Anchorage police department takes servers offline after cyberattack on service provider

The Anchorage Police Department said it took a range of actions to address a recent cyberattack on one of its technology service providers. 

A police department spokesperson told Recorded Future News that the incident relates to a cyberattack involving data migration firm Whitebox Technologies, which alerted the police department of a security incident on January 7. The company did not respond to requests for comment. 

The city’s IT department “shut down the relevant APD servers and disabled the vendor and all third-party service provider access.” Anchorage is Alaska’s largest city and is home to about 300,000 people. 

“Additionally, ITD oversaw the deletion and removal of all remaining APD data from the third-party service provider servers,” the statement said. “APD initiated continued oversight of its systems and will continue to closely monitor for any unusual activity.”

The police department said there “is no evidence indicating that APD systems have been compromised or that any APD data has been acquired by the threat actor.” 

But officials will monitor systems and implement “protective measures” to safeguard information. A spokesperson pledged that the police department will notify anyone potentially impacted by the incident. 

“The third-party service provider is leading the investigation into the incident. As that active investigation continues, APD, working closely with other Municipal departments, is actively overseeing the response to ensure appropriate safeguards are in place and risks are minimized,” they said. 

The police department spokesperson declined to answer questions about the nature of the incident, but said the it was not related to a recent 311 outage the city dealt with last week. 

The department statement notes that Whitebox Technologies works with “multiple agencies nationwide.” On its website, Whitebox Technologies said it has provided services to municipalities in Washington, New Jersey, Oklahoma and Maine. 

The incident comes as hackers increasingly target third-party service providers used by local governments across the U.S. In November, a ransomware gang disrupted Crisis24, which runs an emergency warning service used by dozens of U.S. municipalities.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

AWS CodeBuild Misconfiguration Exposed GitHub Repos to Potential Supply Chain Attacks

Next Post

Cisco Patches Zero-Day RCE Exploited by China-Linked APT in Secure Email Gateways

Related Posts

ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories

Think your Wi-Fi is safe? Your coding tools? Or even your favorite financial apps? This week proves again how hackers, companies, and governments are all locked in a nonstop race to outsmart each other. Here’s a quick rundown of the latest cyber stories that show how fast the game keeps changing. DeFi exploit drains funds Critical yETH Exploit Used to Steal $9M
Read More

Traditional Security Frameworks Leave Organizations Exposed to AI-Specific Attack Vectors

In December 2024, the popular Ultralytics AI library was compromised, installing malicious code that hijacked system resources for cryptocurrency mining. In August 2025, malicious Nx packages leaked 2,349 GitHub, cloud, and AI credentials. Throughout 2024, ChatGPT vulnerabilities allowed unauthorized extraction of user data from AI memory. The result: 23.77 million secrets were leaked through AI
Read More