Georgia court filing organization warns of outages after ransomware allegations

The organization responsible for managing real estate and civil court filings in Georgia has been knocked offline by a cyberattack that began on Friday. 

The Georgia Superior Court Clerks’ Cooperative Authority (GSCCCA) said it is experiencing a “credible and ongoing cybersecurity threat” that forced the organization to temporarily restrict access to its website and services. 

The statewide organization updates an index of the commercial filings throughout the state’s 159 counties while also maintaining an index of real estate and personal property records, overseeing the central database of notaries public, and managing a statewide database on civil case filings.

Since Friday, the GSCCCA website has had a “System Maintenance in Progress” banner on every page but updated it on Monday evening to confirm that it is dealing with a cyberattack. 

“We are committed to ensuring that our systems will be operational as soon as possible. However, out of an abundance of caution, we continue to test and analyze our systems before they are made accessible to ensure maximum safety,” the organization said

“Our team has been working around the clock to evaluate and test to make sure the systems are safe to use by our customers and staff.”

The Atlanta-based organization holds troves of data like real estate deeds, property transfer filings, mortgage records and liens, mapping data, civil and criminal cases, legal archives and more.

The organization was added to the leak site of ransomware gang Devman on Friday. The group claims it stole 500GB of data from GSCCCA and is demanding a $400,000 ransom before November 27. 

Devman is a new ransomware operation that first emerged in April, claiming responsibility for an attack on Thailand’s Ministry of Labor in July. Ransomware investigator Jon DiMaggio spoke to the hacker behind the criminal operation and found that they were originally an affiliate for other ransomware gangs like Qilin and DragonForce before moving to create their own ransomware-as-a-service group in September. 

The attack on GSCCCA came one day before a cyberattack impacted a prominent company used by major Wall Street banks for real-estate loans and mortgages. 

SitusAMC said the incident was discovered on November 12 and involved data stolen from its systems that includes accounting records and legal agreements. Federal law enforcement is now involved in the recovery effort.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Years of JSONFormatter and CodeBeautify Leaks Expose Thousands of Passwords and API Keys

Next Post

$262 million stolen in account takeover fraud schemes this year, FBI says ahead of holiday season

Related Posts

New Browser Security Report Reveals Emerging Threats for Enterprises

According to the new Browser Security Report 2025, security leaders are discovering that most identity, SaaS, and AI-related risks converge in a single place, the user’s browser. Yet traditional controls like DLP, EDR, and SSE still operate one layer too low. What’s emerging isn’t just a blindspot. It’s a parallel threat surface: unmanaged extensions acting like supply chain implants, GenAI
Read More

Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers

A new malware attributed to the Russia-linked hacking group known as COLDRIVER has undergone numerous developmental iterations since May 2025, suggesting an increased "operations tempo" from the threat actor. The findings come from Google Threat Intelligence Group (GTIG), which said the state-sponsored hacking crew has rapidly refined and retooled its malware arsenal merely five days following
Read More

Chinese Threat Group ‘Jewelbug’ Quietly Infiltrated Russian IT Network for Months

A threat actor with ties to China has been attributed to a five-month-long intrusion targeting a Russian IT service provider, marking the hacking group's expansion to the country beyond Southeast Asia and South America. The activity, which took place from January to May 2025, has been attributed by Broadcom-owned Symantec to a threat actor it tracks as Jewelbug, which it said overlaps with
Read More