Jackson County enters a sate of emergency amid ransomware attack

The county had to shut down its main services

Jackson County enters a sate of emergency amid ransomware attack

Jackson County, Missouri, found itself grappling with a significant cybersecurity crisis following a ransomware attack that disrupted its IT systems. This incident, emerging on a Tuesday, led to the shutdown of key county services, including the Assessment, Collection, and Recorder of Deeds offices.[1]

The attack was potent enough to necessitate the closure of these facilities until the end of the week, as IT personnel scrambled to restore critical systems like tax payment, marriage license issuance, and inmate search functionalities.

Despite the severity, the Kansas City Board of Elections and the Jackson County Board of Elections remained operational, indicating a targeted disruption rather than a blanket system failure.

In response, Jackson County Executive Frank White, Jr., declared a state of emergency, a move designed to streamline the procurement process for IT recovery efforts, mobilize emergency personnel, and safeguard against further digital incursions.[2]

As of now, there is no indication that personal data was compromised

Amid the chaos of the ransomware attack, Jackson County was quick to reassure its residents about the security of their sensitive information, particularly financial data.

The county had wisely chosen to externalize the handling of financial transactions through a partnership with Payit, ensuring that all such processes were conducted outside its own network systems. This measure played a crucial role in protecting residents' financial data from the ransomware attack, showcasing the county's proactive approach to cybersecurity.

The partnership with Payit highlighted a modern strategy in cybersecurity: keeping sensitive data off local servers to prevent access by unauthorized parties.

This strategy demonstrates the value of data management procedures in the field of cybersecurity, where safeguarding digital assets is critical. Jackson County added a crucial layer of security by transferring financial transactions to a secure third-party provider, shielding its residents from potential fraud and data theft.

The recovery is ongoing

The attack prompted an extensive investigative and recovery effort, spearheaded by Jackson County in collaboration with law enforcement agencies including the FBI and the Department of Homeland Security, alongside external IT security specialists. This collective endeavor aimed at diagnosing the breach, restoring affected services, and fortifying the county's cybersecurity posture against future threats. The statement says:[3]

The County has promptly notified law enforcement and enlisted the expertise of IT security contractors to assist in the investigation and remediation of the situation. The integrity of our digital network and the confidentiality of resident data is the County’s top priority.

County Executive Frank White, Jr., emphasized the value of prior investments in cybersecurity, attributing the swift detection and containment of the attack to these proactive measures. The incident served as a testament to the critical role of emergency reserves and dedicated resources for cybersecurity, underlining their indispensability in crisis management and the protection of public trust.

The ransomware attack on Jackson County, a major Missouri jurisdiction that includes Kansas City and multiple other municipalities, illustrates the increasingly dangerous environment that local governments are confronting. It is indicative of a larger pattern in which cybercriminals attack public sector organizations in an effort to cause disruption or profit.

About the author
Ugnius Kiguolis
Ugnius Kiguolis - The mastermind

Ugnius Kiguolis is a professional malware analyst who is also the founder and the owner of 2-Spyware. At the moment, he takes over as Editor-in-chief.

Contact Ugnius Kiguolis
About the company Esolutions