Nevada government declined to pay ransom, says cyberattack traced to breach in May

The state government of Nevada did not pay a ransom to cybercriminals who took down critical government systems in August, the state said in a post-mortem review of the attack.

With the help of the FBI, Mandiant and several other organizations, the state was able to rebound from the ransomware attack in 28 days and recover about 90% of the impacted data. The remaining data “was not required to restore essential services and is being reviewed on a risk-basis,” state officials explained in the report.

The report does not name the ransomware gang behind the attack nor the ransom demand. Officials said the decision not to pay “was not made lightly” and was based on their confidence in the ability to use backups to restore impacted systems.

The cybersecurity firm Mandiant was able to trace the ransomware attack back to a search engine optimization poisoning campaign where an attacker embedded malicious code into a trusted online resource frequently accessed by state IT personnel. 

“The investigation revealed that the threat actor had infiltrated the system as early as May 14, 2025, when a state employee unknowingly downloaded a malware-laced system administration tool from a spoofed website,” the report said, adding that the hacker “leveraged legitimate Google advertisements as a vector to deliver the malware package.” 

“This tool installed a hidden backdoor, which remained active despite Symantec Endpoint Protection quarantining the tool on June 26. The attacker escalated their access by installing a commercial remote monitoring software, on multiple systems, compromising both standard and privileged user accounts.” 

Between August 16 and August 24, the hacker moved laterally across critical systems and accessed sensitive directories, including the password vault server. They cleared logs to cover their tracks and deleted backups before deploying the ransomware. 

The investigation found that 26,408 files were accessed but only one document contained the personal information of a former employee who has since been notified. 

Investigators did not find any evidence that data was exfiltrated or posted to a ransomware leak site but they are continuing to monitor the incident. No ransomware gang has come forward to claim the attack as of Thursday. 

State Chief Information Officer Timothy Galluz explained they believe there is a low likelihood of a material impact on the state but they are continuing to monitor the situation. 

In total, the state spent more than $259,000 in overtime payments to 50 state employees who worked 4,212 overtime hours between August 24 and September 20. External vendor costs reached $1.3 million. 

The most critical agencies affected were the Department of Health, Department of Motor Vehicle Services and Department of Public Safety, according to the report. Government offices were closed for several days after the initial attack while phones and websites for several agencies were taken down by the hackers. 

“Nevada’s teams protected core services, paid our employees on time, and recovered quickly — without paying criminals,” Governor Joe Lombardo said in a statement.

Throughout the 28 days of outages caused by the attack, the governor’s office said it coordinated with more than 60 state agencies and multiple vendors to respond to the incident. The Department of Homeland Security assisted the FBI and local law enforcement in assisting the recovery effort. 

The report notes that a priority of the recovery was restoring the state payroll systems so government employees could be paid. It outlines a plan to further harden state systems, segment departments from each other and deploy security tools more widely. 

The attack on the state coincided with the federal government’s cutting of critical services used by local governments for cybersecurity. 

The Department of Homeland Security slashed hundreds of employees at the Cybersecurity and Infrastructure Security Agency earlier this year and continues to remove employees even after multiple governments across the U.S. have seen critical services taken offline by cyberattacks. 

Over the last two weeks, cyber incidents were reportedly impacting governments in Texas, Tennessee and Indiana. Another county in South Carolina disclosed an incident on Wednesday. 

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine

Next Post

Vibe-Coded Malicious VS Code Extension Found with Built-In Ransomware Capabilities

Related Posts

Two New Windows Zero-Days Exploited in the Wild — One Affects Every Version Ever Shipped

Microsoft on Tuesday released fixes for a whopping 183 security flaws spanning its products, including three vulnerabilities that have come under active exploitation in the wild, as the tech giant officially ended support for its Windows 10 operating system unless the PCs are enrolled in the Extended Security Updates (ESU) program. Of the 183 vulnerabilities, eight of them are non-Microsoft
Read More

3 SOC Challenges You Need to Solve Before 2026

2026 will mark a pivotal shift in cybersecurity. Threat actors are moving from experimenting with AI to making it their primary weapon, using it to scale attacks, automate reconnaissance, and craft hyper-realistic social engineering campaigns. The Storm on the Horizon Global world instability, coupled with rapid technological advancement, will force security teams to adapt not just their
Read More

SEC Drops SolarWinds Case After Years of High-Stakes Cybersecurity Scrutiny

The U.S. Securities and Exchange Commission (SEC) has abandoned its lawsuit against SolarWinds and its chief information security officer, alleging that the company had misled investors about the security practices that led to the 2020 supply chain attack. In a joint motion filed November 20, 2025, the SEC, along with SolarWinds and its CISO Timothy G. Brown, asked the court to voluntarily
Read More