Hackers Release Socials, Personal Data of Oakland Employees, Alameda County
Breach Type –
Uknown, Ransomware
NEWSREBEAT.com
February 11th, 2023
- "The city of Oakland confirmed a ransomware attack Friday night. As they explained, various computer systems of the public administration have started to experience problems of functioning, although they guarantee it critical infrastructure has not been compromised.”
- “City officials released a statement Friday afternoon saying the ransomware attack began Wednesday night.
Computers in all Oakland public libraries were reportedly down, forcing librarians to use roadmaps transfer books from one branch to another.”
- "On Thursday evening, Yassin said city officials sent an email to government employees attributing service outages to the ransomware attack that began Wednesday.”
- ”As a precautionary measure, ITD is asking staff not to reconnect to the network until further notice. It is not known that 911 Dispatch, the urban mobile devices, Office 365, NeoGov, OakWiFithe city website, Oracle and other services are affected.”
Read More
CBS NEWS-San Francisco
February 14th, 2023
- "Oakland declared a local state of emergency Tuesday because of ongoing impacts of a ransomware attack that has resulted in network outages to the city's systems.”
- “…the city said that it was a subcontractor of the company Water Works uses for customer care and billing solutions that noticed the problems on its servers.”
- "The city announced that Interim City Administrator G. Harold Duffey issued the state of emergency in order to allow the city to activate emergency workers, expedite the procurement of equipment and materials to restore systems, and issue orders on an expedited basis.”
- “The ransomware attack began the evening of Feb. 8, police and city officials said Friday. Such attacks involve someone encrypting files and demanding ransom to decrypt them. The encryption makes the files and the systems that rely on them unusable, according to the U.S. Cybersecurity and Infrastructure Security Agency.”
- “Oakland's information technology department was working with law enforcement and a third party forensics firm to determine the scope and severity of the attack. City officials did not release the amount of ransom the attackers are asking for.
The city said 911 dispatch, fire emergency services, and financial systems were not impacted."
Read More
GovTech
March 7th, 2023
- "The hackers behind an early February cyber attack have published personal employee data. That data includes current and past employees' Social Security numbers, driver's license numbers, birth dates and addresses.”
- "Data released by a hacker group following a February ransomware attack against Oakland includes 12 years of city employee rosters that list thousands of current and past employees' Social Security numbers, driver's license numbers, birth dates and home addresses, even those of Mayor Sheng Thao and former Mayor Libby Schaaf.
The Chronicle viewed the published files using a link that was published on the dark web over the weekend. The files include over 9 gigabytes of data and documents including hundreds of records related to police misconduct allegations and scanned bank statements from the city's operating account."
- ”I'm very worried about identity theft," said one city employee whose personal information was released, and who spoke on condition of anonymity because he was not authorized to comment publicly. "It's another example of the city not protecting the people who work tirelessly for them."
The data breach raises questions about the security of the city's systems. The city has not disclosed how the ransomware attack occurred. Both current and former employees said the city did not have two-factor authentication, a second layer of security to password-protected accounts, for staff until after the ransomware attack. Cybersecurity experts said it's unclear whether two-factor authentication could have prevented the attack without knowing what caused the hackers to be able to gain access.”
- ”The release of personal information could leave people vulnerable to identity theft and tax identity theft. A "bad actor" could use the information to get fraudulent tax refunds, apply for a line of credit or commit financial theft if routing numbers and credit card information are available, said Sarah Powazek, the program director of UC Berkeley's Public Interest Cybersecurity.
Powazek noted that local governments, like Oakland, "make really great targets for ransomware" because they host critical public infrastructure, but may not have the resources to defend against an attack. She said because the group released the data, it's likely Oakland did not pay the ransom. The city has not disclosed how much they were asked for in ransom or whether they were asked for ransom at all.”
- ”The city said in a statement to The Chronicle that it is working with a third-party data-mining firm to do an "in-depth review" of the released data, which will likely take time. Based on what they find, they will notify staff, the city said.
"My administration takes this very seriously and has been working hard to restore systems and provide assistance to anyone impacted," Thao said in a statement. "Moving forward we will focus on strengthening the security of our information technology systems."
City officials sent an email to current employees on Monday, obtained by The Chronicle, saying that the city had sent a notification about the breach to all staff over the weekend. However, some current and former employees said they did not receive the notification.”
Read More
ABC 7 NEWS
March 16th, 2023
- "Stolen personal and financial files from the City of Oakland were leaked onto the dark web by ransomware group "Play." The stolen data has more than 3,100 views as of March 16.”
