California court suffering from tech outages after cyberattack

Avatar

The San Joaquin County Superior Court said nearly all of its digital services have been knocked offline due to a cyberattack that began earlier this week. 

The court first warned the county’s nearly 800,000 residents of technology issues on Wednesday before admitting that it was a cybersecurity incident on Thursday. 

The attack knocked out all of the court’s phone and fax services, websites containing juror reporting instructions, the e-filing platform, credit card payment processing and more. Some jurors scheduled for this week were excused. 

“Since our last update, San Joaquin County Superior Court has been working diligently to investigate connectivity issues that have impacted some of our systems. We have determined these issues to be the result of a cybersecurity incident,” the court said.

“We took immediate and proactive steps to contain the event, which included isolating our systems from the internet. As a result, part of our network remains offline.”

Cybersecurity experts have been hired to support the court’s efforts to remediate the issue and investigate the incident. 

The court does not have a timeline for when systems will be restored. No hacking group or ransomware operation has taken credit for the incident. 

The attack comes just months after the Los Angeles County Superior Court system was hit with a ransomware attack that caused identical issues for weeks. The city of Modesto, just 30 minutes south of San Joaquin County, dealt with its own ransomware attack last year as well. 

Government bodies across California continue to face an unprecedented wave of cyberattacks affecting city, county and state-level services. On Thursday, the Housing Authority of the City of Los Angeles confirmed it is facing its second major cyberattack in the last two years.

CybercrimeGovernmentNewsNews Briefs
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

German police arrest two for alleged ties to DDoS-for-hire platform

Next Post

Russia behind latest election disinformation video, US intel agencies say

Related Posts

Sticky Werewolf Uses Undocumented Implant to Deploy Lumma Stealer in Russia and Belarus

The threat actor known as Sticky Werewolf has been linked to targeted attacks primarily in Russia and Belarus with the aim of delivering the Lumma Stealer malware by means of a previously undocumented implant. Cybersecurity company Kaspersky is tracking the activity under the name Angry Likho, which it said bears a "strong resemblance" to Awaken Likho (aka Core Werewolf, GamaCopy, and
Avatar
Read More

89% of Enterprise GenAI Usage Is Invisible to Organizations Exposing Critical Security Risks, New Report Reveals

Organizations are either already adopting GenAI solutions, evaluating strategies for integrating these tools into their business plans, or both. To drive informed decision-making and effective planning, the availability of hard data is essential—yet such data remains surprisingly scarce. The “Enterprise GenAI Data Security Report 2025” by LayerX delivers unprecedented insights
Avatar
Read More

BianLian and RansomExx Exploit SAP NetWeaver Flaw to Deploy PipeMagic Trojan

At least two different cybercrime groups BianLian and RansomExx are said to have exploited a recently disclosed security flaw in SAP NetWeaver tracked as CVE-2025-31324, indicating that multiple threat actors are taking advantage of the bug. Cybersecurity firm ReliaQuest, in a new update published today, said it uncovered evidence suggesting involvement from the BianLian data extortion crew and
Avatar
Read More