Nearly 70,000 impacted by ransomware attack on Sheboygan, Wisconsin

Avatar

The Wisconsin city of Sheboygan warned about 67,000 people that a ransomware attack in October gave hackers access to their personal information. 

The city filed breach notification letters with regulators on Friday explaining that Social Security numbers, state IDs and license plate numbers were taken when hackers breached the city’s systems on October 31, 2024.

Officials in Sheboygan hired a cybersecurity firm to conduct an investigation that concluded on May 14 and confirmed that data was stolen. 

Sheboygan, which has about 50,000 residents, previously acknowledged that a ransomware gang had taken credit for the attack but said there was no evidence the hackers stole sensitive data. The attack was claimed in November by a gang called Chort, which shared screenshots of a list of file archives and demanded a ransom. 

The city reported the incident to law enforcement and said they were “incorporating their guidance” in their response to the incident. Officials said emergency services were still available in  but didn’t share any further updates after November 22.

One year of identity protection services will be provided to those affected, the city said in its breach notification letters. 

Sheboygan is one of several government bodies in Wisconsin to be targeted by ransomware gangs over the last two years. 

The Chort ransomware gang emerged in November 2024, claiming attacks on multiple state institutions including Kuwait’s Public Authority of Agriculture Affairs and Fish Resources, a public school in Georgia, and others. 

New York’s Hartwick College was also named on the gang’s leak site. The school confirmed it was attacked last October in breach notification letters sent last month to more than 4,800 victims.

NewsNews BriefsCybercrime
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

MATLAB developer bringing systems back online following ransomware attack

Next Post

China accuses Taiwan-linked group of cyberattack on local tech company

Related Posts

Kimsuky Exploits BlueKeep RDP Vulnerability to Breach Systems in South Korea and Japan

Cybersecurity researchers have flagged a new malicious campaign related to the North Korean state-sponsored threat actor known as Kimsuky that exploits a now-patched vulnerability impacting Microsoft Remote Desktop Services to gain initial access. The activity has been named Larva-24005 by the AhnLab Security Intelligence Center (ASEC). "In some systems, initial access was gained through
Avatar
Read More

⚡ Weekly Recap: APT Campaigns, Browser Hijacks, AI Malware, Cloud Breaches and Critical CVEs

Cyber threats don't show up one at a time anymore. They’re layered, planned, and often stay hidden until it’s too late. For cybersecurity teams, the key isn’t just reacting to alerts—it’s spotting early signs of trouble before they become real threats. This update is designed to deliver clear, accurate insights based on real patterns and changes we can verify. With today’s complex systems, we
Avatar
Read More

Chaos RAT Malware Targets Windows and Linux via Fake Network Tool Downloads

Threat hunters are calling attention to a new variant of a remote access trojan (RAT) called Chaos RAT that has been used in recent attacks targeting Windows and Linux systems. According to findings from Acronis, the malware artifact may have been distributed by tricking victims into downloading a network troubleshooting utility for Linux environments. "Chaos RAT is an open-source RAT written in
Avatar
Read More