Indiana city confirms ransomware hackers behind September incident

Michigan City, Indiana, has confirmed that a damaging cyber incident three weeks ago that impacted government systems was a ransomware attack. 

The Indiana city located on the south shore of Lake Michigan was forced to take many systems offline on September 23 and initially called it a “network disruption.”

On Saturday, the city acknowledged it was hit with a ransomware attack “that affected a portion of the City’s data and impacted municipal employees’ online and telephone access.”

“Mayor Angie Nelson Deuitch informed the Michigan City Common Council on Tuesday that the City’s focus is on safely restoring systems and ensuring critical City operations continue to function,” city officials said in a statement. 

“A forensic investigation remains underway as the External Incident Response Team — comprised of IT professionals from Michigan City and outside agencies — work to determine the full scope and impact of the event. Law enforcement is involved, making the matter an active investigation and limiting what the City can share publicly at this stage.”

Deuitch said the city will continue to provide updates when possible as they work through the recovery and investigative process. 

On Monday, the Obscura ransomware gang took credit for the attack and said they stole 450 gigabytes of data. The group claimed that the time on their ransom had expired and  that they posted all of the data that was taken during the cyberattack. Obscura emerged last month and has since named more than 15 victims.  

Michigan City has a population of more than 30,000 residents. The city did not respond to requests for comment. 

Last year, another municipality in Indiana was forced to file a local disaster declaration after a ransomware attack caused widespread damage to systems used by multiple local government offices. 

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Qantas confirms cybercriminals released stolen customer data

Next Post

Feds sanction Cambodian conglomerate over cyber scams, seize $15 billion from chairman

Related Posts

From Quantum Hacks to AI Defenses – Expert Guide to Building Unbreakable Cyber Resilience

Quantum computing and AI working together will bring incredible opportunities. Together, the technologies will help us extend innovation further and faster than ever before. But, imagine the flip side, waking up to news that hackers have used a quantum computer to crack your company's encryption overnight, exposing your most sensitive data, rendering much of it untrustworthy. And with your
Read More

Google Issues Security Fix for Actively Exploited Chrome V8 Zero-Day Vulnerability

Google on Monday released security updates for its Chrome browser to address two security flaws, including one that has come under active exploitation in the wild. The vulnerability in question is CVE-2025-13223 (CVSS score: 8.8), a type confusion vulnerability in the V8 JavaScript and WebAssembly engine that could be exploited to achieve arbitrary code execution or program crashes. "Type
Read More

Microsoft Detects “SesameOp” Backdoor Using OpenAI’s API as a Stealth Command Channel

Microsoft has disclosed details of a novel backdoor dubbed SesameOp that uses OpenAI Assistants Application Programming Interface (API) for command-and-control (C2) communications. "Instead of relying on more traditional methods, the threat actor behind this backdoor abuses OpenAI as a C2 channel as a way to stealthily communicate and orchestrate malicious activities within the compromised
Read More