Cybersecurity Disruption on Christmas Eve: Ohio Lottery Systems Temporarily Shut Down – DragonForce Claims Responsibility – Services Disrupted, Sensitive Data Compromised
The Ohio Lottery encountered a significant setback on Christmas Eve as a cyberattack forced the shutdown of crucial systems, affecting undisclosed internal applications. While an investigation is underway, efforts are actively being made to restore normal operations, keeping the gaming system fully operational amidst the chaos.
The cybersecurity incident, which occurred on December 24, 2023, is actively under investigation, and the Ohio Lottery expresses regret for any inconvenience caused. The state’s internal probe is ongoing, and measures are being taken to expedite the restoration of all services.
Despite the Ohio Lottery not directly attributing the incident to any known threat actors or hacking groups, the newly surfaced DragonForce ransomware gang has claimed responsibility. The attackers assert that they have successfully encrypted devices and accessed sensitive data, including Social Security Numbers and dates of birth.
Details from the DragonForce data leak site reveal a compromise of over 3,000,000 entries, encompassing names, emails, addresses, and winning amounts. The leaked information, totaling approximately 600+ gigabytes, includes SSN and DOB records of both employees and players.
The DragonForce ransomware gang, although recently emerging, demonstrates characteristics of an experienced extortion group, as evidenced by their tactics, negotiation style, and the establishment of a comprehensive data leak site. In the context of increased law enforcement actions against ransomware operations, speculation arises that this group might be a rebrand of a previous gang.
Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…
Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…
Discover the top 11 log management tools for efficient system management and monitoring. Learn about…
Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…
Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…
Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…