Learn more about the latest ESG updates from the SEC. ...
This site uses cookies to ensure that we give you the best user experience. Cookies assist in navigation, analyzing traffic and in our marketing efforts as described in our Privacy Policy.
Learn more about the Washington County, PA ransomware attack and key security controls that can help prevent similar cyber-attacks.
On January 19, 2024, a cyber-attack was identified by Washington County officials which eventually became a full-blown ransomware attack by January 24. The attack created major problems for the county’s network and computer systems and resulted in a ransomware payment of nearly $350,000.
The county’s information technology department worked with federal investigators and third-party cyber experts to combat the attack and prevent the malware from spreading to other systems while trying to understand the logistics surrounding various aspects of the breach.
On February 5, digital forensic consultant Sylint confirmed to the county officials that threat actors had obtained “large amounts of data” from the county’s network that could be “injurious to the county and its residents” if it were to be released on the dark web.
The deadline to pay the ransom was set for 3:30 pm on February 6. On February 6, county officials held an emergency meeting to vote on paying the ransom. In a 2-1 vote by the commissioners, a payment was authorized of up to $400,000, to be paid through cryptocurrency firm DigitalMint.
A payment of $346,687 was sent to the threat actor(s) in exchange for the “digital encryption key” that was to unlock the county’s system with an understanding that none of the private information would be shared on the dark web.
Cyber criminals are continuously working on ways to exploit both public and private organizational information technology systems for monetary gain.
Accordingly, businesses and government organizations are working to identify appropriate investments in protective, detective and responsive capabilities to mitigate the risk of a breach. The following list identifies important recommendations for any organization looking to improve their cyber hygiene:
These are just some of the high-priority capabilities that organizations should be looking to implement with regularity to ensure that they are maintaining proper cyber hygiene and readiness to avoid becoming the victim of a breach.
There will always be the risk of a cyberattack, but knowing the proper precautions to take will help to mitigate the impact if or when a breach does occur.
The Schneider Downs cybersecurity practice consists of experts offering a comprehensive set of information technology security services, including penetration testing, intrusion prevention/detection review, ransomware security, vulnerability assessments and a robust digital forensics and incident response team. In addition, our Digital Forensics and Incident Response teams are available 24x7x365 at 1-800-993-8937 if you suspect or are experiencing a network incident of any kind.
Want to be in the know? Subscribe to our bi-weekly newsletter, Focus on Cybersecurity, at 8o35.4dian8.com/subscribe.
To learn more, visit our dedicated Cybersecurity page.
We’d love to hear from you. Drop us a note, and we’ll respond to you as quickly as possible.
Ask us
[email protected]
p:412.261.3644
f:412.261.4876
[email protected]
p:614.621.4060
f:614.621.4062
[email protected]
p:571.380.9003