Louisiana Hit With A Ransom Attack

An attempted ransomware attack  on 18th November has prompted Louisiana officials to deactivate servers for numerous state agencies, including the office of Gov. John Bel Edwards, the state legislature, the Office of Motor Vehicles and the office of Secretary of State Kyle Ardoin.

Roughly 1,500 of the state’s 30,000 computers were infected by the cyberattack, the Office of Technology Services (OTS) told lawmakers on the state's Joint Legislative Committee on the Budget.

The state’s Office of Technology Services said that detection of a “cybersecurity threat” prompted it to take down the state’s servers, temporarily knocking out websites, government employees’ email and other online services. Most websites were operational by Monday evening, though some state employees were still resorting to using personal email to send out communications.

Louisiana officials said that while it may take several days for all affected services to be restored, the state does not anticipate any data loss, nor did it pay a ransom.

In response to the attempted attack, Edwards activated the state’s cybersecurity response team, which includes OTS, the Governor’s Office of Homeland Security, the Louisiana State Police and the National Guard.  Edwards previously deployed the team in July, when several school districts’ computer systems were infected with ransomware just weeks before the start of the new academic year, prompting the governor to issue an emergency declaration.  

The state did not pay the ransom demanded by attackers, who were using a variant of the same Ryuk ransomware used in attacks on several Louisiana school districts' networks in July. 

“Our experts train and prepare for these types of incidents and have been successful in mitigating similar issues in the past, including this summer when our teams successfully brought services back online following the cyberattack on local schools,” Jay Dardenne, the commissioner of the Louisiana Department of Administration, OTS’s parent agency, said in a press release. 

Officials said the attack detected was similar in nature to the July incident, including the presence of the ransomware virus Ryuk, which has collected several six-figure payouts from local governments across the United States since it first appeared in late 2018.

Louisiana.gov        Ars Technica:            WAFB:         StateScoop

You Might Also Read: 

Hackers Demand Ransom After Stealing Johannesburg's Data:

Georgia Suffers A Nationwide Cyber Attack:

 

« Regulatory Plans For Artificial Intelligence & Algorithms
More Women Should Engage In Cyber Security Jobs »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Pluralsight

Pluralsight

Pluralsight helps enterprises build technology skills at scale with expert-authored courses on today’s most important technologies including information and cyber security.

Ethio-CERT

Ethio-CERT

National Cyber Emergency Readiness and Response Team of Ethiopia.

Cyber Security Network

Cyber Security Network

Cyber Security Network provide specialist cyber security recruitment services.

Cyberbit

Cyberbit

Cyberbit empowers cybersecurity teams to be fully prepared with a product portfolio ready to detect and respond effectively across both IT and OT networks.

ubirch

ubirch

The ubirch platform is designed to ensure that IoT data is trustworthy and secure.

Sequoia Capital

Sequoia Capital

Sequoia Capital is a venture capital firm focused mainly on technology. We partner both with young companies finding their stride and established ones looking for growth.

The Cyber AB

The Cyber AB

The Cyber AB is the official accreditation body of the Cybersecurity Maturity Model Certification (CMMC) Ecosystem.

SecureWorx

SecureWorx

SecureWorx are a secure multi-cloud MSP, a provider of advanced IT security services and an independent cyber security advisory.

Binary Security AS

Binary Security AS

Binary Security is a Norwegian information security consultancy company. We are specialists at application security, penetration testing and secure code reviews.

Strike Security

Strike Security

Strike Security offers a continuous penetration testing platform that combines automation with ethical hackers.

CyberconIQ

CyberconIQ

CyberconIQ provide an integrated Human Defense Platform that reduces the probability and/or the cost of a cybersecurity breach by measurably improving our clients risk posture and compliance culture.

Schellman

Schellman

Schellman is a leading provider of attestation and compliance services.

Astreya

Astreya

Astreya is the leading IT solutions provider for some of the world's most recognizable and innovative organizations.

BCX

BCX

BCX, a subsidiary within Telkom Group, is one of Africa’s largest systems integrator and digital transformation partners for enterprises and public sector organisations.

Motive Managed Services

Motive Managed Services

Motive Managed Services take the complexity out of IT, Cybersecurity, and Network Operations, so you can focus on growing your business.

ArmourZero

ArmourZero

ArmourZero help organisations redefine their cybersecurity strategy - increase visibility, minimise complexity, manage risk, and enhance protection, all under a unified security operations platform.