Ransomware attack on Ohio county impacts over 45,000 residents, employees

Ransomware hackers stole Social Security numbers, financial information and more during a recent cyberattack on Union County in Ohio.

The county government began sending out breach notifications to 45,487 local residents and county employees this week. The letters say ransomware was detected on the county’s network on May 18, prompting officials to hire cybersecurity experts and notify federal law enforcement agencies. 

The hackers stole documents that had names, Social Security numbers, driver’s license numbers, financial account information, fingerprint data, medical information, passport numbers and more. 

No ransomware gang has taken credit for the attack publicly, and the letters said the county has been monitoring internet sources but have not found any indication the stolen information was released or offered for sale. 

The county has about 71,000 residents and is 45 minutes outside of Columbus — which dealt with its own ransomware attack one year ago. 

Union County is the latest local government to notify the public of a cyberattack as 2025 has seen dozens of attacks on state, county and city governments, stymying critical services and leaking sensitive resident data. 

Lorain County, which has more than 315,000 residents and is located 30 minutes west of Cleveland, said in June that a network security incident knocked dozens of government systems offline. 

Maryland’s state government is still recovering from a cyberattack last month that disrupted some real-time information systems and services for the disabled. 

Last week, the town of Waxhaw, North Carolina confirmed it was attacked by cybercriminals on September 12. The notorious Qilin ransomware gang took credit for the incident yesterday, claiming to have stolen more than 600GB of data that includes police reports, town business documents and more.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Researchers Expose Phishing Threats Distributing CountLoader and PureRAT

Next Post

China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN Networks

Related Posts

MS Teams Guest Access Can Remove Defender Protection When Users Join External Tenants

Cybersecurity researchers have shed light on a cross-tenant blind spot that allows attackers to bypass Microsoft Defender for Office 365 protections via the guest access feature in Teams. "When users operate as guests in another tenant, their protections are determined entirely by that hosting environment, not by their home organization," Ontinue security researcher Rhys Downing said in a report
Read More

CISA Adds TP-Link and WhatsApp Flaws to KEV Catalog Amid Active Exploitation

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a high-severity security flaw impacting TP-Link TL-WA855RE Wi-Fi Ranger Extender products to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerability, CVE-2020-24363 (CVSS score: 8.8), concerns a case of missing authentication that could be abused to obtain
Read More

CISA Flags Critical WatchGuard Fireware Flaw Exposing 54,000 Fireboxes to No-Login Attacks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting WatchGuard Fireware to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability in question is CVE-2025-9242 (CVSS score: 9.3), an out-of-bounds write vulnerability affecting Fireware OS 11.10.2 up to and including
Read More