A random ransomware attack has managed to disrupt the entire networking frameworks of the state court systems’ computers. The attack, which came in the late hours of the night, caught everyone off guard as it managed to make almost all the computers that had been connected to the affected network, go offline. This has resulted in sensitive data being compromised and being open to further ransomware and malware attacks.
Reports of the attack began surfacing early on Monday morning. Even at that time, no one had a clear idea of what exactly was happening or how big a problem this could turn into. However, by the afternoon it was announced by the Information technology staff that the threat had been contained and would not be able to affect anymore computers as the access to the compromised network had been cut off.
Furthermore, the officials revealed that there were rigorous efforts underway to ensure that the computers that had been compromised would be able to recover. Ransomware removal tools and various other techniques have also been put into use to ensure that no vital information is lost or compromised any further.
A similar bug was reported to have hit other agencies in the past month. There were a total of 100 computers that had been infected. They employed the use of both in-house information technology resources as well as external help to remove the ransomware. It was not made public that which ransomware removal tool had been used except that the attack had left 535 servers and a further 114 sub-servers compromised.
Although a spokesperson revealed that most of these were test servers and the reason they had fallen under attack was because their firewalls had been deliberately kept on minimum levels. Additionally, she reiterated that any potential loss of sensitive information had been prevented.
A detailed report which was released yesterday stated that the virus spread through an email attachment that contained a malicious link or infected software. It comes as an unusual surprise as ransomware programs mostly target private corporations and stay away from the government agencies to avoid any serious federal lawsuits.
By Wednesday, most of the servers that had been shut down as a precautionary measure began coming back online.
For assistance with file recovery and ransomware removal, please contact MonsterCloud – cyber security experts for a professional ransomware removal.