Cyberthreat to Alabama state government ‘neutralized’

Avatar

The government of Alabama says it has wrapped up the response to a cyberattack on state systems that was first identified about 10 days ago, and it won’t be offering further details about the nature of the incident.

“Following a thorough investigation and coordinated response, OIT can confirm that the threat has been neutralized and Alabama’s core operations are safe and stable,” the state Office of Information Technology (OIT) said in an update Tuesday.

OIT said it worked with unspecified “cybersecurity experts” to respond to the attack, which was first discovered on May 9. 

A May 16 post said there was “no evidence of exfiltration of the personally identifiable information of Alabama citizens,” and there had been no major disruptions in services.

“The public will undoubtedly be curious to know the identity of the bad actor(s) behind this event,” Tuesday’s update said. “Unfortunately, OIT is unable to attribute this attack to any specific individual or organization as our efforts have been solely focused on responding to and mitigating the threat.”

Previous communications had said the intruders had gained access to usernames and passwords of some state employees’ accounts. OIT asked agencies to reset passwords as a precaution.

“Any possible criminal investigations related to this event will be handled by the appropriate state and federal law enforcement agencies, and OIT will gladly offer its support to those investigations if requested,” OIT said Tuesday.

Typical cyberthreats to state and local governments include ransomware and financial scams. A recent example is a data breach in Rhode Island’s state benefits system. Officials there released a timeline of the incident last week.

Oregon’s environmental agency said in late April that it was working on a report about a cyberattack earlier in the month. Officials had not engaged in any negotiations with the attackers, the agency said.

CybercrimeGovernmentNewsNews Briefs
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Joe Warminsky

is the news editor for Recorded Future News. He has more than 25 years experience as an editor and writer in the Washington, D.C., area. He previously he helped lead CyberScoop for more than five years. Prior to that, he was a digital editor at WAMU 88.5, the NPR affiliate in Washington, and he spent more than a decade editing coverage of Congress for CQ Roll Call.

 

Total
0
Shares
Previous Post

Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate Domains for Malware Delivery

Next Post

Ohio’s Kettering Health system facing widespread outages after cyberattack

Related Posts

Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware

Apple has disclosed that a now-patched security flaw present in its Messages app was actively exploited in the wild to target civil society members in sophisticated cyber attacks. The vulnerability, tracked as CVE-2025-43200, was addressed on February 10, 2025, as part of iOS 18.3.1, iPadOS 18.3.1, iPadOS 17.7.5, macOS Sequoia 15.3.1, macOS Sonoma 14.7.4, macOS Ventura 13.7.4, watchOS 11.3.1,
Avatar
Read More

AWS Default IAM Roles Found to Enable Lateral Movement and Cross-Service Exploitation

Cybersecurity researchers have discovered risky default identity and access management (IAM) roles impacting Amazon Web Services that could open the door for attackers to escalate privileges, manipulate other AWS services, and, in some cases, even fully compromise AWS accounts. "These roles, often created automatically or recommended during setup, grant overly broad permissions, such as full S3
Avatar
Read More

Storm-1977 Hits Education Clouds with AzureChecker, Deploys 200+ Crypto Mining Containers

Microsoft has revealed that a threat actor it tracks as Storm-1977 has conducted password spraying attacks against cloud tenants in the education sector over the past year. "The attack involves the use of AzureChecker.exe, a Command Line Interface (CLI) tool that is being used by a wide range of threat actors," the Microsoft Threat Intelligence team said in an analysis. The tech giant noted that
Avatar
Read More