Another US state government hit with ransomware, following a brief reprieve
Louisiana becomes the latest in a very long line of US public sector bodies to fall victim to ransomware


Louisana's state government has responded to a suspected ransomware attack by shutting down many of its websites and email systems.
Every agency in the state (population 4.6 million) has been affected by the shutdown following the attack which follows a spate of other ransomware onslaughts targeting small US towns and cities in recent months.
Governor John Bel Edwards confirmed the attack via Twitter, saying the Office of Technology Services (OTS) identified a "cyber security threat" and immediately initiated its security protocols, taking servers down - an action which affected many online services.
Edwards also confirmed that the OTS said the attack was "similar" to the ransomware which plagued the other affected US towns and cities of over the summer.
40% of cybersecurity professionals think paying ransomware demands should be illegal Ex White House CIO attacks insurance firms for 'fuelling ransomware industry' The most popular ransomware strains targeting UK businesses
"There is no anticipated data loss and the state did not pay a ransom," he added. "LA State Police and several federal agencies are investigating this attempted ransomware attack."
Not much is known about the type of ransomware attack that has crippled computer systems across the US this year other than the small information that has been leaked from each report.
Following the simultaneous attack on 22 Texas municipalities, we know that the ransomware attack exploited the island hopping method of infiltration, thanks to confirmation from the mayor Keene Gary Heinrich.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
We also know that the attacks have been successful in some cases. When two Florida towns were hit in as many weeks, IT Pro reported that both towns paid the collective $1.1 million ransom (£850,000) to get their systems back online - a practice widely condemned in the industry.
The ransomware attack on the city of Baltimore was reportedly caused by the Robin Hood strain but it's not clear if the same strain has been the culprit of the other attacks.
The wave of attacks over the summer prompted the FBI to seek private sector support, according to reports of a closed-door meeting held back in September 2019.
The number of US public sector ransomware attacks doubled in 2019 and the invitation for private-public sector collaboration was described as an unprecedented admission from the FBI that it needs private sector assistance to augment investigatory powers.
Although the official number of attacks doubled, it's believed the number is much higher and often attacks simply go unreported.

Connor Jones has been at the forefront of global cyber security news coverage for the past few years, breaking developments on major stories such as LockBit’s ransomware attack on Royal Mail International, and many others. He has also made sporadic appearances on the ITPro Podcast discussing topics from home desk setups all the way to hacking systems using prosthetic limbs. He has a master’s degree in Magazine Journalism from the University of Sheffield, and has previously written for the likes of Red Bull Esports and UNILAD tech during his career that started in 2015.
-
Data center water consumption is out of control, but cloud providers want EU lawmakers to go easy on them
News The European Commission says water shortages are being exacerbated by leaks and pollution, but also points to high usage from data center operators.
-
British IT worker jailed for revenge attack on employer that caused a “ripple effect of disruption” for colleagues and customers
News West Yorkshire man Mohammed Umar Taj was suspended from his job in Huddersfield in July 2022, and began taking revenge within hours.
-
Ransomware victims are getting better at haggling with hackers
News While nearly half of companies paid a ransom to get their data back last year, victims are taking an increasingly hard line with hackers to strike fair deals.
-
LockBit data dump reveals a treasure trove of intel on the notorious hacker group
News An analysis of May's SQL database dump shows how much LockBit was really making
-
‘I take pleasure in thinking I can rid society of at least some of them’: A cyber vigilante is dumping information on notorious ransomware criminals – and security experts say police will be keeping close tabs
News An anonymous whistleblower has released large amounts of data allegedly linked to the ransomware gangs
-
It's been a bad week for ransomware operators
News A host of ransomware strains have been neutralized, servers seized, and key players indicted
-
Everything we know about the Peter Green Chilled cyber attack
News A ransomware attack on the chilled food distributor highlights the supply chain risks within the retail sector
-
Scattered Spider: Who are the alleged hackers behind the M&S cyber attack?
News The Scattered Spider group has been highly active in recent years
-
Ransomware attacks are rising — but quiet payouts could mean there's more than actually reported
News Ransomware attacks continue to climb, but they may be even higher than official figures show as companies choose to quietly pay to make such incidents go away.
-
Cleo attack victim list grows as Hertz confirms customer data stolen – and security experts say it won't be the last
News Hertz has confirmed it suffered a data breach as a result of the Cleo zero-day vulnerability in late 2024, with the car rental giant warning that customer data was stolen.