• Cyber Security
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware File Recovery
    • Ransomware Types
  • Ransomware Services
    • Ransomware Removal
    • Ransomware File Recovery
  • News
  • Tutorials
  • Ransomware TV

Hidalgo County hit by ransomware

November 19, 2018Simeon Georgiev

Cyberworld has particularly seen a rise in ransomware activity attacking public entities in the ongoing year. From the cryptovirological attack on Colorado’s transportation system to the municipal breakdown in Atlanta city, ransomware operators have wreaked havoc among the public sector entities. Some targeted organizations even paid extortion money to the attackers for ransomware removal.

In the most recent such incident, it has been reported that Hidalgo County, Texas has recently suffered a ransomware attack. The attackers actually targeted the Hidalgo County Sheriff Office (HCSO) with the cryptovirological strain. Many details regarding the attack are still missing. For instance, the amount attackers asked for ransomware removal is not known yet. Similarly, we don’t know what ransomware strain was used in the attack.

Negligence might be the reason

According to the reports, ransomware targeted a computer device in the east substation of the sheriff’s office. The affected computer was one of only two HCSO’s devices that are part of the office’s Internet-based network.

It is important to mention here that these computers didn’t have restrictions similar to the devices operating on the internal server. For instance, people can’t use Facebook or say Craigslist on the internal devices. However, such restrictions were not placed on the affected computer. This implies that compromised web domains might have been used by the attackers to deliver the payload of the cryptovirological script on the targeted computer.

It has also been reported that the county administration dealt with ransomware removal on its own without paying a dime to the attackers and the affected computer was restored within a week. Experts think that Hidalgo County’s digital system has avoided a major cyber breakdown because of its limited internet connectivity and other implemented restrictions. If that was not the case, then the damage from that attack would have been much greater.

Simeon Georgiev
https://www.linkedin.com/in/simeon--georgiev/
I am a Cyber Security Enthusiast from Bulgaria. I like to write about malware and ransomware and global cyber attacks. You can reach me on Twitter @sgeorgiev1995 or Email: [email protected]
Previous post Colorado’s CTO emphasizes on layered security Next post Devising Ransomware Protection Against Data Backups – Part 1

Related Articles

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

January 27, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Ransomware: 4 Types of the Latest Trend in Cybercrimes

February 1, 2018Simeon Georgiev
Ransomware: 4 Types of the Latest Trend in Cybercrimes

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

February 1, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Latest on Ransomware TV

https://vimeo.com/399908876?loop=0

Recent Posts

  • How to protect your organization against ransomware reinfections
  • AuKill Helps Ransomware Operators Disable EDR and Security Tools
  • AI-ransomware is a real threat, just not a realistic one yet
  • Rorschach is the new speed king in the ransomware space
  • The Role of Supply Chain Breaches in Ransomware Attacks

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • Cyber Security
    • Ransomware File Recovery
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware Types
  • News
  • Tutorials

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

More

  • BECOME A CONTRIBUTOR

MonsterCloud Reviews

© 2020 MonsterCloud.com. All Rights Reserved.