Texas revealed on Monday that a ransomware attack has forced the shutdown of its judicial branch network, including websites and servers.
In a notice shared on Twitter, the Office of Court Administration (OCA), which provides IT services to appellate courts and state judicial agencies, revealed that the attack was discovered on Friday morning, and that the network was taken down to prevent further compromise.
“The attack began during the overnight hours and was first discovered in the early morning hours on Friday. The attack is unrelated to the courts’ migration to remote hearings amid the coronavirus pandemic,” the notice reads.
OCA said it was able to “catch” the ransomware and limit its impact, but will keep the branch network offline until the breach is remediated. Work on restoring systems continues.
No ransom will be paid, OCA underlines.
“At this time, there is no indication that any sensitive information, including personal information, was compromised,” OCA said.
OCA also explains that most of the Texas judicial branch entities it provides services to have moved many IT functions to the cloud, and that these were not affected by the attack.
These functions include eFileTexas, reSearchTX, collaboration tools for editing and sharing documents, and email, which allows many of the courts and agencies to continue operations. Filing of documents also continues uninterrupted.
Additionally, OCA revealed that individual trial court networks were not affected by the incident.
Related: ATM Maker Diebold Nixdorf Hit by Ransomware
Related: Railway Vehicle Maker Stadler Hit by Malware Attack
Related: Ransomware Is Mostly Deployed After Hours: Report
Related: Human-Operated Ransomware Is a Growing Threat to Businesses: Microsoft

More from Ionut Arghire
- Former Ubiquiti Employee Who Posed as Hacker Pleads Guilty
- Atlassian Warns of Critical Jira Service Management Vulnerability
- Exploitation of Oracle E-Business Suite Vulnerability Starts After PoC Publication
- Google Shells Out $600,000 for OSS-Fuzz Project Integrations
- F5 BIG-IP Vulnerability Can Lead to DoS, Code Execution
- Flaw in Cisco Industrial Appliances Allows Malicious Code to Persist Across Reboots
- HeadCrab Botnet Ensnares 1,200 Redis Servers for Cryptomining
- Malicious NPM, PyPI Packages Stealing User Information
Latest News
- US Downs Chinese Balloon Off Carolina Coast
- Microsoft: Iran Unit Behind Charlie Hebdo Hack-and-Leak Op
- Feds Say Cyberattack Caused Suicide Helpline’s Outage
- Big China Spy Balloon Moving East Over US, Pentagon Says
- Former Ubiquiti Employee Who Posed as Hacker Pleads Guilty
- Cyber Insights 2023: Venture Capital
- Atlassian Warns of Critical Jira Service Management Vulnerability
- High-Severity Privilege Escalation Vulnerability Patched in VMware Workstation
