Ransomware Hits Texas For Six

The Hackers who have struck a large number of local  government agencies acrossTexas with file-encrypting malware recently may have done it by compromising a managed service provider.  The attacker has now demanded a collective ransom of $2.5 million, the mayor of one municipality has said. 

The Texas Department of Information Resources (DIR) first  said on the 16th August that it was leading the response to a coordinated ransomware attack that had struck local governments across Texas. The number of local government entities in Texas affected by a ransomware attack has ow riseen to 23.

By planting malicious code inside agencies' information systems, digital intruders are able to exploit relatively unsophisticated or out-of-date cyber defenses and inhibit computer access. Affected users are then asked to pay a ransom, almost always in mostly untraceable bitcoin, to regain control of their systems. Whether Texas officials had been asked to do so was unknown. 

In 2016, global ransomware attempts rocketed to 638 million from just 4 million the year before, according to SonicWall, a  Californian network security firm.

Now the Department of Information Resources advises jurisdictions that have been impacted to contact their local Texas Department of Emergency Management Disaster District Coordinator. DIR says it’s committed to providing the resources necessary to bring affected entities “back online.”

The DIR says it is continuing to investigate the origin of the attack, and currently believes that the attack came from a "single threat actor." The agency says the State of Texas systems and networks have not been affected.

Elliot Sprehe, press secretary for the department, said theDIR was working to confirm which government entities are affected and said other information was still coming in. 

"It looks like we found out earlier today, but we’re not currently releasing who’s impacted due to security concerns,” he said.

KUT Austin:     TexasGov:    DallasNews:     Bleeping Computer:

You Might Also Read:

Florida Municipality Suffers Cyber Extortion:

Only In Texas: Ransomware Steals Data From Police:

 

« The EU's New Cybersecurity Certification Framework
Cyber Strategy & Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Zybert Computing

Zybert Computing

Zybert Computing provide server solutions with built-in security and information protection features for the SME market.

Digital Gurus Recruitment

Digital Gurus Recruitment

Digital Gurus provide specialist recruitment services in areas including IT and information security

National Cyber Security Centre Finland (NCSC-FI)

National Cyber Security Centre Finland (NCSC-FI)

The NCSC-FI develops and monitors the operational reliability and security of communications networks and services in Finland.

Spanish National Cybersecurity Institute (INCIBE)

Spanish National Cybersecurity Institute (INCIBE)

INCIBE undertakes research, service delivery and coordination for building cybersecurity at the national and international levels.

Vitrociset

Vitrociset

Vitrociset design complex systems for defence, homeland security, space and transport. Activities include secure communications and cybersecurity.

Cyber Risk Opportunities

Cyber Risk Opportunities

Cyber Risk Opportunities was formed to enable middle-market executives to become more proficient cyber risk managers so their organizations can thrive.

Gita Technologies

Gita Technologies

Gita Technologies works to create integrated solutions to the thorniest problems in the field of intelligence and cyber today.

Swedish Board for Accreditation and Conformity Assessment (SWEDAC)

Swedish Board for Accreditation and Conformity Assessment (SWEDAC)

SWEDAC is the national accreditation body for Sweden. The directory of members provides details of organisations offering certification services for ISO 27001.

Thomsen Trampedach

Thomsen Trampedach

Thomsen Trampedach offers a tailored-made brand protection solution to each customer using a proprietary enforcement automation and reporting tool and a multilingual enforcement team.

HSB

HSB

HSB offers insurance for equipment breakdown, cyber risk, data breach, identity recovery & employment practices liability.

SubCom

SubCom

How Much Do You Trust Your Endpoint? With our ‘Habituation Neural Fabric’ based endpoint security platform, you can observe and manage the Trust Score of your endpoints in real-time.

SideChannel

SideChannel

At SideChannel, we match companies with an expert virtual CISO (vCISO), so your organization can assess cyber risk and ensure cybersecurity compliance.

Cylab - Carnegie Mellon University

Cylab - Carnegie Mellon University

Carnegie Mellon University CyLab is the University's security and privacy research institute.

Coffee Cup Solutions

Coffee Cup Solutions

We offer a full spectrum of IT Services, from our UK based Helpdesk to IT Consultancy and Cyber Security. Our team has the skills and experience to develop, deliver and manage IT for your business.

Zluri

Zluri

Zluri is a cloud-native SaaSOps platform enabling modern enterprises with SaaS Management and Identity Governance.

RapidFort

RapidFort

RapidFort’s Software Attack Surface Optimization Platform remediates 95% of software vulnerabilities in minutes without code changes.