Confidential US Court Documents Published On The Dark Web

Across the United States, local governments and public sector entities have endured a growing number of ransomware attacks throughout the year. And perhaps no region has been harder hit over the last few years than the state of Louisiana. Cyber-criminal ransomware attackers have now published apparent stolen Louisiana court documents on the Dark Web. 

The Fourth Judicial District Court was hacked by Conti ransomware and apparent proof of the attack was published on the Dark Web recently. 

The court  is one of the state's 42 judicial districts. Cases handled by the court include civil, criminal, and juvenile cases and The criminals have uploaded what appear to be the court’s papers. The alleged papers include serious crimes including a second-degree kidnapping, an armed robbery and a case of aggravated rape. 

Security researchers found evidence that the Conti ransomware strain could be a possible successor to the Ryuk crypto-malware family although details of how big a ransom the attackers are demanding have not been revealed. 

Ransomware attacks are nothing new in the State of Louisiana.

  • In December 2019, an attack of this nature was carried out against Louisiana educational establishment Baton Rouge Community College. The incident occurred just two days before a planned commencement ceremony at the college. 

Louisiana has suffered an unfortunate string of cyber-attacks and responding to those attacks has been costly. The state spent $1.7 million responding to a single ransomware attack against its Office of Motor Vehicles in November. 

So while Louisiana didn’t pay a ransom demanded by hackers who launched a cyber-attack against state government servers last fall, the state has paid $2.3 million responding to that and other cyber-attacks across the state over the past year.

Governing:       Infosecurity Magazine:      CPO Magazine:     Tripwire:  
 

You Might Also Read: 


US Bomabarded with Ransomware:

 

« Social Media: An Exclusive 3 Part Review
The Effects Of The Internet On Society »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Cleo

Cleo

Cleo is a leader in secure information integration, enabling both ease and excellence in business data movement and orchestration.

FoxGuard

FoxGuard

FoxGuard develops customized cyber security, compliance and industrial computing solutions for critical infrastructure entities and control system vendors.

Platin Bilişim

Platin Bilişim

Platin Bilisim is an IT Security company providing consultancy, solutions and operational support services.

DQM GRC

DQM GRC

DQM GRC are one of the UK's leading providers of data governance, e-privacy and GDPR services, to commercial organisations across all industries in the UK.

FraudHunt

FraudHunt

FraudHunt protects your website from account fraud, ad fraud, fraud clicks, and malicious bots.

DFI

DFI

DFI is a global leading provider of high-performance computing technology across multiple embedded industries.

Vaadata

Vaadata

Vaadata are experts in ethical hacking. We secure your web, mobile and IoT platforms.

DataCloak

DataCloak

DataCloak is an innovation company that focus on providing enterprise data-in-motion security solutions based on zero-trust security technology.

Tehtris

Tehtris

TEHTRIS XDR Platform was developed to control and improve the IT security of private and public companies against advanced cyber threats such as cyber espionage or cyber sabotage activities.

Onevinn

Onevinn

Onevinn's goal is to create a transparent, cost-effective security that is noticed as little as possible by the users. We simply call it "intelligent security."

Redhorse

Redhorse

Redhorse provides top-tier consulting to help clients address mission-critical government problems in National Security, Networking Technology, Energy and the Environment.

Torq

Torq

Torq's no-code automation modernizes how security & operations teams work with easy workflow building, limitless integrations and numerous pre-built templates.

Oort

Oort

Oort is an identity threat detection and response platform for enterprise security. The Oort platform is API-driven, cloud-native and agentless for rapid time to value and high scalability.

Evo Security

Evo Security

Evo Security is an Identity and Access Management company focused exclusively on serving MSPs, MSSPs and their SMB and Mid-Market customers.

RealmOne

RealmOne

RealmOne addresses the most challenging issues in the realms of defense and cyberspace, adapting to the continuously changing demands of our national security customers.

Invariant Labs

Invariant Labs

Invariant Labs are a team of technical experts with broad experience ranging from academia to big tech on a mission to unlock the potential of AI systems by making them robust, reliable and secure.