The U.S. Marshals Service has disclosed that it is continuing work on restoring its operations following a ransomware attack in February that impacted the computer network of its Technical Operation Group, resulting in the compromise of sensitive law enforcement information, reports CNN.
Restoration of the most critical tools associated with the compromised network has been completed within 30 days of the discovery of the incident, according to U.S. Marshals Service spokesperson Drew Wade, who did not specify the critical tools nor commented on the impact of the breach on the TOG but emphasized that the agency's investigative and other missions were not affected by the incident.
No threat actors have also been identified to be behind the ransomware attack, while the types of data stolen have also been put under wraps.
Such an incident came within the month the FBI had its computer network for child sexual exploitation investigations compromised but both incidents are not believed to be connected to one another.
Officials at the City of Augusta, Georgia, have been noted by Mayor Garnett Johnson to have not communicated with the BlackByte ransomware operation that took credit for a cyberattack against the city that commenced on May 21, according to The Record, a news site by cybersecurity firm Recorded Future.
Attacks exploiting a zero-day in the MOVEit Transfer file transfer app to compromise various servers and facilitate data exfiltration efforts have been admitted by the Clop ransomware operation, also known as Lace Tempest, TA505, and FIN11, after the intrusions have been attributed to the group by Microsoft, reports BleepingComputer.
University of Waterloo in Canada has disclosed that its on-campus Microsoft Exchange servers have been impacted by an averted ransomware attack on May 30, according to The Record, a news site by cybersecurity firm Recorded Future.