Louisiana Hit With A Ransom Attack

An attempted ransomware attack  on 18th November has prompted Louisiana officials to deactivate servers for numerous state agencies, including the office of Gov. John Bel Edwards, the state legislature, the Office of Motor Vehicles and the office of Secretary of State Kyle Ardoin.

Roughly 1,500 of the state’s 30,000 computers were infected by the cyberattack, the Office of Technology Services (OTS) told lawmakers on the state's Joint Legislative Committee on the Budget.

The state’s Office of Technology Services said that detection of a “cybersecurity threat” prompted it to take down the state’s servers, temporarily knocking out websites, government employees’ email and other online services. Most websites were operational by Monday evening, though some state employees were still resorting to using personal email to send out communications.

Louisiana officials said that while it may take several days for all affected services to be restored, the state does not anticipate any data loss, nor did it pay a ransom.

In response to the attempted attack, Edwards activated the state’s cybersecurity response team, which includes OTS, the Governor’s Office of Homeland Security, the Louisiana State Police and the National Guard.  Edwards previously deployed the team in July, when several school districts’ computer systems were infected with ransomware just weeks before the start of the new academic year, prompting the governor to issue an emergency declaration.  

The state did not pay the ransom demanded by attackers, who were using a variant of the same Ryuk ransomware used in attacks on several Louisiana school districts' networks in July. 

“Our experts train and prepare for these types of incidents and have been successful in mitigating similar issues in the past, including this summer when our teams successfully brought services back online following the cyberattack on local schools,” Jay Dardenne, the commissioner of the Louisiana Department of Administration, OTS’s parent agency, said in a press release. 

Officials said the attack detected was similar in nature to the July incident, including the presence of the ransomware virus Ryuk, which has collected several six-figure payouts from local governments across the United States since it first appeared in late 2018.

Louisiana.gov        Ars Technica:            WAFB:         StateScoop

You Might Also Read: 

Hackers Demand Ransom After Stealing Johannesburg's Data:

Georgia Suffers A Nationwide Cyber Attack:

 

« Regulatory Plans For Artificial Intelligence & Algorithms
More Women Should Engage In Cyber Security Jobs »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Cyberis

Cyberis

Cyberis are pioneers in customer-focussed information security. Since 2011, we’ve been helping businesses protect their brands, customers and reputation.

King & Spalding

King & Spalding

King & Spalding is an international law firm with offices in the United States, Europe and the Middle East. Practice areas include Data, Privacy & Security.

Miller Group

Miller Group

Miller Group is an IT managed service provider. We proactively monitor and manage your entire business computer network. Services include backup & recovery and cyber security.

International Conference on Information Systems Security & Privacy (ICISSP)

International Conference on Information Systems Security & Privacy (ICISSP)

The ICISSP event is a meeting point for researchers and practitioners to address security and privacy challenges concerning information systems.

Viavi Solutions

Viavi Solutions

Viavi Solutions is a global leader in both network and service enablement and optical security performance products and solutions.

Forensic Pathways

Forensic Pathways

Forensic Pathways focus on the provision of digital forensic technologies, offering clients unique technologies in the management of mobile phone data, image analysis and ballistics analysis.

Tigera

Tigera

Tigera provides zero-trust network security and continuous compliance for Kubernetes platforms that enables enterprises to meet their security and compliance requirements.

Elemendar

Elemendar

Elemendar Artificial Intelligence reads cyber threat reports written by humans and translates them into industry-standard, machine-readable and machine-actionable data.

Splone

Splone

Splone is a Berlin-based IT security research team and consultancy. We help improve IT-security by offering red team assements, penetration tests, audits and customized consulting.

Partners in Regulatory Compliance (PIRC)

Partners in Regulatory Compliance (PIRC)

Partners in Regulatory Compliance provides an array of cybersecurity services including cybersecurity policy management, risk assessments and regulatory compliance consulting.

Kinetic Investments

Kinetic Investments

Kinetic Investments is a venture capital firm dedicated to early-stage companies that are transforming the digital landscape.

Bitbone

Bitbone

Bitbone develop IT infrastructure and IT security solutions that create long-term value.

Redhorse

Redhorse

Redhorse provides top-tier consulting to help clients address mission-critical government problems in National Security, Networking Technology, Energy and the Environment.

Drata

Drata

Drata is a security and compliance automation platform that continuously monitors and collects evidence of a company's security controls, while streamlining workflows to ensure audit-readiness.

Grove Group

Grove Group

Grove provides businesses with the tools that work best for their unique operations, through cybersecurity and cloud services, custom software development and our big data analytics expertise.

Guardsman Cyber Intelligence (GCI)

Guardsman Cyber Intelligence (GCI)

GCI provides proven cyber intelligence solutions to protect your business against ever present physical and digital threats shadowing your online business.