Ransomware Hits Texas For Six

The Hackers who have struck a large number of local  government agencies acrossTexas with file-encrypting malware recently may have done it by compromising a managed service provider.  The attacker has now demanded a collective ransom of $2.5 million, the mayor of one municipality has said. 

The Texas Department of Information Resources (DIR) first  said on the 16th August that it was leading the response to a coordinated ransomware attack that had struck local governments across Texas. The number of local government entities in Texas affected by a ransomware attack has ow riseen to 23.

By planting malicious code inside agencies' information systems, digital intruders are able to exploit relatively unsophisticated or out-of-date cyber defenses and inhibit computer access. Affected users are then asked to pay a ransom, almost always in mostly untraceable bitcoin, to regain control of their systems. Whether Texas officials had been asked to do so was unknown. 

In 2016, global ransomware attempts rocketed to 638 million from just 4 million the year before, according to SonicWall, a  Californian network security firm.

Now the Department of Information Resources advises jurisdictions that have been impacted to contact their local Texas Department of Emergency Management Disaster District Coordinator. DIR says it’s committed to providing the resources necessary to bring affected entities “back online.”

The DIR says it is continuing to investigate the origin of the attack, and currently believes that the attack came from a "single threat actor." The agency says the State of Texas systems and networks have not been affected.

Elliot Sprehe, press secretary for the department, said theDIR was working to confirm which government entities are affected and said other information was still coming in. 

"It looks like we found out earlier today, but we’re not currently releasing who’s impacted due to security concerns,” he said.

KUT Austin:     TexasGov:    DallasNews:     Bleeping Computer:

You Might Also Read:

Florida Municipality Suffers Cyber Extortion:

Only In Texas: Ransomware Steals Data From Police:

 

« The EU's New Cybersecurity Certification Framework
Cyber Strategy & Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

RCMP Cybercrime Strategy

RCMP Cybercrime Strategy

The RCMP Cybercrime Strategy sets out in an Operational Framework and Action Plan to combat cybercrime.

Jetico

Jetico

Jetico provides pure & simple data protection software for all sensitive information throughout the lifecycle. Solutions include data encryption and secure data erasure.

Smoothwall

Smoothwall

Smoothwall develop intelligent web filtering, Monitoring and security solutions designed to protect users worldwide.

7 Elements

7 Elements

7 Elements is an independent IT security testing company providing expertise in technical information assurance through security testing, incident response and consultancy.

CipherMail

CipherMail

CipherMail provides email security products which allow organizations world wide to automatically protect their email against unauthorized access both in transit and at rest.

Fingerprint Cards

Fingerprint Cards

Fingerprint Cards develops and produces biometric components and technologies that verify a person’s identity through the analysis and matching of an individual’s unique fingerprint.

Phew

Phew

Phew are New Zealand cyber security specialists with expertise and experience forged in global financial markets, IT&T, management consulting and SME business management.

Arm

Arm

Arm delivers a complete IoT solution, from providing the IP for the chip to delivering the cloud services to securely manage the deployment of products throughout their lifecycle.

Tecnalia Research & Innovation

Tecnalia Research & Innovation

Tecnalia is the largest center of applied research and technological development in Spain, a benchmark in Europe and a member of the Basque Research and Technology Alliance.

EVOLEO Technologies

EVOLEO Technologies

EVOLEO provides engineering services covering a wide range of needs in the electronics design, embedded and systems engineering.

NOW Insurance

NOW Insurance

NOW Insurance provides small business owners and other professional classes with a seamless purchasing experience for general liability, professional liability, and cybersecurity insurance coverage.

European Cyber Competence Network

European Cyber Competence Network

The purpose of the European Cyber Competence Network is to retain and develop the cybersecurity technological and industrial capacities of the EU necessary to secure its Digital Single Market.

Alea Consulting

Alea Consulting

Alea Consulting is a global risk mitigation and investigative consulting firm, which helps organizations reduce reputation and operational concerns.

Picnic

Picnic

Picnic is a gritty, pioneering team of intelligence and cybersecurity specialists focused on solving the security challenge of our time - social engineering.

Barclay Simpson

Barclay Simpson

Barclay Simpson is proud to have a long history of delivering cyber security, technology and governance recruitment services.

Onum

Onum

Onum helps security and IT leaders focus on the data that's most important. Gain control of your data by cutting through the noise for deep insights in real time.