Monday, February 17, 2025
HomeCyber AttackU.S City Del Rio Attacked by Ransomware - All the Operation has...

U.S City Del Rio Attacked by Ransomware – All the Operation has been Shut Down

Published on

SIEM as a Service

Follow Us on Google News

The City of Del Rio IT system was compromised by the Ransomware attack that leads to shut down the regular operation and the servers are disabled.

Del Rio is a city in and the county seat of Val Verde County, Texas reported that the powerful Ransomware hit on their IT system.

As a precaution step, Management Information Services (MIS) System was completely isolated in order to stop spreading the ransomware into other network.

There was a 30 to 40 computer has been turned off once they detection this ransomware attack.

During the Incidents on Jan 10, 2019, Internet connection to all the city departments were turning off and the employees strictly not allowing to log into the system and the transactions at City Hall are being done manually with paper.

Infected computer ransomware notes contained a phone number that need to be used by victims to contact to the attacker in order to retrieve the decryption key and to know the method to pay the ransomware.

After the incidents City took was to go to the FBI to report the ransomware, after which the City was referred to the Secret Service. 

According to City of Del Rio press release, The City is diligently working on finding the best solution to resolve this situation and restore the system. We ask the public to be patient with us as we may be slower in processing requests at this time. 

It was unclear that any one of the personal data has been compromised. also you can read Ransomware Attack Response and Mitigation Checklist.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.


Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

CISA Warns of Active Exploitation of Apple iOS Security Flaw

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent advisory warning of...

Threat Actors Exploiting Modified SharpHide Tool to Conceal Registry Entries

Threat actors are leveraging a modified version of the SharpHide tool to create hidden...

IDOR Vulnerability in ExHub Allows Attackers to Alter Hosting Configurations

A security researcher recently uncovered a high-risk Insecure Direct Object Reference (IDOR) vulnerability in...

Linux Kernel 6.14 rc3 Released With The Fixes for Critical Issues

Linus Torvalds has announced the release of Linux Kernel 6.14-rc3, marking a critical milestone...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

CISA Warns of Active Exploitation of Apple iOS Security Flaw

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent advisory warning of...

Threat Actors Exploiting Modified SharpHide Tool to Conceal Registry Entries

Threat actors are leveraging a modified version of the SharpHide tool to create hidden...

IDOR Vulnerability in ExHub Allows Attackers to Alter Hosting Configurations

A security researcher recently uncovered a high-risk Insecure Direct Object Reference (IDOR) vulnerability in...