Kansas Supreme Court: Hackers stole records, confidential files in October attack

Siva Ramakrishnan
The Supreme Court of Kansas said the recovery from an October ransomware attack will take significantly more time, warning that the hackers are threatening to leak the data they stole to the dark web if demands are not met.

The Supreme Court of Kansas said the recovery from an October ransomware attack will take significantly more time, warning that the hackers are threatening to leak the data they stole to the dark web if demands are not met.

In a statement this week, Kansas Supreme Court Chief Justice Marla Luckert and several other justices confirmed that the “foreign” cyberattack announced more than a month ago is still incapacitating the information systems of the Kansas Office of Judicial Administration.

The incident has severely limited the daily operations of the state’s appellate courts and district courts in 104 counties.

“When we discovered the attack, we quickly disconnected our information systems from external access. We notified state authorities, and since that time have benefited from the continued support provided by the governor’s office, legislative leadership, and state and federal law enforcement. This attack — on one of our three branches of government — was made against all Kansans,” they said.

“While the impact on our information systems is temporary, the cybercriminals also stole data and threatened to post it to a dark web site if their demands were not met. We are working with cybersecurity experts to identify the data quickly and securely so we can conduct a comprehensive review to determine the full scope of what personal information the cybercriminals may have stolen.”

The justices said the stolen information includes Office of Judicial Administration files, district court case records on appeal, and other data, “some of which may be confidential under law.” The review of what was stolen will take more time, they said, adding that those affected will be notified.

It will take several weeks before normal operations, including electronic filing, will be restored. The justices said their IT team is currently working to improve security systems to protect against future attacks.

On October 15, the state capital city of Topeka announced that its municipal court and probation and prosecution divisions would be closed to the public while the Kansas Supreme Court said it was exclusively using paper records to operate.

Judge Philip Journey, of Sedgwick County, Kansas, told local news outlet KAKE that the outages were due to a ransomware attack.

The Supreme Court said at the time that the attack affected the e-filing system; a portal for protection orders; the district court’s public access portal; the system for appellate cases; the state registry for attorneys, and the Kansas online marriage license application system.

The Kansas eCourt case management system, as well as the court’s payment portal, were also brought down by the attack.

All of these systems are still down as of November 22.

The devastating attack on Kansas’ court system mirrored incidents faced by several others in states across the U.S., many of which have had similar battles against ransomware gangs in the last year.

No ransomware gang has taken credit for the attack, but the statement from Kansas Supreme Court on Tuesday noted that FBI statistics show cybercriminals are increasingly making a point of going after local governments.

“Cybercrime is a persistent and serious threat to our democratic institutions,” they said.

“This assault on the Kansas system of justice is evil and criminal. Today, we express our deep sorrow that Kansans will suffer at the hands of these cybercriminals.”

BriefsCybercrimeGovernment
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Report claims to reveal identity of Russian hacktivist leader

Next Post

North Korean supply chain attacks prompt joint warning from Seoul and London

Related Posts

CISO Melbourne

July 16-17, 2024Time: 8:20 AM to 5:00 PM AESTLocation: Crown Promenade, Melbourne, Australia Join us at CISO Melbourne…
Avatar
Read More

Acronym Overdose – Navigating the Complex Data Security Landscape

In the modern enterprise, data security is often discussed using a complex lexicon of acronyms—DLP, DDR, DSPM, and many others. While these acronyms represent critical frameworks, architectures, and tools for protecting sensitive information, they can also overwhelm those trying to piece together an effective security strategy. This article aims to demystify some of the most important acronyms
Avatar
Read More

Experts Warn of Critical Unpatched Vulnerability in Linear eMerge E3 Systems

Cybersecurity security researchers are warning about an unpatched vulnerability in Nice Linear eMerge E3 access controller systems that could allow for the execution of arbitrary operating system (OS) commands. The flaw, assigned the CVE identifier CVE-2024-9441, carries a CVSS score of 9.8 out of a maximum of 10.0, according to VulnCheck. "A vulnerability in the Nortek Linear eMerge E3 allows
Avatar
Read More