- “Currently, there are 40 different victim profiles active on the site," said James Aurand, the counterintelligence lead with Binary Defense. Aurand says 18 of those victim profiles appear to be from Oakland - about 10 GB of data.”
- "According to Aurand, the dark website has a countdown timer letting victims know how much time they have left before that data is going to be released or made public on the site. It's accessible through a password that's provided to view the data.”
- “The ABC7 News I-Team has learned the city hired a security awareness company KnowBe4, based out of Florida to help prevent future phishing attacks, but the protocols being implemented may take a year before there's any significant impact.”
- “The I-Team confirmed the City of Oakland upgraded their Microsoft 365 services this week in order to implement 'enhanced security controls' like multi-factor authentication and compromised account detection."
Read More
California County Issues Warning After Phishing Attempt, Tehama County
Breach Type –
Phishing, Other
GOVTECH.com
February 8th, 2023
- "Tehama County is rooting out a phishing scam that tried to worm itself into the county's system.
Recently the county learned that an unauthorized party gained access to the county's IT network between Nov. 18, 2021, and April 9, 2022.”
- ”On Friday, the county received notification of a phishing attempt. Chief Administrative Officer Gabriel Hydrick said the county responded immediately, with engineers quickly securing the account in question. The password was reset, the message was recalled and a warning message was sent out to those recipients that could not be recalled.”
- ”The county Monday morning sent out an email to its employees and associates informing them they had received an email asking for "payment" or "ach information" or the like. The county advised those who received the email not to respond to it and refrain from providing any information. Resting passwords was recommended as well.”
- ”Tehama County personnel is undergoing a rapid deployment of enhanced security measures, including 2FA," the email reads. "While this incident is just a single email account, these measures are being rapidly adopted to prevent scam emails ASAP. If you have any questions, our technical team is happy to assist as these measures are being rolled out."
- ”An investigation was launched, law enforcement was notified and a review of the incident let the county learn that files containing residents' personnel information were accessed. This information included a person's name, date of birth, mailing address, Social Security number, driver's license number and information related to services received from Social Services.”
Read More
Alleged Vice Society ransomware attack against San Francisco BART probed, San Francisco County
Breach Type –
Hacking, Ransomware
SC Magazine
January 10th, 2023
- "Investigation into a ransomware attack against San Francisco's Bay Area Rapid Transit is underway after the Vice Society ransomware gang listed the heavy rapid rail transit system as one of its victims, according to The Record, a news site by cybersecurity firm Recorded Future.”
-
“To be clear, no BART services or internal business systems have been impacted. As with other government agencies, we are taking all necessary precautions to respond," said BART Chief Communications Officer Alicia Trost, “who added that they are also looking into data stolen and posted by Vice Society”
- “Vice Society's claimed attack on BART comes after a slew of cyberattacks against U.S. railways, with New York City's Metropolitan Transportation Authority compromised by a Chinese threat group and the Santa Clarita Valley Transportation Authority impacted by a ransomware attack on April 2021.”
Read More
Los Angeles’ Housing Authority hit by LockBit – Claim, Los Angeles County
Breach Type –
Unknown, Ransomware
TechCrunch.com
January 1st, 2023
- “It appears that LockBit 3.0 has managed to compromise and exfiltrate data from the Housing Authority of the City of Los Angeles (HACLA)."
- "Municipal housing authorities collect and store a great deal of personal information on residents and landlords, and HACLA’s site can be used to apply for housing, pay rent, or other functions that involve personal data. The screencaps LockBit posted as proof of access suggest that this leak, if and when it happens, may affect many people who sought housing assistance from the city and may also impact employees."
- "At the time of publication, HACLA’s website appears to be operational and there is no notice of any incident on their site or on their Twitter account.
The agency’s office was scheduled to be closed on December 30 and January 2 due to the holiday, but DataBreaches has sent an email inquiry to the agency anyway, seeking their response to the claimed attack, and will update this post when a reply is received. For now, however, although the screencaps look convincing, this attack has not yet been confirmed or denied.”
Read More
California authorities confirm cyber intrusion, LockBit claims ransomware hit, Sacramento County
Breach Type –
Unknown, Ransomware
Cybersecurity Dive
December 12th, 2022
- "California’s Department of Finance was hit by a cyberattack and multiple state agencies are responding in coordination with the California Cybersecurity Integration Center. The state Office of Emergency Services is investigating the incident and is working to contain the impact and mitigate future vulnerabilities, according to a statement released Monday.”
