Connect with us

Hi, what are you looking for?

Tech & Science

Caught out: U.S. Court in ransomware attack (Includes interview)

According to CBR, targeting ‘a successful’ (from the point of view of the hackers) ransomware attack directly a U.S. court is thought to be the first ransomware attack of its kind,in terms of documents and court data being exfiltrated and published. After stealing the Louisiana court documents, which reportedly related to witnesses, jurors, and defendant pleas, the hackers posted proof of the hack attack on its Dark Web page.

The agent for the attack was Conti, a relatively new ransomware strain. Reports from Bleeping Computer claim that Conti “is being operated by the same group that conducted Ryuk ransomware attacks in the past”.

Sanjay Jagad, senior director of products and solutions at Cloudian, tells Digital Journal that ransomware is posing a very real and increasing threat: “The ransomware attack on the US Criminal Court highlights ransomware’s extraordinary power to interrupt operations, expose critical data and ruin reputations.”

He adds that there are particular institutions that are a greater risk than others: “While ransomware threatens organizations of all types, government agencies are increasingly vulnerable, due to outdated technologies and inadequate defenses resulting from tight budgets.”

This means new and more imaginative counter strategies are required, as Jagad says: “With ransomware attacks costing government agencies over $7.5 billion in 2019, it’s clear stronger defense measures are needed.”

One answer is by implementing Object Lock technology. This is is an Amazon Web Services S3 feature. According to ZDNet it “blocks object version deletion during a customer-defined retention period so customers can enforce retention policies as an added layer of data protection or for regulatory compliance.”

Jagad recommends the use of Object Lock technology “at the data storage layer makes backup data unchangeable, meaning it cannot be encrypted by hackers. As a result, organizations can quickly and easily recover an uninfected copy of their data in the event of an attack and avoid having to pay a ransom.”

Avatar photo
Written By

Dr. Tim Sandle is Digital Journal's Editor-at-Large for science news. Tim specializes in science, technology, environmental, business, and health journalism. He is additionally a practising microbiologist; and an author. He is also interested in history, politics and current affairs.

You may also like:


Traders struggled to extend gains on Wall Street, where the Dow chalked up its first record since May.


Read the fine print carefully and understand the implications of acquiring credit card debt before signing up, check the legitimacy.

Tech & Science

This meant that the trust in that key was a forever kind of trust, one you couldn’t suddenly revoke.

Social Media

Conspiracy theories about the assassination attempt on Donald Trump received tens of millions of views on X, researchers said.