Recovery from cyberattack ‘on the horizon,’ Kansas Supreme Court chief justice says

Jason Macuray
The Kansas state court system is close to a full recovery from an October ransomware attack that forced officials to use paper records for weeks, state Supreme Court Chief Justice Marla Luckert said Wednesday.

The Kansas state court system is close to a full recovery from an October ransomware attack that forced officials to use paper records for weeks, state Supreme Court Chief Justice Marla Luckert said Wednesday.

During a State of the Judiciary speech in front of the Kansas legislature, Luckert spoke at length about the incident, telling lawmakers that a ransomware gang based in Russia carried out the attack first discovered early on October 12.

“In doing so, they attacked one of our democratic institutions, a foundation of our democratic society, one of the three branches of our government,” she said.

“These criminals acted against all Kansans, our state and our democratic institutions. Though the source and the scope of that incident was not immediately apparent, we would later learn that the Kansas judicial branch had been struck by a ransomware attack.”

The incident severely limited the daily operations of the state’s appellate and district courts in 104 counties.

The court system has now implemented new protections that they believe will “limit damage” and allow them to recover quicker if another ransomware attack occurred.

As of this week, the case management system has been restored alongside the free public portal that provides access to electronic court records.

Electronic filing has been restored in some districts but the rest will be back to normal over the next two weeks.

Luckert believes that full functioning of all systems is “on the near horizon.”

During the speech, Luckert explained that the court’s information services team began to investigate a network outage on October 12 and discovered that several servers housed in the Kansas Judicial Center were inaccessible.

These servers are used for key operations of administrative offices, district courts and appellate courts. In order to stop the unnamed ransomware gang from moving laterally within the system, they disconnected it and shut down much of the system.

Law enforcement and cybersecurity emergency responders were called in to help the state’s chief information technology officer with the recovery.

On the advice of state officials, law enforcement and legislators, they decided against paying a ransom. In a post-speech interview with the Kansas Reflector, she called the ransom demand a “moving target” and said it was still unclear how much the incident would cost the state. No ransomware gang has taken credit for the attack.

While they initially hoped for a “swift” recovery, experts informed them that they had to not only clean and restore the systems but also fortify them since victims are typically attacked more than once.

They did have working backups that made the recovery process a bit easier but “things have progressed more slowly than we would like because our top priority has been to protect Kansans,” she explained.

“The forensic examination confirmed the cybercriminals’ claim that they had exfiltrated some data. We are working hard to determine what and whose personal information has been compromised by the criminal actors so that we can notify those individuals,” she said.

“As these and other details emerged, it became clear we needed to implement alternative business practices to keep courts running. Courts across the state reverted to old school methods, including paper filings. We communicated to the public about how we used the paper environment.”

Court officials previously said that the stolen information includes Office of Judicial Administration files, district court case records on appeal, and other data, “some of which may be confidential under law.”

The devastating attack on Kansas’ court system incidents faced by several other courts across the U.S.

Luckert thanked the IT officials who “sacrificed evenings, weekends, vacations, holiday time” to get the systems back up and running.

She noted that in the court’s budget request for fiscal year 2025, they have asked for funding to cover several new cybersecurity positions.

“I express my deep sorrow that Kansans suffered because these criminals attacked our system of justice,” she said. “But I thank my fellow Kansans for their support and their patience over the past several months.”

NewsGovernmentCybercrime
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post

Further analysis of Denmark attacks leads to warning about unpatched network gear

Next Post

The nature of bug bounty programs is changing, and their ‘auntie’ is worried

Related Posts

Detecting Windows-based Malware Through Better Visibility

Despite a plethora of available security solutions, more and more organizations fall victim to Ransomware and other threats. These continued threats aren't just an inconvenience that hurt businesses and end users - they damage the economy, endanger lives, destroy businesses and put national security at risk. But if that wasn’t enough – North Korea appears to be using revenue from cyber
Avatar
Read More

eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners

A new malware campaign has been exploiting the updating mechanism of the eScan antivirus software to distribute backdoors and cryptocurrency miners like XMRig through a long-standing threat codenamed GuptiMiner targeting large corporate networks. Cybersecurity firm Avast said the activity is the work of a threat actor with possible connections to a North Korean hacking group dubbed 
Avatar
Read More