Tuesday, March 4, 2025
HomeCyber AttackU.S City Del Rio Attacked by Ransomware - All the Operation has...

U.S City Del Rio Attacked by Ransomware – All the Operation has been Shut Down

Published on

SIEM as a Service

Follow Us on Google News

The City of Del Rio IT system was compromised by the Ransomware attack that leads to shut down the regular operation and the servers are disabled.

Del Rio is a city in and the county seat of Val Verde County, Texas reported that the powerful Ransomware hit on their IT system.

As a precaution step, Management Information Services (MIS) System was completely isolated in order to stop spreading the ransomware into other network.

There was a 30 to 40 computer has been turned off once they detection this ransomware attack.

During the Incidents on Jan 10, 2019, Internet connection to all the city departments were turning off and the employees strictly not allowing to log into the system and the transactions at City Hall are being done manually with paper.

Infected computer ransomware notes contained a phone number that need to be used by victims to contact to the attacker in order to retrieve the decryption key and to know the method to pay the ransomware.

After the incidents City took was to go to the FBI to report the ransomware, after which the City was referred to the Secret Service. 

According to City of Del Rio press release, The City is diligently working on finding the best solution to resolve this situation and restore the system. We ask the public to be patient with us as we may be slower in processing requests at this time. 

It was unclear that any one of the personal data has been compromised. also you can read Ransomware Attack Response and Mitigation Checklist.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.


Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Update Alert: Google Warns of Critical Android Vulnerabilities Under Exploit

Google’s March 2025 Android Security Bulletin has unveiled two critical vulnerabilities—CVE-2024-43093 and CVE-2024-50302—currently under...

BigAnt Server 0-Day Vulnerability Lets Attackers Run Malicious Code Remotely

A critical vulnerability in BigAntSoft's enterprise chat server software has exposed ~50 internet-facing systems...

Bubba AI, Inc. is Launching Comp AI to Help 100,000 Startups Get SOC 2 Compliant by 2032.

With the growing importance of security compliance for startups, more companies are seeking to...

IBM Storage Virtualize Flaws Allow Remote Code Execution

Two critical security flaws in IBM Storage Virtualize products could enable attackers to bypass...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Update Alert: Google Warns of Critical Android Vulnerabilities Under Exploit

Google’s March 2025 Android Security Bulletin has unveiled two critical vulnerabilities—CVE-2024-43093 and CVE-2024-50302—currently under...

BigAnt Server 0-Day Vulnerability Lets Attackers Run Malicious Code Remotely

A critical vulnerability in BigAntSoft's enterprise chat server software has exposed ~50 internet-facing systems...

IBM Storage Virtualize Flaws Allow Remote Code Execution

Two critical security flaws in IBM Storage Virtualize products could enable attackers to bypass...