Hacked Texas government agencies face $2.5 million ransom
The number of affected municipalities has dropped to 22, all of which are refusing to pay up


The hackers who launched simultaneous ransomware attacks on Texas State government municipalities have reportedly demanded a $2.5 million payout to unlock the infected systems.
As more details trickle out about the case which was previously spoken about with great restriction from investigating authorities, it has been revealed that the number of affected government entities has dropped from 23 to 22.
Responders have identified and engaged all of those affected and are working to regain control and access to the systems. No ransoms have been paid as of yet, according to Elliott Sprehe, a DIR spokesperson who spoke to NPR.
The Texas State Department of Information Resources (DIR), a government information portal providing technology advice to state authorities, noted that "more than 25% of impacted entities have transitioned from response and assessment to remediation and recovery, with a number of entities back to operations as usual".
Most of the affected departments were based in rural locations and only two of the 22 affected departments have released statements regarding their respective attacks.
"This attack has impacted normal City business and financial operations and services, however, the City has implemented its continuity of operation plans and the City continues to provide basic and emergency services (Police, Fire, 9-1-1, Animal Control, Water, Wastewater and Solid Waste Collection)," said officials from the City of Borger.
"Currently, Vital Statistics (birth and death certificates) remains offline, and the City is unable to take utility or other payments.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"Based on the current state of the forensic investigation, it appears that no customer credit card or other personal information on the City of Borger's systems have been compromised in this attack. No further information about the origins of the attack will be released until the completion of the investigation."
The other city to have spoken out about the attack is Keene, the mayor of which said the hacker used island hopping, an increasingly popular method of cyber attack to breach the city's IT systems.
"They got into our software provider, the guys who run our IT systems," said Keene Mayor Gary Heinrich to NPR. "A lot of folks in Texas use providers to do that, because we don't have a staff big enough to have IT in house."
Heinrich added that many other targeted municipalities also use the same managed service provider (MSP).
"US government bodies have recently been a major target for ransomware attackers as they have been seeing huge payouts from their attacks, with numerous governments giving into attacker demands and reportedly paying ransoms," said Robert Ramsden-Board, VP of EMEA at Securonix.
"It is therefore not surprising the attackers in this instance are demanding such a huge amount of money - if it worked with previous government agencies, why should it work again?
"However, it generally is never recommended to pay ransom demands as this only fuels the industry. Instead, the best defence against ransomware is a comprehensive security program that protects against known threats and malicious intent or behaviour."
Heinrich was the individual to disclose the $2.5 million ransom demand and said that everything that's done at City Hall is impacted.
19/08/2019: Texas government sites hit by coordinated ransomware attack
A coordinated wave of ransomware attacks successfully struck 23 government entities simultaneously in Texas on Friday morning.
All 23 sites, which have so far been kept anonymous by the State of Texas, reported difficulties accessing the Department of Information Resources (DIR), a government information portal providing technology advice to state authorities.
So far it's unclear precisely what damage has been caused by the attacks, however, investigators have said they believe that based on its timing it's likely it came from a single source.
All government entities that have been affected or could potentially be affected have been notified, although it has been confirmed that Texas State systems and networks remain operational.
The DIR, FBI, FEMA, Texas A&M University, the Texas military department and a host of others are being deployed to lend assistance to the affected entities.
"Investigations into the origin of this attack are ongoing; however, response and recovery are the priority at this time," said the DIR.
"In addition to the regular 'hacker's benefits' of gaining access to customer data, an attacker who penetrates a city's system may get access to sensitive residents information," said Liron Barak, CEO at BitDam. "Depending on the IT structure of the targeted local government, hackers can have an impact on multiple systems, beyond just customer information databases.
"From an attacker's perspective, the potential in hacking a city is much higher than the potential in hacking a commercial organisation," she added. "In addition, local governments tend to communicate with a wide variety of businesses and individuals, with many of them being one time contacts. This makes them more vulnerable to attacks, as their employees don't know most of the contacts with whom they communicate in person."
Although 23 is a significant number, it's actually a comparatively small number in terms of the total 5,343 government entities there are in Texas. At this time, it's unclear how many were targeted compared to how many were successfully infected.
The type of ransomware has been identified as '.JSE', according to a local source speaking to ZDNet.
Operating differently to most other ransomwares, .JSE doesn't leave a ransom note behind after it encrypts files and adds the .JSE extension to the end.
It's the latest in a string of ransomware attacks on smaller US targets in recent months. In May, the city of Baltimore was hit by ransomware that crippled its public services, including those that control tax payments, water bills and parking tickets. This was followed a month later by attacks on two Floridian towns, both within the same week.
"Not only have ransomware attacks been growing, but the amounts they have been demanding has been getting higher, and there has been more specific targeting of victims," said Javvad Malik, security awareness advocate at KnowBe4.
"Recently Florida city agreed to pay $600,000 in ransomware after being affected," he added. "So this co-ordinated attack against Texas may be as a result of seeing how cities or city departments are potentially willing to pay a ransom."

Connor Jones has been at the forefront of global cyber security news coverage for the past few years, breaking developments on major stories such as LockBit’s ransomware attack on Royal Mail International, and many others. He has also made sporadic appearances on the ITPro Podcast discussing topics from home desk setups all the way to hacking systems using prosthetic limbs. He has a master’s degree in Magazine Journalism from the University of Sheffield, and has previously written for the likes of Red Bull Esports and UNILAD tech during his career that started in 2015.
-
Prolific ransomware operator added to Europe’s Most Wanted list as US dangles $10 million reward
News The US Department of Justice is offering a reward of up to $10 million for information leading to the arrest of Volodymyr Viktorovych Tymoshchuk, an alleged ransomware criminal.
-
Jaguar Land Rover “did the right thing” shutting down systems to thwart cyber attack
News The attack on Jaguar Land Rover highlights the growing attractiveness of the automotive sector
-
Ransomware attack on IT supplier disrupts hundreds of Swedish municipalities
News The attack on IT systems supplier Miljödata has impacted public sector services across the country
-
A notorious hacker group is ramping up cloud-based ransomware attacks
News The Storm-0501 threat group is refining its tactics, according to Microsoft, shifting away from traditional endpoint-based attacks and toward cloud-based ransomware.
-
Security researchers have just identified what could be the first ‘AI-powered’ ransomware strain – and it uses OpenAI’s gpt-oss-20b model
News Using OpenAI's gpt-oss:20b model, ‘PromptLock’ generates malicious Lua scripts via the Ollama API.
-
Data I/O shuts down systems in wake of ransomware attack
News Regulatory filings by Data I/O suggest the costs of dealing with the attack could be significant
-
Average ransom payment doubles in a single quarter
News Targeted social engineering and data exfiltration have become the biggest tactics as three major ransomware groups dominate
-
BlackSuit ransomware gang taken down in latest law enforcement sting – but members have already formed a new group
News The notorious gang has seen its servers taken down and bitcoin seized, but may have morphed into a new group called Chaos