-
“The LockBit ransomware group listed the state’s finance department on its leak site Monday and claims it stole 76 GB of data from the department, including databases, financial documents, court filings and IT documents, according to Brett Callow, threat analyst at Emsisoft”
- “California officials said the attack was proactively identified and “no state funds have been compromised,” but declined to provide further details.”
Read More
Cyberattacks reported at US airports, Los Angeles County
Breach Type –
Hacking, DoS
ABC News
October 10th, 2022
- “Some of the nation's largest airports have been targeted for cyberattacks Monday by an attacker within the Russian Federation, a senior official briefed on the situation confirmed to ABC News.
Importantly, the systems targeted do not handle air traffic control, internal airline communications and coordination or transportation security.
"It's an inconvenience," the source said. The attacks have resulted in targeted "denial of public access" to public-facing web domains that report airport wait times and congestion.”
- "Over a dozen airport websites were impacted by the "denial of service" attack, John Hultquist, head of intelligence analysis at cybersecurity firm Mandiant, told ABC News. That type of attack essentially overloads sites by jamming them with artificial users.
"Killnet," a pro-Russian hacker group, is believed to be behind the attack, according to Hultquist. While similar groups have been found to be fronts for state-backed actors, Hultquist said there is no evidence the Russian government was involved in directing this attack.”
- ”The FBI and Cybersecurity and Infrastructure Security Agency, part of the Department of Homeland Security, each said they were aware of the attacks.
The websites for Des Moines International Airport, Los Angeles International Airport (LAX) and Chicago O'Hare International Airport appeared impacted Monday morning.”
Read More
California Department of Corrections and Rehabilitation notifies staff, visitors, and incarcerated individuals of breach, Sacramento County
Breach Type –
Unknown, Data Breach
Data Breaches
August 23rd, 2022
- "The newly revealed breach affects staff, visitors, and others tested for COVID-19 by the state Department of Corrections and Rehabilitation between June 2020 and last January."
- "The breach was discovered in January 2022 and appears to have involved unauthorized access in December 2021 that potentially affected medical information on everyone who was tested for COVID-19 by the department from June 2020 through January 2022."
- "This public site allows access to certain information, however personal information of Concealed Carry Weapon (CCW) permit holders is not supposed to be visible,"
- "The state indicates that the breach also potentially included mental health information for the incarcerated population in the Mental Health Services Delivery System going as far back as 2008."
Read More
California DOJ data breach exposes personal information of all concealed carry permit holders across state, Fresno County
Breach Type –
Unknown, Data Breach
NBC News
June 29th, 2022
- "The names, addresses and license types of all concealed carry permit holders in California were exposed after the state Department of Justice suffered a data breach."
- “The breach occurred as part of the state DOJ’s launch of its “2022 Firearms Dashboard Portal,”
- "This public site allows access to certain information, however personal information of Concealed Carry Weapon (CCW) permit holders is not supposed to be visible,"
- "The personal information included, but was not limited to, a person's name, age, address, Criminal Identification Index number and license type, according to the sheriff's office."
Read More
State Bar notifies 1,300 people identified in data breach, Los Angeles County
Breach Type –
Unknown, Data Breach
Bakersfield.com
May 8th, 2022
- "The State Bar of California has begun notifying individuals whose names appeared in more than 322,000 confidential attorney discipline records published online in a massive data breach."
- “The investigation did not determine whether any emails or attachments in the accounts were accessed or downloaded by the unauthorized individual, "however, the county was not able to rule out the possibility."
- "The State Bar said Friday it will contact 1,300 complainants, witnesses or respondents whose names appeared in more than a thousand confidential case records that appeared online."
- "The breach was not a hack, but rather a security vulnerability in the State Bar’s case management system. As a result, the confidential records were unintentionally swept up and published by Judyrecords."
Read More
Contra Costa County reports 2021 data breach that may have exposed personal information
Breach Type –
Hacking, Data Breach
Danville San Ramon
April 17th, 2022
- “An investigation determined that an unauthorized person accessed the county employees' email accounts "at various times" between June 24, 2021 and Aug. 12, 2021."
- “The investigation did not determine whether any emails or attachments in the accounts were accessed or downloaded by the unauthorized individual, "however, the county was not able to rule out the possibility."
- “The breach exposed "certain county employee emails" as well as individuals who communicated with the county's Employment and Human Services Department. This information contained names, Social Security numbers, driver's license or state-issued I.D. numbers, financial account numbers, passport numbers and medical information and/or health insurance information."
