Ransomware Hits Texas For Six

The Hackers who have struck a large number of local  government agencies acrossTexas with file-encrypting malware recently may have done it by compromising a managed service provider.  The attacker has now demanded a collective ransom of $2.5 million, the mayor of one municipality has said. 

The Texas Department of Information Resources (DIR) first  said on the 16th August that it was leading the response to a coordinated ransomware attack that had struck local governments across Texas. The number of local government entities in Texas affected by a ransomware attack has ow riseen to 23.

By planting malicious code inside agencies' information systems, digital intruders are able to exploit relatively unsophisticated or out-of-date cyber defenses and inhibit computer access. Affected users are then asked to pay a ransom, almost always in mostly untraceable bitcoin, to regain control of their systems. Whether Texas officials had been asked to do so was unknown. 

In 2016, global ransomware attempts rocketed to 638 million from just 4 million the year before, according to SonicWall, a  Californian network security firm.

Now the Department of Information Resources advises jurisdictions that have been impacted to contact their local Texas Department of Emergency Management Disaster District Coordinator. DIR says it’s committed to providing the resources necessary to bring affected entities “back online.”

The DIR says it is continuing to investigate the origin of the attack, and currently believes that the attack came from a "single threat actor." The agency says the State of Texas systems and networks have not been affected.

Elliot Sprehe, press secretary for the department, said theDIR was working to confirm which government entities are affected and said other information was still coming in. 

"It looks like we found out earlier today, but we’re not currently releasing who’s impacted due to security concerns,” he said.

KUT Austin:     TexasGov:    DallasNews:     Bleeping Computer:

You Might Also Read:

Florida Municipality Suffers Cyber Extortion:

Only In Texas: Ransomware Steals Data From Police:

 

« The EU's New Cybersecurity Certification Framework
Cyber Strategy & Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Biscom

Biscom

Biscom offers solutions for secure file transfer, synchronization, file translation, and mobile devices, designed to deliver mission-critical reliability, streamline workflows and reduce costs.

Irish Reporting & Information Security Service (IRISS)

Irish Reporting & Information Security Service (IRISS)

IRISS-CERT is Ireland's first CSIRT (Computer Security Incident Response Team) to provide services to all users within Ireland.

Opengear

Opengear

Opengear ensures network resilience to enterprises by enabling business continuity with the Network Resilience Platform.

Silicon:SAFE

Silicon:SAFE

Silicon:SAFE develops impenetrable hardware solutions that prevent bulk data theft during a cyber-attack.

Vaulto Technologies

Vaulto Technologies

Vaulto protects critical business processes that are conducted via the cellular network.

Living Security

Living Security

Living Security specializes in metric driven and engaging security awareness solutions that reduce risk by increasing security culture and changing employee behaviour.

NLnet Labs

NLnet Labs

NLnet Labs is a not-for-profit foundation with a long heritage in research and development, Internet architecture and governance, as well as security in the area of DNS and inter-domain routing.

Apptega

Apptega

Apptega is an award-Winning Cybersecurity and Compliance Platform. Our mission is to make cybersecurity and compliance easy for everyone.

Amnesty Tech

Amnesty Tech

Amnesty Tech's Security Lab leads technical investigations into cyber-attacks against civil society and provides critical support when individuals face such attacks.

Contextual Security Solutions

Contextual Security Solutions

Contextual Security Solutions is a leading provider of penetration testing services and IT security & compliance audits.

Resilience Cyber insurance

Resilience Cyber insurance

Resilience helps to improve cyber resilience by connecting cyber insurance coverage with advanced cybersecurity visibility and a shared plan to reinforce great cyber hygiene.

NetHope

NetHope

NetHope is a membership-based organization serving the international nonprofit humanitarian, development, and conservation sector through digital transformation.

Avanade

Avanade

Avanade is a leading provider of innovative digital, cloud and advisory services, industry solutions and design-led experiences across the Microsoft ecosystem.

Aardwolf Security

Aardwolf Security

Aardwolf Security specialise in penetration testing to the highest standards set out by OWASP. We ensure complete client satisfaction and aftercare.

DataProof Communications

DataProof Communications

DataProof Communications is Cybersecurity Company specialising in cybersecurity operations, incident management and response best practices and technologies.

Blackwired

Blackwired

Blackwired has established a new category in cyber security with an intelligence-led model based on the USMC’s Combat Hunter programme ‘Left of Bang’.