Another US state government hit with ransomware, following a brief reprieve
Louisiana becomes the latest in a very long line of US public sector bodies to fall victim to ransomware
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
Louisana's state government has responded to a suspected ransomware attack by shutting down many of its websites and email systems.
Every agency in the state (population 4.6 million) has been affected by the shutdown following the attack which follows a spate of other ransomware onslaughts targeting small US towns and cities in recent months.
Governor John Bel Edwards confirmed the attack via Twitter, saying the Office of Technology Services (OTS) identified a "cyber security threat" and immediately initiated its security protocols, taking servers down - an action which affected many online services.
Edwards also confirmed that the OTS said the attack was "similar" to the ransomware which plagued the other affected US towns and cities of over the summer.
40% of cybersecurity professionals think paying ransomware demands should be illegal Ex White House CIO attacks insurance firms for 'fuelling ransomware industry' The most popular ransomware strains targeting UK businesses
"There is no anticipated data loss and the state did not pay a ransom," he added. "LA State Police and several federal agencies are investigating this attempted ransomware attack."
Not much is known about the type of ransomware attack that has crippled computer systems across the US this year other than the small information that has been leaked from each report.
Following the simultaneous attack on 22 Texas municipalities, we know that the ransomware attack exploited the island hopping method of infiltration, thanks to confirmation from the mayor Keene Gary Heinrich.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
We also know that the attacks have been successful in some cases. When two Florida towns were hit in as many weeks, IT Pro reported that both towns paid the collective $1.1 million ransom (£850,000) to get their systems back online - a practice widely condemned in the industry.
The ransomware attack on the city of Baltimore was reportedly caused by the Robin Hood strain but it's not clear if the same strain has been the culprit of the other attacks.
The wave of attacks over the summer prompted the FBI to seek private sector support, according to reports of a closed-door meeting held back in September 2019.
The number of US public sector ransomware attacks doubled in 2019 and the invitation for private-public sector collaboration was described as an unprecedented admission from the FBI that it needs private sector assistance to augment investigatory powers.
Although the official number of attacks doubled, it's believed the number is much higher and often attacks simply go unreported.

Connor Jones has been at the forefront of global cyber security news coverage for the past few years, breaking developments on major stories such as LockBit’s ransomware attack on Royal Mail International, and many others. He has also made sporadic appearances on the ITPro Podcast discussing topics from home desk setups all the way to hacking systems using prosthetic limbs. He has a master’s degree in Magazine Journalism from the University of Sheffield, and has previously written for the likes of Red Bull Esports and UNILAD tech during his career that started in 2015.
-
Ransomware gangs are sharing virtual machines to wage cyber attacks on the cheap – but it could be their undoingNews Thousands of attacker servers all had the same autogenerated Windows hostnames, according to Sophos
-
Google issues warning over ShinyHunters-branded vishing campaignsNews Related groups are stealing data through voice phishing and fake credential harvesting websites
-
The FBI has seized the RAMP hacking forum, but will the takedown stick? History tells us otherwiseNews Billing itself as the “only place ransomware allowed", RAMP catered mainly for Russian-speaking cyber criminals
-
Everything we know so far about the Nike data breachNews Hackers behind the WorldLeaks ransomware group claim to have accessed sensitive corporate data
-
There’s a dangerous new ransomware variant on the block – and cyber experts warn it’s flying under the radarNews The new DeadLock ransomware family is taking off in the wild, researchers warn
-
Hacker offering US engineering firm data online after alleged breachNews Data relating to Tampa Electric Company, Duke Energy Florida, and American Electric Power was allegedly stolen
-
Cybersecurity experts face 20 years in prison following ransomware campaignTwo men used their tech expertise to carry out ALPHV BlackCat ransomware attacks
-
15-year-old revealed as key player in Scattered LAPSUS$ HuntersNews 'Rey' says he's trying to leave Scattered LAPSUS$ Hunters and is prepared to cooperate with law enforcement

