IE 11 Not Supported

For optimal browsing, we recommend Chrome, Firefox or Safari browsers.

Texas County Sheriff's Office Suffers Ransomware Attack

Hackers claim they stole data from the Cooke County Sheriff’s Office and are threatening to publish it online if their demands are not met. Attacks of this kind are trending across the country.

Ransomware
Shutterstock
Hackers attacked the Sheriff's Office for Cooke County, Texas, over the weekend, apparently stealing some of the law enforcement agency's data in the process.

Statements made in online message boards seem to suggest that the hackers stole potentially sensitive data which included "information related to both past and ongoing [police] cases," said Brett Callow, threat analyst with Emsisoft. The Sheriff's Office could not be reached for comment.

County spokesperson Cathy Lloyd said that she had been made aware of the ransomware incident over the weekend, but could not provide any further information. County officials have so far not confirmed that data was stolen, nor commented on the nature of the ransom. 

The cybercriminals responsible for the incident are apparently affiliated with REvil ransomware — and have threatened to start releasing the agency's data within seven days if their financial demands are not met. REvil is the same strain of malware that struck over 20 different Texas communities simultaneously last summer

The attack on Cooke County is only the most recent incident in a rising trend — as hackers have increasingly used malicious malware not just to encrypt but also steal government data.

"Cooke County is at least the fifth U.S. municipality to have had data stolen by a ransomware group and the fourth to have the stolen data published — one paid to prevent publishing. There may be others that we do not know about," said Callow.

Most recently, ransomware victim Knoxville, Tenn., saw some of its data published online, as hackers sought to coerce officials into meeting ransom demands. Kristin Farley, Knoxville's director of communications, said in an email that her city continues to monitor the situation.

"The data is being published on a site created by the threat actor to shame victims who choose not to pay the ransom and as additional leverage to seek payment of the ransom," reads a statement provided by Farley. "We are working diligently, with the assistance of our third-party computer forensic specialists, to review the data published by the threat actor and confirm the full extent of data that is impacted."

While successful ransomware attacks on government agencies declined slightly during the beginning of the stateside COVID-19 pandemic, those numbers appear to be climbing again.

As the attacks have continued, public officials have continually agreed to pay criminals for their data, thus validating the business model. A good example is the University of California, San Francisco, which recently agreed to pay hackers $1.14 million in exchange for data stolen in May

"If organizations would follow the advice of law enforcement agencies and stop paying ransoms, ransomware would become a thing of the past," said Callow, adding that if governments continue to pay, "the outcome will be a vicious circle in which the criminals become ever better resourced and able to invest in ramping up the scale and sophistication of their operations." 

Lucas Ropek is a former staff writer for Government Technology.
Special Projects
Sponsored Articles
  • Sponsored
    Smart cities could transform urban living for the better. However, in order to mitigate the risks of cyber threats that can be exacerbated by inadequately secured and mobile edge computing (MEC) technologies, government officials should be aware of smart cities security concerns associated with their supporting infrastructure.
  • Sponsored
    How the convergence of security and networking is accelerating government agencies journey to the cloud.
  • Sponsored
    Microsoft Teams quickly became the business application of choice as state and local governments raced to equip remote teams and maintain business continuity during the COVID-19 lockdown. But in the rush to deploy Teams, many organizations overlook, ignore or fail to anticipate some of the administrative hurdles to successful adoption. As more organizations have matured their use of Teams, a set of lessons learned has emerged to help agencies ensure a successful Teams rollout – or correct course on existing implementations.
  • Sponsored
    Five Key Criteria for Selecting the Right Technology Solution for Communications and Notifications