Back to Ransomware

Ransomware

Louisiana government victim of a ransomware attack.

On November 18, 2019, several agencies of the Louisiana government reported a ransomware attack. The Office of Technology Services immediately took steps to take the state websites and many online government services offline to prevent the attack from spreading.

What happened?

As soon as the attack occurred, Louisiana State Police and several federal agencies launched an investigation. Fortunately, they had backup data which helped them restore affected online services and state websites, so they did not have to pay ransom to the attackers in order to recover their data.

“While it is nearly impossible to prevent all cyberattacks, because we have prioritized improving Louisiana’s cybersecurity capabilities, we were able to quickly neutralize the threat. The majority of the service interruption seen by employees and the public yesterday was due to our aggressive actions to combat the attack,” Commissioner of Administration Jay Dardenne said. The state office confirmed after a day that online and email services were restored, although full service restoration might take several days.

This is not the first time government has been affected by a ransomware attack. In September 2019, a city in Massachusetts was a victim of a ransomware attack demanding a 5.3 million ransom, and in August 2019, more than 20 government entities in Texas were affected by a series of ransomware attacks.

Want to stay one step ahead of the attackers? Invest in a tool like ManageEngine DataSecurity Plus to secure data and mitigate ransomware attacks. Download a 30-day, free trial of DataSecurity Plus today.

How ManageEngine can help.

Investing in a ransomware detection tool helps you detect and respond to ransomware attacks in real time to minimize the impact on your organization. Here are some best practices DataSecurity Plus can help you implement to handle ransomware attacks.

  • Detect ransomware with real-time mass access alerts. Monitor the frequency of file modifications by a user, and issue alerts whenever the number of modifications crosses a threshold within a specified time.
  • Quarantine ransomware and shut down infected devices with a customizable and automated response system. Set automated alert responses through the execution of a batch file to respond to mass access alerts.
  • View in-depth details of events for further investigation. Generate customizable, audit-ready reports on all file-related changes, access attempts, and share permissions.

ManageEngine DataSecurity Plus has the ability to perform all of these best practices, and can automatically identify and mitigate ransomware threats. Start your free, 30-day trial of DataSecurity Plus today.

Share:

Latest DoS and DDoS attacks

Latest Brute force attack

Latest Crypto ransomware

Latest Advanced persistent threat (APT)

Compliance violation

Stay In The Know

Subscribe to our digest to get your weekly dose of cyber security updates straight to your inbox.

Please enter a business email id
 

By clicking 'I’m interested', you agree to processing of personal data according to the Privacy Policy

© 2019 Zoho Corporation Pvt. Ltd. All rights reserved.

+

Stay In The Know

Thank you

You will receive weekly cybersecurity news soon!

  • Please enter a business email id
  •  
  •  
    By clicking 'I'm Interested', you agree to processing of personal data according to the Privacy Policy.