Anchorage police department takes servers offline after cyberattack on service provider

The Anchorage Police Department said it took a range of actions to address a recent cyberattack on one of its technology service providers. 

A police department spokesperson told Recorded Future News that the incident relates to a cyberattack involving data migration firm Whitebox Technologies, which alerted the police department of a security incident on January 7. The company did not respond to requests for comment. 

The city’s IT department “shut down the relevant APD servers and disabled the vendor and all third-party service provider access.” Anchorage is Alaska’s largest city and is home to about 300,000 people. 

“Additionally, ITD oversaw the deletion and removal of all remaining APD data from the third-party service provider servers,” the statement said. “APD initiated continued oversight of its systems and will continue to closely monitor for any unusual activity.”

The police department said there “is no evidence indicating that APD systems have been compromised or that any APD data has been acquired by the threat actor.” 

But officials will monitor systems and implement “protective measures” to safeguard information. A spokesperson pledged that the police department will notify anyone potentially impacted by the incident. 

“The third-party service provider is leading the investigation into the incident. As that active investigation continues, APD, working closely with other Municipal departments, is actively overseeing the response to ensure appropriate safeguards are in place and risks are minimized,” they said. 

The police department spokesperson declined to answer questions about the nature of the incident, but said the it was not related to a recent 311 outage the city dealt with last week. 

The department statement notes that Whitebox Technologies works with “multiple agencies nationwide.” On its website, Whitebox Technologies said it has provided services to municipalities in Washington, New Jersey, Oklahoma and Maine. 

The incident comes as hackers increasingly target third-party service providers used by local governments across the U.S. In November, a ransomware gang disrupted Crisis24, which runs an emergency warning service used by dozens of U.S. municipalities.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

AWS CodeBuild Misconfiguration Exposed GitHub Repos to Potential Supply Chain Attacks

Next Post

Cisco Patches Zero-Day RCE Exploited by China-Linked APT in Secure Email Gateways

Related Posts

ThreatsDay Bulletin: Stealth Loaders, AI Chatbot Flaws AI Exploits, Docker Hack, and 15 More Stories

It’s getting harder to tell where normal tech ends and malicious intent begins. Attackers are no longer just breaking in — they’re blending in, hijacking everyday tools, trusted apps, and even AI assistants. What used to feel like clear-cut “hacker stories” now looks more like a mirror of the systems we all use. This week’s findings show a pattern: precision, patience, and persuasion. The
Read More

4 Outdated Habits Destroying Your SOC’s MTTR in 2026

It’s 2026, yet many SOCs are still operating the way they did years ago, using tools and processes designed for a very different threat landscape. Given the growth in volumes and complexity of cyber threats, outdated practices no longer fully support analysts’ needs, staggering investigations and incident response. Below are four limiting habits that may be preventing your SOC from evolving at
Read More

U.S. Treasury Lifts Sanctions on Three Individuals Linked to Intellexa and Predator Spyware

The U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) on Tuesday removed three individuals linked to the Intellexa Consortium, the holding company behind a commercial spyware known as Predator, from the specially designated nationals list. The names of the individuals are as follows - Merom Harpaz Andrea Nicola Constantino Hermes Gambazzi Sara Aleksandra Fayssal Hamou
Read More