Nevada government declined to pay ransom, says cyberattack traced to breach in May
好的,用户让我帮忙总结一下这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头。直接写描述即可。 首先,我需要快速浏览一下文章内容。文章主要讲的是内华达州政府在八月份遭受了网络攻击,导致关键系统瘫痪。他们没有支付赎金,而是通过FBI和Mandiant等机构的帮助,在28天内恢复了大部分数据。剩下的数据不影响基本服务,正在风险评估中。 接下来,攻击者利用SEO中毒活动,将恶意代码嵌入到一个受信任的在线资源中,该资源被州IT人员频繁访问。具体来说,是在5月14日,一名员工从一个伪造的网站下载了一个带有恶意软件的系统管理工具。这个工具安装了一个隐藏的后门,并且在6月26日被Symantec Endpoint Protection隔离后仍然保持活跃。 攻击者进一步升级权限,安装了商业远程监控软件,入侵了多个系统,包括普通用户和特权用户账户。在8月16日至24日期间,攻击者横向移动到关键系统,并访问了敏感目录,包括密码库服务器。他们清除了日志以掩盖行踪,并删除备份后部署了勒索软件。 调查发现有26,408个文件被访问,但只有一个文档包含前员工的个人信息,并已通知该员工。没有证据表明数据被外泄或发布到勒索软件泄露网站上,但仍在继续监控事件。 内华达州在这次攻击中花费了超过25.9万美元用于支付50名州员工的加班费,以及130万美元用于外部供应商费用。受影响最严重的部门包括卫生部、车辆管理部门和公共安全部门。政府办公室关闭了几天,在线服务也被黑客破坏。 报告还提到恢复的核心是修复工资系统以按时支付员工工资,并计划加强系统安全、部门隔离和部署更广泛的安保工具。 此外,这次攻击发生在美国联邦政府削减关键网络安全服务之际,导致各州面临更大的网络威胁。 现在需要将这些信息浓缩到100字以内。重点包括:内华达州遭遇勒索软件攻击、未支付赎金、28天恢复大部分数据、损失部分数据不影响服务、调查发现攻击途径及影响部门、花费情况以及联邦政府削减安全服务的影响。 可能的总结结构:内华达州政府遭受勒索软件攻击后,在28天内恢复大部分数据未付赎金;调查发现攻击通过SEO中毒活动发起;部分部门受影响严重;总支出超百万美元;联邦安全服务削减加剧风险。 现在检查字数是否符合要求,并确保信息准确且不遗漏关键点。 </think> 内华达州政府遭遇勒索软件攻击后,在28天内恢复90%的数据未付赎金;调查发现攻击通过SEO中毒活动发起;卫生、车辆管理等部门受影响严重;总支出超百万美元;联邦安全服务削减加剧风险。 2025-11-6 20:16:11 Author: therecord.media(查看原文) 阅读量:5 收藏

The state government of Nevada did not pay a ransom to cybercriminals who took down critical government systems in August, the state said in a post-mortem review of the attack.

With the help of the FBI, Mandiant and several other organizations, the state was able to rebound from the ransomware attack in 28 days and recover about 90% of the impacted data. The remaining data “was not required to restore essential services and is being reviewed on a risk-basis,” state officials explained in the report.

The report does not name the ransomware gang behind the attack nor the ransom demand. Officials said the decision not to pay “was not made lightly” and was based on their confidence in the ability to use backups to restore impacted systems.

The cybersecurity firm Mandiant was able to trace the ransomware attack back to a search engine optimization poisoning campaign where an attacker embedded malicious code into a trusted online resource frequently accessed by state IT personnel. 

“The investigation revealed that the threat actor had infiltrated the system as early as May 14, 2025, when a state employee unknowingly downloaded a malware-laced system administration tool from a spoofed website,” the report said, adding that the hacker “leveraged legitimate Google advertisements as a vector to deliver the malware package.” 

“This tool installed a hidden backdoor, which remained active despite Symantec Endpoint Protection quarantining the tool on June 26. The attacker escalated their access by installing a commercial remote monitoring software, on multiple systems, compromising both standard and privileged user accounts.” 

Between August 16 and August 24, the hacker moved laterally across critical systems and accessed sensitive directories, including the password vault server. They cleared logs to cover their tracks and deleted backups before deploying the ransomware. 

The investigation found that 26,408 files were accessed but only one document contained the personal information of a former employee who has since been notified. 

Investigators did not find any evidence that data was exfiltrated or posted to a ransomware leak site but they are continuing to monitor the incident. No ransomware gang has come forward to claim the attack as of Thursday. 

State Chief Information Officer Timothy Galluz explained they believe there is a low likelihood of a material impact on the state but they are continuing to monitor the situation. 

In total, the state spent more than $259,000 in overtime payments to 50 state employees who worked 4,212 overtime hours between August 24 and September 20. External vendor costs reached $1.3 million. 

The most critical agencies affected were the Department of Health, Department of Motor Vehicle Services and Department of Public Safety, according to the report. Government offices were closed for several days after the initial attack while phones and websites for several agencies were taken down by the hackers. 

“Nevada’s teams protected core services, paid our employees on time, and recovered quickly — without paying criminals,” Governor Joe Lombardo said in a statement.

Throughout the 28 days of outages caused by the attack, the governor’s office said it coordinated with more than 60 state agencies and multiple vendors to respond to the incident. The Department of Homeland Security assisted the FBI and local law enforcement in assisting the recovery effort. 

The report notes that a priority of the recovery was restoring the state payroll systems so government employees could be paid. It outlines a plan to further harden state systems, segment departments from each other and deploy security tools more widely. 

The attack on the state coincided with the federal government’s cutting of critical services used by local governments for cybersecurity. 

The Department of Homeland Security slashed hundreds of employees at the Cybersecurity and Infrastructure Security Agency earlier this year and continues to remove employees even after multiple governments across the U.S. have seen critical services taken offline by cyberattacks. 

Over the last two weeks, cyber incidents were reportedly impacting governments in Texas, Tennessee and Indiana. Another county in South Carolina disclosed an incident on Wednesday. 

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.


文章来源: https://therecord.media/nevada-declined-ransom-breach
如有侵权请联系:admin#unsafe.sh