- “The county sent out letters on Friday to people they believe may have had personal information in the email accounts. The county is also providing information about the incident and steps those affected can take."
Read More
Fresno lost $400,000 to a phishing scam in 2020 and never told the public, Fresno County
Breach Type –
Phishing, Other
Fresno Bee
March 10th, 2022
-
“The city of Fresno lost about $400,000 in 2020 after falling victim to an electronic phishing scam, and former Mayor Lee Brand’s administration failed to disclose the loss to the Fresno City Council and taxpayers…”
-
“The electronic fraud was disguised as an invoice from a subcontractor working on the construction of the new southeast Fresno police station, Councilmember Miguel Arias told The Bee. The invoice included the subcontractor’s letterhead, and only the account numbers were different. A city staffer completed an electronic money transfer, not knowing the invoice was a fake, he said.”
-
“In an interview Wednesday, current Mayor Jerry Dyer said two payments were made. Arias said city officials believe the money was sent to an account in Africa.”
- “The FBI asked city officials to keep the incident under wraps, so their investigation wasn’t compromised, Dyer said. It appears less than $2,000 was recovered, and the rest of the money likely is lost, Arias said.”
Read More
Fresno Bee
March 24th, 2022
-
“…in a subsequent press conference by saying the city had actually lost $600,000 to an unknown criminal or criminals who used an email process known as phishing to grab the funds.”
-
“The scam took place two years ago, but The Bee recently was able to confirm its existence through some emails between city officials who discussed it, and confirmation by City Councilmember Miguel Arias. The criminal(s) submitted fake invoices that looked authentic and thus got the money transferred to bogus accounts.”
-
“Arias now wants to guarantee disclosure in the future when the city suffers losses of public money. The benefit of such an approach is clear, but any policy would need vetting to make sure it can accomplish its goal.”
Read More
Sacramento County: Hundreds of personal records exposed in data breach, Sacramento County
Breach Type –
Phishing, Data Breach
Fox 40 News
January 21st, 2022
- “Hundreds of records containing personal information of Sacramento County residents were exposed in a phishing attack last year"
- “Sacramento County said 2,096 protected health information and 816 personal identifiable records were exposed during a cyber attack on June 22, 2021. The extent of the breach was not known until Nov. 17 when a security audit was completed."
- “Officials did not say how many Sacramento County employees were targeted during the phishing attack, only saying it was multiple. The county did, however, say how many login credentials were compromised.”
- "Since the phishing attack, Sacramento County has set up two-factor authentication countywide, among taking other steps."
Read More
County Administrator addresses cyber attack: DA offers tips to the public to safeguard financial data, Plumas County
Breach Type –
Phishing, Malware
Plumas News
November 18th, 2021
- “Plumas County’s computer servers have been hacked. During the Board of Supervisors meeting on Nov. 16, a member of the public said her emails hadn’t been returned, and that’s when Hydrick and County Counsel Gretchen Stuhr shared that the email system wasn’t functioning.”
- “Nothing was said about the servers in general during the public meeting. However, two county leaders who wish to remain anonymous, shared that much more was impacted by email. During this morning’s discussion, Hydrick said he wanted to share as much information as possible about the situation.”
- “At this time, the depth of the intrusion is not fully known but is being addressed by the county’s IT department. Additionally, appropriate federal law enforcement have been notified and are engaged.”
Read More
Truckee town manager gives update on cyberattack, Nevada County
Breach Type –
Phishing, Malware
Sierra Sun
September 30th, 2021
- “On July 22, Truckee experienced a cybersecurity attack which breached its system and caused phones, internet, access to data, and everything that exists behind the town’s firewall to be shut down.”
- “Truckee’s Emergency Operation Center was activated during the event, the town’s insurance carrier for cybersecurity was notified, and their team was brought on board. Due to the attack, according to Callaway, Truckee employees had to be outfitted with new computers and hotspots for internet access.”
- “Additionally, the town lost its archived emails during the attack. “That particular exchange server was infected with a very malicious piece of malware, and it has been recommended to us by our forensic investigators that we don’t turn that on for risk of spreading that malware further into our newly rebuilt system,” said Callaway.”
Read More
Harbor District fends off ransomware attempt, San Mateo County
Breach Type –
Unknown, Ransomware
Half Moon Bay Review
September 22nd, 2021
- “On July 25, the district’s security consultant detected encrypted data in a server and isolated it.”
- “San Mateo County Harbor District General Manager Jim Pruett said, because the district backs up its data regularly, the loss was negligible and no ransom was paid.”
