Pennsylvania attorney general says SSNs stolen during August ransomware attack

A ransomware attack on the Pennsylvania Office of the Attorney General exposed the Social Security numbers and medical information of an undisclosed number of people. 

In a statement on Monday, the office confirmed that data was stolen during the attack, which caused chaos this summer for the state’s legal system, taking down the website, phone lines and email systems used by most employees.

“Based on the OAG’s review of the data involved, for some individuals the information involved may have included name, Social Security number, and/or medical information,” Attorney General Dave Sunday said. 

“On November 14, 2025 we provided notice, via email, of this incident to individuals for whom we had been provided a valid email address. We have also notified the Federal Bureau of Investigation of the incident and are assisting their investigation.”

The statement confirms that the ransomware attack was discovered on August 9 and that a subsequent investigation confirmed that files were stolen from the office’s systems during the incident. 

A toll free number was created for victims with questions about the incident. 

The office did not respond to requests for comment about how many people were impacted. 

While the office’s statement claims it “has no evidence of the misuse, or attempted misuse, of any information that was potentially involved,” the attack was claimed by the INC ransomware gang in September. It is unclear whether the group published the stolen data.

Sunday previously confirmed that hackers encrypted files and systems used by his office but said officials did not pay the ransom issued.

The attack threw a wrench into Pennsylvania’s legal system for nearly a month, forcing courts to provide time extensions for certain criminal and civil cases. The office’s 1,200 staff members were forced to use “alternate channels and methods” to conduct work throughout August. 

“This situation has certainly tested OAG staff and prompted some modifications to our typical routines — however, we are committed to our duty and mission to protect and represent Pennsylvanians, and are confident that mission is being fulfilled,” Sunday said at the time. 

Researchers previously attributed the attack to internet-exposed instances of Citrix NetScaler that were vulnerable to CVE-2025-5777, known colloquially as Citrix Bleed 2, and several other related bugs.

Cybersecurity expert Kevin Beaumont shared evidence of twointernet-exposed Citrix NetScaler devices tied to the Office of the Attorney General that were later removed from the internet.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Princeton University says database containing donor, alumni info breached

Next Post

Google Issues Security Fix for Actively Exploited Chrome V8 Zero-Day Vulnerability

Related Posts

Threatsday Bulletin: Rootkit Patch, Federal Breach, OnePlus SMS Leak, TikTok Scandal & More

/* ===== Container ===== */ .td-wrap /* ===== Section ===== */ .td-section .td-title margin: 16px 0 4px; font-size: 32px; line-height: 1.2; font-weight: 800; .td-subtitle margin: 0 0 24px; color: #64748b; font-size: 16px; /* ===== Timeline ===== */ .td-timeline position: relative; margin: 0 !important;padding: 0!important; list-style: none; /* spine */ .td-timeline:before
Read More

Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001)

A recently disclosed security flaw impacting 7-Zip has come under active exploitation in the wild, according to an advisory issued by the U.K. NHS England Digital on Tuesday. The vulnerability in question is CVE-2025-11001 (CVSS score: 7.0), which allows remote attackers to execute arbitrary code. It has been addressed in 7-Zip version 25.00 released in July 2025. "The specific flaw exists
Read More