Sunday, April 27, 2025
HomeRansomwareMassive Ryuk Ransomware Attack on Entire Computers of Jackson County, Georgia ...

Massive Ryuk Ransomware Attack on Entire Computers of Jackson County, Georgia – $400,000 Ransom Paid

Published on

SIEM as a Service

Follow Us on Google News

Rural Jackson County, Georgia computer systems are infected with Massive Ryuk ransomware attack that leads to shut down all the operations.

Since there is no way to recover the files back without the decryption key, officials paid $400,000 as a ransom amount to cybercriminals in order to recover the infected system.

Authorities Confirmed that the ransomware infected throughout all the department’s systems on March 1.

- Advertisement - Google News

Threat actors used Ryuk, a powerful Ransomware to conduct this cyber attack and successfully infect all around IT systems that managed by Jackson County, Georgia.

Newly spreading Ryuk Ransomware campaign targeting various enterprise network around the globe and encrypting various data in storage, personal computers, and data center.

Mainly Ryuk distributed via massive spam campaigns and exploit kits and there is some specific operation such as extensive network mapping, hacking, and credential collection required before each operation.

In This case, Ransomware attack take down the entire county government’s email system is offline, and some departments, including law enforcement.

During the time in between attack and recovery, all the operation had to resort to conducting entirely on paper officials said to statescoop.

According to Sheriff Janis Mangum, “Everything we have is down,” “We are doing our bookings the way we used to do it before computers. We’re operating by the paper in terms of reports and arrest bookings. We’ve continued to function. It’s just more difficult.”

Initially, this attack publicly disclosed by county officials on 11alive and they confirmed that all departments were impacted. They’re now working to restore the 911 and emergency systems first.

Also Read: Ransomware Attack Response and Mitigation Checklist

“Since the attack includes our emails, communication has been tricky but our phones still work so we are doing everything possible to keep things running as smoothly as we can,” a spokesperson said by Facebook on Wednesday.

Since there is no way out $400,000 amount ransom were paid and County officials are in the process of decrypting computers and servers a week after the first signs of an attack, said Jackson County Manager Kevin Poe on Friday.

Attackers only demand to pay via bitcoin that makes impossible to track the attacker back ,so the county hired a cyber-security response consultant with experience in negotiating with hackers, Poe said.

Finally, consultants paid the ransom amount via bitcoin and also In dealing with the FBI and cybersecurity experts, this is one of the most sophisticated attacks they have ever seen in the U.S.,” Jackson County Manager Poe said.

Cyber criminals really well planned before execute this attack which crippled the entire system of Jackson County.

Its unclear that who was behind this massive attack, FBI believes that the group of cyber criminals operated this attack from eastern Europe.

Learn : Certified Advanced Persistent Threat Analyst online

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

A Scary Evolution & Alliance of TrickBot, Emotet and Ryuk Ransomware Attack

Hackers Spreading JCry Ransomware that Infecting Windows users via Compromised Websites

Ryuk Ransomware Attack on various Enterprise Network Around the World & Earned $640,000

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

How To Use Digital Forensics To Strengthen Your Organization’s Cybersecurity Posture

Digital forensics has become a cornerstone of modern cybersecurity strategies, moving beyond its traditional...

Building A Strong Compliance Framework: A CISO’s Guide To Meeting Regulatory Requirements

In the current digital landscape, Chief Information Security Officers (CISOs) are under mounting pressure...

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...

New AI-Generated ‘TikDocs’ Exploits Trust in the Medical Profession to Drive Sales

AI-generated medical scams across TikTok and Instagram, where deepfake avatars pose as healthcare professionals...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

DragonForce and Anubis Ransomware Gangs Launch New Affiliate Programs

Secureworks Counter Threat Unit (CTU) researchers have uncovered innovative strategies deployed by the DragonForce...

Threat Actors Target Organizations in Thailand with Ransomware Attacks

Thailand is experiencing a significant escalation in ransomware attacks, with both state-sponsored advanced persistent...

Verizon DBIR Report: Small Businesses Identified as Key Targets in Ransomware Attacks

Verizon Business's 2025 Data Breach Investigations Report (DBIR), released on April 24, 2025, paints...