- “The important thing for the district was that we had substantial backups, so we were able to restore all the data, minus a few hours, back to the system and continue to operate,” Pruett said.
- “Under state law, public agencies are required to report data breaches that leak personal information. Because there’s no evidence the district’s data was leaked, the district was not required to report the incident.”
Read More
Grass Valley Cyberattack Had 'Minimal Impact' City Says
Breach Type –
Hacking, Ransomware
Fox40 Local News
July 28th, 2021
- " City officials in Grass Valley confirmed its information systems were hacked Wednesday morning."
- “The perpetrators of this cyber attack informed the City they had obtained data from City systems and threatened to publish the data if the City did not pay ransom,”
- "Officials said the city paid the ransom, but did not say how much it was."
- "The city said any related outages were brief and it is working to find out what data was compromised."
Read More
$1.2 Million Stolen From Sebastopol Reserves Through Fraudulent Wire Transfer
Breach Type –
Phishing, Other
The Press Democrat
July 16th, 2021
- “An ostensibly routine wire transfer involving Sonoma County’s treasury office turned out to be a scam that bilked Sebastopol of $1.2 million in property taxes at the end of April.”
- “The theft was committed via a fraudulent email requesting a transfer from a pool of Sebastopol’s funds held by the Auditor-Controller-Treasurer-Tax Collector office, which oversees more than $3 billion in public money.”
- "It appeared to us it was coming directly from staff of the city of Sebastopol,”…“Protocols are undergoing a full evaluation in response, and the office will communicate with a cyber security firm for recommendations on how to combat cybercrime.”
- “The stolen funds are equivalent to about 10% of the city’s annual operating budget.”
- “… the theft is unrelated to a police department computer system failure reported earlier this week that some have speculated could have been the result of a computer hack.”
Read More
Hacker Attempt to Poison Water Supply in San Francisco Bay Area
Breach Type –
Hacking
NBC News
June 17th, 2021
- On Jan. 15, a hacker tried to poison a water treatment plant that served parts of the San Francisco Bay Area. It didn't seem hard.
- The hacker had the username and password for a former employee's TeamViewer account, a popular program that lets users remotely control their computers, according to a private report compiled by the Northern California Regional Intelligence Center in February and seen by NBC News.
- After logging in, the hacker, whose name and motive are unknown and who hasn't been identified by law enforcement, deleted programs that the water plant used to treat drinking water.
- The hack wasn't discovered until the following day, and the facility changed its passwords and reinstalled the programs.
- No failures were reported as a result of this incident, and no individuals in the city reported illness from water-related failures," the report, which did not specify which water treatment plant had been breached, noted.
Read More
California City Computer System Down for Weeks In Ransomware Attack
Breach Type –
Unknown, Ransomware
KGET
June 16th, 2021
- California City’s mayor said, computer system has been down since around late May following a ransomware attack and an emergency meeting is scheduled tonight to discuss the issue
- No demands have been made since the server was attacked sometime between May 26 and June 1. City employees haven’t been able to use email or other computer resources
Read More
Sacramento City Suffers from Data breach on ParkMobile App
Breach Type –
Hacking, Data Breach
ABC 10
May 21st, 2021
- The Sacramento Public Works Department is warning residents of a data breach on its ParkMobile parking app from March 2021. Department officials say the breach occurred due to a vulnerability in a third-party software used in the ParkMobile app. Some general account information was accessed in the breach, including license plate numbers, email addresses, and phone numbers
- Officials say a small percentage of cases also included home mailing addresses. Encrypted passwords were also obtained in the breach, but department officials say the encryption keys required to view the passwords was not accessed
- The Public Works Department said it also notified the appropriate law enforcement authorities about the breach
Read More
Santa Clara Valley Transportation Authority, Santa Clara County
Breach Type –
Unknown, Ransomware
Patch
April 22nd, 2021
-
Bad actors are threatening to dump stolen data if demands are not met
-
Buses and light rails remain operational
-
An investigation is ongoing
Read More
El Monte City Hall servers, Los Angeles County
Breach Type –
Unknown, Malware
San Gabriel Valley Tribune
April 6th, 2021
-
El Monte PD and the Los Angeles County Sheriff's department are investigating unauthorized access to city hall servers
-
Internet and business lines were not interrupted by the attack
-
The city is planning to replace email servers out of an abundance of caution
Read More
CA DMV Vendor-Automatic Funds Transfer, State of California
Breach Type –
Unknown, Ransomware
KCRA
February 17th, 2021
-
The California Department of Motor Vehicles announced that a third-party company it utilizes experienced a security breach
-
It is unclear at this time if any DMV information was compromised from the attack
-
Data possibly exposed included records of include, names, addresses, license plate numbers and vehicle identification numbers
Read More
Yuba County
Breach Type –
Unknown, Ransomware
Yahoo! News
February 19th, 2021
-
Yuba County was recent victim of ransomware cyberattack
-
