      It is $4000 to a criminal organization, it's illegal (especially for government agencies like a POLICE department) to make any payment and become complicit in the criminal activity.

      On the other hand, $4000 is what they start off with, I heard of a company that got hit with $10k in ransom demands, a few days later they realized their backups weren't working well so they gave them the $10k, by then the criminals realized they were attempting and failed to restore from backup so they quadrupled the demand so the company got the FBI involved, when the criminals realized the FBI got involved, they wiped EVERYTHING. It took them about 3 weeks and about $100k to recover the broken backups by a professional recovery company.

      • Sucks to be that company, but on the upside the criminals also apparently got nothing out of it.

    • Just make the person who opened the spam mail pay the $4000. You get the ransom paid and that person will definitely be more careful next time.
    • by Agripa ( 139780 )

      You're going to tell me that the active investigations along with the potential liability of not holding data for years worth of solved cases was somehow not worth $4000?

      What legal liability? Some cases might get dismissed but why would that matter for the police department?

      • You're going to tell me that the active investigations along with the potential liability of not holding data for years worth of solved cases was somehow not worth $4000?

        What legal liability? Some cases might get dismissed but why would that matter for the police department?

        And some cases might get re-opened because of new evidence brought to light that might benefit the wrongly accused, which would be essentially impossible to further such an investigation because of evidence being destroyed.

        Regardless, the chain of custody issue has to be validated with such an intrusion anyway, which even furthers my point regarding this being used as a scapegoat excuse for evidence being destroyed deliberately by those holding it.

        • by Agripa ( 139780 )

          And some cases might get re-opened because of new evidence brought to light that might benefit the wrongly accused, which would be essentially impossible to further such an investigation because of evidence being destroyed.

          Why would the police care about that either? Most prosecutors certainly do not and go to great lengths to prevent review.

          • And some cases might get re-opened because of new evidence brought to light that might benefit the wrongly accused, which would be essentially impossible to further such an investigation because of evidence being destroyed.

            Why would the police care about that either? Most prosecutors certainly do not and go to great lengths to prevent review.

            If years of evidence is truly worthless to the organization holding it, then why the hell did they even save it.

            • by Agripa ( 139780 )

              And some cases might get re-opened because of new evidence brought to light that might benefit the wrongly accused, which would be essentially impossible to further such an investigation because of evidence being destroyed.

              Why would the police care about that either? Most prosecutors certainly do not and go to great lengths to prevent review.

              If years of evidence is truly worthless to the organization holding it, then why the hell did they even save it.

              Often they do not. There may be statutory requirements.

  • This is exactly the sort of ammunition current power players will use to condemn the use of technology.

    After all, Computers have complicated lives very greatly.

  • by Anonymous Coward

    How do they not have a proper storage array with snapshot and remote copy functionality to provide both point in time "backups" as well as offsite replication?

    Even if they couldn't afford that why weren't they doing disk to disk backups using removable drives or backing up to a local tape drive and rotating the tapes daily?

    I sure hope somebody got fired for this...

    • Because most smart folks don't want to be cops, and most cops aren't all that smart...

  • by Anonymous Coward on Saturday January 28, 2017 @05:27PM (#53756079)

    "...hard copies of ALL documents and the vast majority of the videos and photographs are still in the possession of the Police Department on CD or DVD".

    They only lost digital copies of evidence...probably why they chose to wipe rather than pay ransom.

    • by phorm ( 591458 )

      Or anything that hasn't been converted to hard-copy. I doubt the devices record on ROM media directly.

  • Presumably, Windows. Balance of probability both by numeric prevalence and vulnerability. How is it responsible for police to store valuable data on a vulnerable system? Without backup no less?

    • Presumably, Windows. Balance of probability both by numeric prevalence and vulnerability. How is it responsible for police to store valuable data on a vulnerable system? Without backup no less?

      What's this, a visit from a Microsoft astroturder with mod points? Confirming that Microsoft is, well, the same old Microsoft.

      BTW, it is not in doubt that the police had their stuff on a Windows computer because Locky, like the vast majority of ransomware, is Windows malware.

  • It's good they decided not to perpetuate the randomware industry by paying the ransom. That was the right choice on their part.

    However: "...after an employee opened a document he received via via a spam email...."

    There are all kinds of problems with this, starting with the general lack of technical awareness of the whole population (I won't blame it specifically on that one lady or gent: they have a billion or so to keep them company, and if you only try to hire technically literate people, you won't have

    • In a group of people who aren't computer security professionals, somebody's going to open the document, or at least, you have to figure someone will. The exact person doesn't matter. If your computer system is such that opening a document can encrypt the storage, somebody's screwed up the system very thoroughly.

  • It's disheartening to realize that I, just an average Joe, have better, more secure backup procedures than the police department in Cockrell Hill, Texas.

    Yeah, maybe they're just a podunk little town in the middle of nowhere, but still...

  • Maybe the police department will now move on a backup system with multiple iterated backups so that if this ever happens in the future they can recover everything.

    • Nah, this is a feature. It takes the pressure off from having to do actual work.

      I am sure they probably feel that more evidence needs to be digital and on systems that they let the intern surf the web on.

  • EU's right to be forgotten has been criticized as impossible to enforce, but here is its implementation: get infected, refuse to pay, wipe data.

    Right to be enforced is enforced with the help of ransomware, though the citizen cannot choose when it happens.

  • Whether it's called backup or archive, their system was inadequate. Multiple full copies taken at various points in time - of all data - should be in more than one offsite location.

  • So are we to understand there is just a single backup which, when running, overwrites the previous backup? So if you backup at the wrong moment, everything is gone? That is extremely, extremely incompetent...

    I can understand losing maybe a few days of work, but beyond that point, an older backup should be recoverable. Why wasn't it?

  • I agree with the general consensus that they should have more than one backup. Having only one is foolish.

    That said, regardless of how many backups a location maintains, there should be a standard mechanism that analyzes key files BEFORE starting a backup, verifies that they have not been modified or deleted, i.e. by ransomware, and if it detects that they have been modified or deleted, displays an alert and stops the automatic backup before it even begins, thereby protecting the integrity of the existin
  • What did you expect from a Texas Police Department, after all they got a president killed on their watch.

  • Seriously, 4K is NOTHING compared to what any of those cases costs. So, the question is, why did they not pay?
    And the back-up only went with 1 level? Seriously?

    Normally, I stick up for the police, but Gut feeling says that there was a case that they did not want tried and the police were in on that.

Doubt is not a pleasant condition, but certainty is absurd. - Voltaire

Working...