Threat IntelHIGH

Minnesota National Guard Deployed After Cyberattack Disrupts Services

Featured image for Minnesota National Guard Deployed After Cyberattack Disrupts Services
#Minnesota National Guard#Winona County#cyberattack#FBI#ransomware

Original Reporting

TRThe Record

AI Intelligence Briefing

CyberPings AIΒ·Reviewed by Rohit Rana
Severity LevelHIGH

High severity β€” significant development or major threat actor activity

🎯
🎯 THREAT ACTOR PROFILE
Threat Actor / APT Groupβ€”
Aliasesβ€”
Attributionβ€”
Target SectorsGovernment
Target RegionsMinnesota
Active SinceApril 2026
Campaign NameWinona County Cyberattack
Primary TTPsDisruption of critical services
Tools Usedβ€”
MITRE ATT&CKβ€”
MotivationDisruption and potential ransom
🎯

Basically, a cyberattack hit Winona County, so the governor sent in the National Guard for help.

Quick Summary

A cyberattack on Winona County's critical systems prompted swift action from Minnesota's governor. The National Guard is now deployed to assist recovery efforts. Residents should stay alert for updates and potential phishing scams.

What Happened

On Monday, Winona County in Minnesota experienced a cyberattack that severely disrupted its critical systems. In response, Governor Tim Walz issued an executive order on Tuesday, deploying the Minnesota National Guard to assist with recovery efforts. The attack has caused significant disruptions to vital emergency and municipal services, prompting the county to seek additional support from state and federal agencies.

Who's Affected

The cyberattack primarily impacted Winona County, which is home to approximately 50,000 residents. While the county government faced substantial challenges, city operations reportedly experienced minimal effects. Local officials are working closely with the FBI and state IT services to mitigate the situation.

What Data Was Exposed

Details about the specific data compromised in this attack have not been disclosed. However, it is noted that the county had previously dealt with a ransomware attack in January, raising concerns about the potential connection between the two incidents. The lack of public statements from county officials leaves many questions unanswered regarding the nature of the data at risk.

What You Should Do

Residents and businesses in Winona County should remain vigilant and monitor local news for updates on the situation. It is advisable to:

  • Ensure that all personal and business data is backed up.
  • Be cautious of potential phishing attempts that may arise following the attack.
  • Stay informed about any official communications from local authorities regarding the recovery process.

The Response

Governor Walz's executive order not only mobilizes the National Guard but also opens up funding and resources necessary for recovery. This action reflects the seriousness of the incident and the need for robust support to restore normalcy in county operations. The governor emphasized that the scale and complexity of the attack exceeded the county's internal capabilities, necessitating external assistance.

Historical Context

This incident is not isolated; it follows a pattern of increasing cyber threats faced by Minnesota cities, including a notable ransomware attack in St. Paul last year. The frequency and severity of such attacks highlight the growing risks to municipal services and the critical need for effective cybersecurity measures.

As the situation develops, it will be crucial for both local and state officials to address vulnerabilities and enhance defenses against future cyber threats.

πŸ” How to Check If You're Affected

  1. 1.Monitor local news for updates on the cyberattack.
  2. 2.Check for any unusual activity on personal and business accounts.
  3. 3.Be cautious of phishing emails that may arise post-incident.

🏒 Impacted Sectors

Government

Pro Insight

πŸ”’ Pro insight: This incident underscores the escalating threat landscape facing local governments, necessitating proactive cybersecurity measures and inter-agency collaboration.

Sources

Original Report

TRThe Record
Read Original

Related Pings

HIGHThreat Intel

TeamPCP Supply Chain Campaign - Cisco Source Code Stolen

The TeamPCP campaign has escalated with the theft of Cisco's source code linked to Trivy. This raises serious security concerns for affected organizations. Stay updated on protective measures and developments.

SANS ISCΒ·
HIGHThreat Intel

Hack-for-Hire Spyware Campaign Targets Journalists in MENA

A hack-for-hire spyware campaign linked to the Bitter group is targeting journalists in the MENA region, with new reports revealing specific victims among Egyptian journalists. This raises serious concerns for press freedom.

CyberScoopΒ·
HIGHThreat Intel

CIA Elevates Cyber Espionage Division for Enhanced Operations

The CIA has elevated its cyber espionage division to a full mission center, enhancing its capabilities against digital threats. This strategic move reflects a commitment to bolster national security in cyberspace. With increased resources, the agency aims to stay ahead of foreign adversaries and improve its cyber operations.

The RecordΒ·
HIGHThreat Intel

Forest Blizzard - Launches AiTM Attacks Targeting Outlook

Forest Blizzard is exploiting router vulnerabilities to launch AiTM attacks on Outlook sessions. Over 200 organizations are affected, raising serious security concerns. Experts urge immediate action to secure home networks.

CSO OnlineΒ·
HIGHThreat Intel

North Korean Threat Actors - Insider Threat Tactics Revealed

North Korean cyber actors are using AI and fake identities to infiltrate companies. This poses a serious insider threat that organizations must address. Learn how to protect your business.

Group-IB BlogΒ·
HIGHThreat Intel

Cybercriminals Move Deeper into Networks, Hiding in Edge Infrastructure

Cybercriminals are increasingly using edge infrastructure to hide their activities. This shift poses significant risks as traditional security measures often overlook these areas. Enhanced threat intelligence is crucial for early detection and prevention.

Help Net SecurityΒ·