a $ 4,000 ransom feeAttack.Ransomto unlock the files . After consulting with the FBI 's cyber-crime unit , the department decided to wipe their data server and reinstall everything . Data could not be recovered from backups , as the backup procedure kicked in shortly after the ransomware took root , and backed up copies of the encrypted files . According to the department 's press release , the Cockrell Hill police IT staff said they were infected with the OSIRIS ransomware . It 's quite possible that the department 's server was infected with the Locky ransomware , which a few days prior had come out with a new version that appended the `` .osiris '' extension at the end of encrypted files . The press release says the infection took place after an officer opened a spam message from a cloned ( spoofed ) email address imitatingAttack.Phishinga department issued email address . The infection did not spread to other computers because the server was taken offline and disconnected from the local network as soon as staff discovered the ransom demandAttack.Ransom. The department also said there was no evidence of data exfiltrationAttack.Databreachto a remote server .