Attack encrypted systems, bad actors demanded payment
-
County took steps to isolate affected systems
Read More
City of Shafter, Kern County
Breach Type –
Unknown, Ransomware
23 ABC News
October 20th, 2020
-
Public statement was made about cities system being compromised
-
A post was made on Instagram stating the IT system appears to be frozen locked
-
No information appears to be stolen at this time, city officials are working with federal law enforcement to determine source
Read More
Madera County’s Court Website, Madera County
Breach Type - Hacking, Other
ABC 30
July 6th, 2020
-
The county’s court website was targeted and changed to be a portal for pornography and prostitution
-
This redirect exposes any visitors to a Turkish escort related services page
-
Once the problem was noticed a new web address was issued as the data from the original website remains lost
Read More
San Francisco Employee's Retirement System, San Francisco County
Breach Type –
Data Breach, Unknown
Bleeping Computer
June 3rd, 2020
-
A third party had accessed test environment servers with over 74,000 customer's information
-
Information exposed is said to not contain social securities or bank information but does contain potentially compromising information
-
Information could fuel further data breaches and potentially phishing scams
Read More
San Francisco International Airport, San Francisco County
Breach Type –
Hacking, Data Breach
Bleeping Computer
April 10th, 2020
-
Airport websites were hacked in data breach by bad actors
-
Bad actors placed malware onto websites to data mine credentials
-
Officials believed that members of public may have been affected as well
Read More
City of Torrance, Los Angeles County
Breach Type -
Unknown, Malware
ABC 7
March 2nd, 2020
-
Email accounts were stopped following an attack on the city's servers
-
Some business operations have been stalled but communication remains open
-
No personal data was reported as compromised at this time
Read More
Tripwire
April 22nd, 2020
-
Bad actors erased city backups, encrypted hundreds of devices
-
Over 200 GB of files was also reportedly stolen during cyberattack
-
Data was ransomed for 100 bitcoin, equivalent to $700,000
Read More
Los Angeles County Government Systems, Los Angeles County
Breach Type –
Phishing, Malware
Tech Wire
January 10th, 2020
-
Numerous county employees received malware-laden emails
-
IT staff were able to contain the malware and prevented data exposure
-
County had previously been victim of similar attack and took precautionary measures
Read More
Contra Costa County Library & County Administrative Offices, Contra Costa County
Breach Type –
Unknown, Ransomware
CCCLIB
January 3rd, 2020
-
Network outage caused by ransomware cyberattack
-
IT personnel disabled all servers hit in attack
-
Officials believed no personal information had been leaked
Read More
City of Seal Beach, Orange County
Breach Type –
Unknown, Ransomware
Sun News
December 31st, 2019
-
Ransomware cyberattack against city government targeted IT provider
-
Bad actors encrypted city's computers with ransomware
-
Email and voicemails were affected while emergency services were not
Read More
Fresno County & Fresno Council Of Governments (COG), Fresno County
Breach Type –
Hacking, Ransomware
GV Wire
December 12th, 2019
-
Thousands of files were locked by bad actors from Russia
-
Local government refused to pay ransom and lost affected files
-
COG forced to utilize new internet provider due to attacks
Read More
City of Galt, Sacramento County
Breach Type –
Unknown, Ransomware
CBS Sacramento
December 17th, 2019
-
Communications affected in cyberattack on city systems
-
Bad actors managed to place ransomware on network
-
Officials believed personal information was not leaked
Read More
Cucamonga Valley Water District, San Bernardino County
Breach Type –
Hacking, Data Breach
Data Breaches
December 6th, 2019
-
Online payment service, Click2Gov, used in data breach
-
Officials believed, but were uncertain, that credit card information was collected
-
Officials attempted to reassure the public that the situation was under control
Read More
City of San Marcos, San Diego County
Breach Type –
Hacking, Malware
7 San Diego
October 29th, 2019
-
Cyber attack leaves city employees without communications
-
IT officials disabled portions of computer network to mitigate attack
-
Officials stated that government files were secured
Read More
City of Livermore, Alameda County
Breach Type –
Unknown, Malware
Patch
August 28th, 2019
-
California city hit with malware cyberattack, affected city hall computer systems
-
Officials discovered that virus had sent unauthorized emails from city accounts to residents
-
The unauthorized emails included an attachment in an effort to spread the virus further
Read More
Patch
September 18th, 2019
-
Emergency services remained operational, city email system and some phone lines were down
-
City, county, and state officials continued to work on restoring computer services
-
Officials commented that progress had been made, portions of network brought back online
Read More
California Reimbursement Enterprises, Los Angeles County
Breach Type –
Phishing, Data Breach
Health IT Security
July 10th, 2019
-
Over 14,000 patient's information likely leaked after employee fell victim to phishing cyberattack
-
IT staff detected unusual activity and utilized third-party forensics team to assist investigation
-
Company provided billing service and eligibility for healthcare organizations throughout California
Read More
City of Bakersfield, Kern County
Breach Type –
Hacking, Data Breach
Gemini Advisory
September 19th, 2019
-
Hackers exploited vulnerability in Superion’s Click2Gov Utility Bill Pay Systems affecting government entities across the U.S.
