Cyber Attack On Georgia's State Government

A disruptive cyber attack hit all the departments across Fulton County, Georgia, including those of the District Attorney who is prosecuting Trump and numerous co-defendants accused of election interference.

The local government has experienced and IT outage currently affecting multiple systems. All desktop phones, intranet and devices using county servers are down for all departments, including District Attorney Fani Willis' office, said a county official.

Fulton County employees received an email notification about the outage and the County Board of Commissioners Chairman confirmed at a news briefing that the outage, "was a result of a cyber security incident" and that law enforcement was investigating. “We do not yet have a specific time frame for when these systems will be restored, but we ask for your patience during this response,” Robert Pitts said. He added that officials were not aware of any transfer of sensitive information about citizens or employees at the time.

County officials were working to restore normal operations after the attack knocked  the court, tax, firearms, and marriage-license systems offline, with no specific time frame avaialsble for when those systems might be restored.

The case involving Trump and his co-defendants has several imminent deadlines for filings, including one for District Attorney Willis, who is expected to respond to allegations that she had an improper relationship with the special prosecutor involved in the election case. Four of the initial co-defendants have pleaded guilty, while Trump and the others have pleaded not guilty.

A spokesperson for the FBI's Atlanta field office said that the agency has “been in contact” with the county about the incident. “While we cannot comment on any specific incidents, the FBI routinely advises the public and private sectors about cyber threats in order to help them guard against the actions of cyber criminals".

A spokesperson for the Georgia Bureau of Investigation said it was not investigating the matter and that, so far, there is nothing to suggest that the cyber attack was politically motivated or connected to the case prosecuting the former president.

Fulton County:     Bloomberg:     NBC:    Independent:   Bloomberg Law:     The Hill:   

Image: Rogier Hoekstra

You Might Also Read: 

US Federal Court Court IT Systems Breached:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« Military Service Is An Ideal Background For A Cybersecurity Career
Ransomware: Businesses Are Well Equipped But Underprepared »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Trustwave

Trustwave

Trustwave is a leader in managed detection and response (MDR), managed security services (MSS), consulting and professional services, database security, and email security.

Information Security Forum (ISF)

Information Security Forum (ISF)

The ISF is a leading authority on information security and risk management.

GSMA - IoT Security Guidelines

GSMA - IoT Security Guidelines

GSMA has created a set of security guidelines for the benefit of service providers who are looking to develop new IoT products and services.

MailXaminer

MailXaminer

MailXaminer is an advance and powerful email investigation platform that scans digital data, performs analysis, reports on findings and preserves them in a court validated format.

WeSecureApp (WSA)

WeSecureApp (WSA)

WeSecureApp is specialized in providing Cyber Security Solutions to safeguard your applications and networks.

Cygilant

Cygilant

Cygilant is a SOC2 certified service provider that combines MSSP and Incident Detection and Response (IDR) capabilities managed by global SOCs staffed with trained security engineers.

CopSonic

CopSonic

Copsonic provide a technology solution based on ultrasonic waves to send secure and encrypted data between two devices in order to achieve authentication.

Intrinsyc Technologies

Intrinsyc Technologies

Intrinsyc provides product development services and Edge Computing modules that are helping to take the Internet of Things products to the next level.

Enterprise Incubator Foundation (EIF)

Enterprise Incubator Foundation (EIF)

Enterprise Incubator Foundation (EIF) of Armenia is one of the largest technology business incubators and IT development agencies in the region.

36 Group

36 Group

36 Group's criminal law team, has the experience and specialist knowledge to conduct effectively trials heavily concerned with the growing phenomenon of Cybercrime.

Bionic

Bionic

Bionic is an agentless way to get control over your increasingly complex applications so you can manage, operate, and secure them faster and more efficiently.

BitTrap

BitTrap

BitTrap helps companies worldwide detect attackers and put an early end to breaches, preventing data exfiltration and ransomware altogether.

Technivorus Technology

Technivorus Technology

Technivorus is a deep-tech firm delivering customized Cybersecurity, Digital Marketing, Web & App Development, and multifarious IT services for businesses across the globe.

Core to Cloud

Core to Cloud

Core to Cloud provide consultancy and technical support for the planning and implementation of sustainable security strategies.

Precision Cybertechnologies & Digital Solutions (Precision-Cyber)

Precision Cybertechnologies & Digital Solutions (Precision-Cyber)

Precision-Cyber was founded on the philosophy of state-of-the-art cybersecurity and digital solutions. Our guiding principle is simply that we will provide and secure all your digital needs.

Maverits

Maverits

At Maverits, we are on a mission to reshape the cybersecurity landscape. We offer a wide range of services, including Threat Intelligence, Incident Response, Consulting & Training.