Louisiana Hit With A Ransom Attack

An attempted ransomware attack  on 18th November has prompted Louisiana officials to deactivate servers for numerous state agencies, including the office of Gov. John Bel Edwards, the state legislature, the Office of Motor Vehicles and the office of Secretary of State Kyle Ardoin.

Roughly 1,500 of the state’s 30,000 computers were infected by the cyberattack, the Office of Technology Services (OTS) told lawmakers on the state's Joint Legislative Committee on the Budget.

The state’s Office of Technology Services said that detection of a “cybersecurity threat” prompted it to take down the state’s servers, temporarily knocking out websites, government employees’ email and other online services. Most websites were operational by Monday evening, though some state employees were still resorting to using personal email to send out communications.

Louisiana officials said that while it may take several days for all affected services to be restored, the state does not anticipate any data loss, nor did it pay a ransom.

In response to the attempted attack, Edwards activated the state’s cybersecurity response team, which includes OTS, the Governor’s Office of Homeland Security, the Louisiana State Police and the National Guard.  Edwards previously deployed the team in July, when several school districts’ computer systems were infected with ransomware just weeks before the start of the new academic year, prompting the governor to issue an emergency declaration.  

The state did not pay the ransom demanded by attackers, who were using a variant of the same Ryuk ransomware used in attacks on several Louisiana school districts' networks in July. 

“Our experts train and prepare for these types of incidents and have been successful in mitigating similar issues in the past, including this summer when our teams successfully brought services back online following the cyberattack on local schools,” Jay Dardenne, the commissioner of the Louisiana Department of Administration, OTS’s parent agency, said in a press release. 

Officials said the attack detected was similar in nature to the July incident, including the presence of the ransomware virus Ryuk, which has collected several six-figure payouts from local governments across the United States since it first appeared in late 2018.

Louisiana.gov        Ars Technica:            WAFB:         StateScoop

You Might Also Read: 

Hackers Demand Ransom After Stealing Johannesburg's Data:

Georgia Suffers A Nationwide Cyber Attack:

 

« Regulatory Plans For Artificial Intelligence & Algorithms
More Women Should Engage In Cyber Security Jobs »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Irish Reporting & Information Security Service (IRISS)

Irish Reporting & Information Security Service (IRISS)

IRISS-CERT is Ireland's first CSIRT (Computer Security Incident Response Team) to provide services to all users within Ireland.

44CON

44CON

44CON is an Information Security Conference & Training event taking place in London. Designed to provide something for the business and technical Information Security professional.

Techmeme

Techmeme

Techmeme is an online news curation service focused on leading edge technology, including cyber security.

Truth Technologies Inc (TTI)

Truth Technologies Inc (TTI)

TTI is a premier provider of worldwide anti-money laundering, anti-fraud, customer identification, and compliance products and services.

CS Group

CS Group

CS Group offers a complete range of security solutions from consultancy to security maintenance and from secure infrastructure design to security governance.

Cradlepoint

Cradlepoint

With Cradlepoint customers leverage the speed and economics of wired and wireless Internet broadband for branch, mobile, and IoT networks while maintaining end-to-end visibility, security and control.

Carson & SAINT

Carson & SAINT

Carson & SAINT is an award-winning consulting firm with deep experience in cybersecurity technology, software, and management consulting.

Wotan Monitoring

Wotan Monitoring

Wotan Monitoring is the software solution for fully automatic process monitoring, infrastructure monitoring and end-to-end monitoring.

MagiQ Technologies

MagiQ Technologies

MagiQ produced the world’s first commercial quantum cryptography product that delivered advanced, future-proof network security.

Hazy

Hazy

Hazy specialises in financial services, helping some of the world’s top banks and insurance companies reduce compliance risk.

RegScale

RegScale

RegScale helps organizations comply in real-time with multiple compliance requirements (NIST, CMMC, ISO, SOX, etc), scalable to meet the needs of the entire enterprise.

Matrixforce

Matrixforce

Matrixforce is a vetted IT support provider that uses the patented Delta Method of streamlining technology for financial and professional service firms to reduce complexity and avoid risk.

Securious

Securious

If you need to improve your cyber security or achieve cyber security accreditations, Securious provide an independent service that will identify and address your issues quickly and efficiently.

Cybersecurity Elastic Laboratory (CEL)

Cybersecurity Elastic Laboratory (CEL)

CEL specialize in providing top-tier services in vulnerability diagnosis and penetration testing, offering a comprehensive suite of solutions to mitigate cyber risks.

Yokai

Yokai

Yokai is a secure, distributed platform for data communication with enhanced security features tailored for classified environments such as finance, defence, healthcare, cybersecurity, and more.

Replica

Replica

Replica creates authentic virtual environments that ensure identities and assets are always protected no matter where or what work needs to get done.