-
Over 20,000 records from eight cities in five different states have been offered for sale on the dark web
-
City of Bakersfield one of the eight cities impacted
Read More
Contra Costa County Elections Office, Contra Costa Co.
Breach Type - Phishing, Ransomware
Mercury News
April 24th, 2019
- Contra Costa County elections office hit by cyber phishing attack
- Phishing e-mail used in attack led to point of origin being in Russia
- Malware involved was likely ransomware, no data was compromised
Read More
Imperial County Website System, Imperial County
Breach Type - Unknown, Ransomware
LA Times
April 19th, 2019
- Imperial County website hacked from exterior source
- Network was attacked by Ryuk ransomware
- Ransomware demanded payment in bitcoin, county refused payment
Read More
Orange County Sanitation District, Orange County
Breach Type - Phishing, Data Breach
OCRegister
March 11th, 2019
- Over 1,000 employees were notified as their information was assessed following a phishing scheme
- The district was notified after files noting a compensation fund were accessed within NFP Corp.
- Employees were told to enroll in a fraud watch over their credit following this attack
Read More
California Department of Consumer Affairs
Breach Type - Malware
Sacramento Bee
December 21st, 2018
- California Department of Consumer Affairs suffered malware attack
- 50 workstations affected, and computer networks disrupted
- Despite entire network being shut down, consumers were still able to visit its website
Read More
City of Bakersfield, Kern County
Breach Type - Other, Data Breach
Bakersfield
November 12th, 2018
- Cyber security incident compromised personal & financial information of those who used Click2Gov online payment
- City investigated & discovered an unauthorized party inserted a code into the Click2Gov system
- The code found was designed to capture payment card data
- A total of 2,400 user accounts may have been affected
Read More
City of Thousand Oaks, Ventura County
Breach Type - Other, Data Breach
Thousand Oaks Acorn
November 8th, 2018
- City of Thousand Oaks’ online bill-pay service has been compromised for the second time in the past year
- Damage is extremely limited
- Customer contacted City Hall about a credit card fraudulently used elsewhere
- Suspicious file found on the server by City’s vendor
- Immediately, server taken offline
Read More
City of Indio, Riverside County
Breach Type - Other, Data Breach
StateScoop
October 15th, 2018
- City of Indio residents fall victim to data breach
- Vulnerability in Click2Gov software exposes payment cards used online
- The payment cards and some private information was exposed
- No illicit activity has impacted residents yet
Read More
Congressional District Democratic Candidate’s Campaign Website
Breach Type - Other/TDoS/DDoS
Rolling Stone
September 20th, 2018
- California Democrat Bryan Caforio fell victim to DDoS attacks, known as Hulk attacks, which shut down his campaign website for 21 hours during the primary election season
- Voters were unable to access campaign website, learn information on the candidate, and unable to donate to his campaign as a result
- Cyber experts believe the attacks were launched using AWS server space
- Department of Homeland security was notified by the campaign and willing to launch investigation into the repeated incidents
Read More
City of Morgan Hill, Santa Clara County
Breach Type - Other/Data Breach
Morgan Hill Times
May 31st, 2018
- Hundreds of Morgan Hill employees’ financial information exposed
- W-2 Summary report accessed by hackers
- 480 former & current city employees affected in hack
Read More
City of Oxnard, Ventura County
Breach Type - Other/Data Breach
KEYT 3
May 31st, 2018
- Data breach compromised personal information of Oxnard's online utility payers
- Vulnerability in city's software allowed hackers to gain confidential information
- City of Oxnard shut down system to implement additional security measures
Read More
City of Pasadena
Breach Type - Phishing
Pasadena Now
April 30th, 2018
- City employee email accounts compromised through phishing scheme
- Hackers use access to accounts to send out fraudulent emails to city contacts
- City immediately disabled accounts & changed passwords of all city employees
- Advising residents/associates to take caution when opening emails from city
