A California city whose police section recently disclosed it had been victimized by cyber-criminals has now acknowledged it endured an earlier cyber-attack in 2018.
Azusa’s 63-officer police section was specific by the DoppelPaymer ransomware gang late previous winter season. The attack was held solution though officials worked with the FBI, Los Angeles County Sheriff’s Office, and ransomware consultants to try to retrieve hundreds of remarkably sensitive documents encrypted in the incident.

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.
Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).
➤ Activate Your Coupon Code
In April, a stash of the department’s paperwork was leaked on the web following the metropolis elected not to pay back the ransom demanded by the gang. Among the the information and facts leaked were being legal scenario documents and payroll knowledge made up of Social Security quantities, driver’s license numbers, medical info, and financial account data.
The metropolis last but not least publicly acknowledged the hack on May 27 to coincide with the get started of Memorial Day weekend, when America’s attention generally flits absent from the information cycle and toward outdoor social routines and honoring the fallen.
Azusa PD issued a “notification of data security breach” stating that it experienced been hit by a “sophisticated ransomware attack” and that “specified Azusa Police information was obtained by the unauthorized specific.”
Now the city has stated that it was attacked with ransomware by yet another unnamed cyber-legal organization in the slide of 2018. Azusa Town Supervisor Sergio Gonzalez reported that the city’s insurers, Chubb, paid $65,000 to regain management of 10 facts servers at the police division that were taken over by the hackers for far more than a week.
“We ended up equipped to unlock a single server just after the ransom was paid out but straight away after identified a totally free important to unlock all other locked servers,” Gonzalez mentioned in an email.
“No information and facts was compromised. Our servers were just locked.”
Gonzalez claimed that the 2018 attack experienced not been documented due to the fact an investigation experienced identified that no info experienced been uncovered in the incident.
“We verified with forensic professionals that no info was compromised,” wrote Gonzalez. “Which is basically why we did not and have been not needed to report it (publicly).”
Whittier Day by day News reports that the 2018 attack started when a town worker opened an email and clicked on a destructive url.
Some parts of this article are sourced from:
www.infosecurity-journal.com