Another US state government hit with ransomware, following a brief reprieve
Louisiana becomes the latest in a very long line of US public sector bodies to fall victim to ransomware


Louisana's state government has responded to a suspected ransomware attack by shutting down many of its websites and email systems.
Every agency in the state (population 4.6 million) has been affected by the shutdown following the attack which follows a spate of other ransomware onslaughts targeting small US towns and cities in recent months.
Governor John Bel Edwards confirmed the attack via Twitter, saying the Office of Technology Services (OTS) identified a "cyber security threat" and immediately initiated its security protocols, taking servers down - an action which affected many online services.
Edwards also confirmed that the OTS said the attack was "similar" to the ransomware which plagued the other affected US towns and cities of over the summer.
40% of cybersecurity professionals think paying ransomware demands should be illegal Ex White House CIO attacks insurance firms for 'fuelling ransomware industry' The most popular ransomware strains targeting UK businesses
"There is no anticipated data loss and the state did not pay a ransom," he added. "LA State Police and several federal agencies are investigating this attempted ransomware attack."
Not much is known about the type of ransomware attack that has crippled computer systems across the US this year other than the small information that has been leaked from each report.
Following the simultaneous attack on 22 Texas municipalities, we know that the ransomware attack exploited the island hopping method of infiltration, thanks to confirmation from the mayor Keene Gary Heinrich.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
We also know that the attacks have been successful in some cases. When two Florida towns were hit in as many weeks, IT Pro reported that both towns paid the collective $1.1 million ransom (£850,000) to get their systems back online - a practice widely condemned in the industry.
The ransomware attack on the city of Baltimore was reportedly caused by the Robin Hood strain but it's not clear if the same strain has been the culprit of the other attacks.
The wave of attacks over the summer prompted the FBI to seek private sector support, according to reports of a closed-door meeting held back in September 2019.
The number of US public sector ransomware attacks doubled in 2019 and the invitation for private-public sector collaboration was described as an unprecedented admission from the FBI that it needs private sector assistance to augment investigatory powers.
Although the official number of attacks doubled, it's believed the number is much higher and often attacks simply go unreported.

Connor Jones has been at the forefront of global cyber security news coverage for the past few years, breaking developments on major stories such as LockBit’s ransomware attack on Royal Mail International, and many others. He has also made sporadic appearances on the ITPro Podcast discussing topics from home desk setups all the way to hacking systems using prosthetic limbs. He has a master’s degree in Magazine Journalism from the University of Sheffield, and has previously written for the likes of Red Bull Esports and UNILAD tech during his career that started in 2015.
-
Cleo attack victim list grows as Hertz confirms customer data stolen
News Hertz has confirmed it suffered a data breach as a result of the Cleo zero-day vulnerability in late 2024, with the car rental giant warning that customer data was stolen.
By Ross Kelly
-
Lateral moves in tech: Why leaders should support employee mobility
In-depth Encouraging staff to switch roles can have long-term benefits for skills in the tech sector
By Keri Allan
-
Cleo attack victim list grows as Hertz confirms customer data stolen – and security experts say it won't be the last
News Hertz has confirmed it suffered a data breach as a result of the Cleo zero-day vulnerability in late 2024, with the car rental giant warning that customer data was stolen.
By Ross Kelly
-
‘Phishing kits are a force multiplier': Cheap cyber crime kits can be bought on the dark web for less than $25 – and experts warn it’s lowering the barrier of entry for amateur hackers
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott
-
Healthcare systems are rife with exploits — and ransomware gangs have noticed
News Nearly nine-in-ten healthcare organizations have medical devices that are vulnerable to exploits, and ransomware groups are taking notice.
By Nicole Kobie
-
Alleged LockBit developer extradited to the US
News A Russian-Israeli man has been extradited to the US amid accusations of being a key LockBit ransomware developer.
By Emma Woollacott
-
February was the worst month on record for ransomware attacks – and one threat group had a field day
News February 2025 was the worst month on record for the number of ransomware attacks, according to new research from Bitdefender.
By Emma Woollacott
-
CISA issues warning over Medusa ransomware after 300 victims from critical sectors impacted
News The Medusa ransomware as a Service operation compromised twice as many organizations at the start of 2025 compared to 2024
By Solomon Klappholz
-
Warning issued over prolific 'Ghost' ransomware group
News The Ghost ransomware group is known to act fast and exploit vulnerabilities in public-facing appliances
By Solomon Klappholz
-
The Zservers takedown is another big win for law enforcement
News LockBit has been dealt another blow by law enforcement after Dutch police took 127 of its servers offline
By Solomon Klappholz