Read More
City of Thousand Oaks, Ventura County
Breach Type - Other/Data Breach
California Office of Attorney General
April 23rd, 2018
- Unauthorized actor potentially gained access to City vendor
- Click2Gov online payment system contained credit card transactions
- Those potentially affected, advised to review payment card account statements closely
Read More
California State Election System
Breach Type - Hacking
NBC News
February 27th, 2018
- Claims websites were affected & scanned
- Claims hacks were not directly related to voting
- Want to take preventative measures for next election
Read More
Sausalito City Government
Breach Type - Phishing
KQED News
February 22nd, 2018
- Current and former Sausalito government employees had W2 info exposed
- 147 employees affected
- City notified IRS, FBI, & California Franchise Tax Board
- Sausalito Police Department investigating the breach
Read More
City of Alameda Website
Breach Type - Cryptojack/Other
WCCF Tech
February 12th, 2018
- Over 4,200 victims hijacked to mine Monero cryptocurrency
- Secretly hijacked using compromised plug-in called "Browsealoud"
- Though sites were affected for hours, no user data was affected/compromised
Read More
California Voter Registry
Breach Type - Ransomware
SC Magazine
December 15th, 2017
- Unprotected MongoDB server
- Database has been deleted by cyber criminals
- Ransom note demanding 0.2 bitcoin ($2,325.01 at time of discovery)
- 19.2 million voter records stored in server
Read More
Stanislaus Co.
Breach Type - Cryptojack/Other
KCRA
December 15th, 2017
- Behavioral health and recovery services computer network compromised by ransomware
- Stanislaus Co. has mitigated ransomware attacks in past
- Shut down and quarantined infected networks
- All behavioral health recovery services remain available to patients
Read More
City of Sacramento, Sacramento Co.
Breach Type - Phishing, Data Breach
Los Angeles Superior Court Employees
Breach Type - Phishing
Washington Times
November 22nd, 2017
- 500 employees received fraudulent emails
- Emails led to fake websites asking for account credentials
- Less than a dozen employees fell for phishing scam
- 31 year old Texas Resident responsible for hack
Read More
Sacramento Regional Transit
Breach Type - Ransomware
Sacramento Bee
November 20th, 2017
- Hackers demand $8,000 ransom
- Attack erased necessary computer programs affecting internal operations
- Determined that no data was stolen
Read More
City of Oceanside, San Diego County
Breach Type - Other, Data Breach
California Office of Attorney General
September 6th, 2017
- Costumer payment card compromised through City of Oceanside’s Utility Bill Payment Services
- City contracted with cybersecurity expert to investigate
- Malicious code had infiltrated the vendor supported online payment system
Read More
Los Angeles County Board of Supervisors
Breach Type - Hack
SCV News
June 27th, 2017
- Website homepage displayed pro-ISIS propaganda
- 1 of 4 U.S. websites hacked the same way
- Team System Dz claims responsibility for attack
Read More
Los Angeles County
Breach Type - Hack
Fox News
December 18th, 2016
- Possible exposure of 750,000+ personal data
- Nigerian hacker identified as Kevin Onaghinor
- Phishing email deceived 108 county officials into entering email and passwords
- There has been no evidence that confidential information was breached
Read More
San Francisco's Municipal Transportation Agency
Breach Type - Ransomware
ARS Technica
November 28th, 2016
- Crypto-ransomware infects Muni system networks
- Hacker asks for $73,000
- Hacker gave email address associated with Mamba and HDDCryptor
- No information was compromised and systems returned to regular operations
Read More
NY Times
October 27th, 2017
- SFMTA states they never considered paying the ransom
- Malware infected systems through an email link
Read More
Yuba City
Breach Type - Ransomware
Appeal Democrat
September 30th, 2016
- Attacked by ransomware virus, IT department quickly tracked and shut down network
- 4 of 350 computers infected with the virus
- No data lost or compromised, hacker was not paid ransom
Read More
Los Angeles County Health Department
Breach Type - Ransomware
LA Times
February 26th, 2016
- Remnants of ransomware thread on five computers
- Operations not affected
- County is aggressive in preventing cyber attacks
Read More
BACK TO TOP