Cyber Attack On Georgia's State Government

A disruptive cyber attack hit all the departments across Fulton County, Georgia, including those of the District Attorney who is prosecuting Trump and numerous co-defendants accused of election interference.

The local government has experienced and IT outage currently affecting multiple systems. All desktop phones, intranet and devices using county servers are down for all departments, including District Attorney Fani Willis' office, said a county official.

Fulton County employees received an email notification about the outage and the County Board of Commissioners Chairman confirmed at a news briefing that the outage, "was a result of a cyber security incident" and that law enforcement was investigating. “We do not yet have a specific time frame for when these systems will be restored, but we ask for your patience during this response,” Robert Pitts said. He added that officials were not aware of any transfer of sensitive information about citizens or employees at the time.

County officials were working to restore normal operations after the attack knocked  the court, tax, firearms, and marriage-license systems offline, with no specific time frame avaialsble for when those systems might be restored.

The case involving Trump and his co-defendants has several imminent deadlines for filings, including one for District Attorney Willis, who is expected to respond to allegations that she had an improper relationship with the special prosecutor involved in the election case. Four of the initial co-defendants have pleaded guilty, while Trump and the others have pleaded not guilty.

A spokesperson for the FBI's Atlanta field office said that the agency has “been in contact” with the county about the incident. “While we cannot comment on any specific incidents, the FBI routinely advises the public and private sectors about cyber threats in order to help them guard against the actions of cyber criminals".

A spokesperson for the Georgia Bureau of Investigation said it was not investigating the matter and that, so far, there is nothing to suggest that the cyber attack was politically motivated or connected to the case prosecuting the former president.

Fulton County:     Bloomberg:     NBC:    Independent:   Bloomberg Law:     The Hill:   

Image: Rogier Hoekstra

You Might Also Read: 

US Federal Court Court IT Systems Breached:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« Military Service Is An Ideal Background For A Cybersecurity Career
Ransomware: Businesses Are Well Equipped But Underprepared »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Vertical Structure

Vertical Structure

Vertical Structure services include Security & Penetration Testing, Information Assurance, Bespoke Training Programs and Secure Hosting.

Cysec Resource Co (CRC)

Cysec Resource Co (CRC)

We offer expertise in information and cyber security, sourcing individuals and teams who provide information security expertise to the public and private sector.

Spirion

Spirion

Spirion offers data discovery, classification, and protection tools for your business's privacy, security, and compliance program to avoid gaps and risks.

Censornet

Censornet

Censornet's autonomous, integrated cloud security gives mid-market organisations the confidence and control of enterprise-grade cyber protection.

SOTI

SOTI

SOTI is an industry leader in Enterprise Mobility Management (EMM).

Quadron  Cybersecurity Services

Quadron Cybersecurity Services

Quadron Cybersecurity Services is a specialist in digital security, data and system protection.

A-LIGN

A-LIGN

A-LIGN is a technology-enabled security and compliance partner trusted by more than 2,500 global organizations to mitigate cybersecurity risks.

Infinidat

Infinidat

Infinidat delivers enterprise-proven solutions for data storage, data protection, business continuity, and sovereign cloud storage.

BT Security

BT Security

BT provides telecommunications and network infrastructure services to keep businesses around the world connected and secure.

SecureOps

SecureOps

SecureOps is transforming the Managed Security Service Provider industry by providing tailored cybersecurity solutions proven to protect organizations from cyberattacks.

Entara

Entara

Entara (formerly YJT Solutions) is an eXtended Service Provider (XSP) focused on providing cutting edge technology and cyber security solutions to companies in regulated industries.

Lucata

Lucata

Lucata solutions support groundbreaking graph analytics and improved machine learning for organizations in financial services, cybersecurity, healthcare, pharmaceuticals, telecommunications and more.

Sterling Information Technologies

Sterling Information Technologies

Sterling is an information security, operational risk consulting and advisory group. Our Advisory services help to safeguard information assets while supporting business operations.

Google Cloud

Google Cloud

Accelerate your digital transformation. Whether your business is early in its journey or well on its way to digital transformation, Google Cloud can help solve your toughest challenges.

ASMGi

ASMGi

ASMGi is a managed services, security and GRC solutions, and software development provider.

ShieldIO

ShieldIO

ShieldIO Real-Time Homomorphic Encryption™ enables your organization to reach regulatory compliance without compromising data availability.