new york capitol

New York State Responded to Cyber Attack on Government Servers Weeks Before Coronavirus Pandemic Hit

Officials handled an attack that disabled access to state agency databases just a few weeks before the state became the epicenter of the COVID-19 crisis.

Just before New York became the center of the coronavirus pandemic, state officials were grappling with a massive cyber attack targeting state agency information systems that took almost a month to fully address.

The Albany Times Union reported that the January attack, believed to have originated from hackers outside the U.S., disabled access to databases regularly used by New York state police, the state environmental department and the civil service department.

The incident was previously unreported and did not reveal the personal information of residents or state employees, according to state officials. Hackers were also not able to steal or expose information from the databases, said Rich Azzopardi, a senior adviser to Gov. Andrew Cuomo.

“With the review complete, there is no evidence that personal data of any New York resident, employee, or any other individuals were compromised or have been taken from our network,” Azzopardi said. “In the meantime, ITS (Office of Information Technology Services) has taken actions to further harden our network and protect the integrity of our system.”

Read More: Group Sues New York City MTA For Records On Facial Recognition Use in Subway Station

Officials believe that the New York attack was part of a massive worldwide hacking campaign on Citrix NetScalers, which are used to “facilitate communications between computer users,” according to the Times Union. On Jan. 28, technicians found that seven of the devices were hacked at the state’s main server farm in Albany.

Citrix announced in mid-December that it had found a potential security flaw with its system, making 80,000 companies vulnerable to attack. Patches were sent out to fix the issue, but it appears that state officials did not make the change in time to prevent the installation of malware that blocked access to the databases.

CrowdStrike was hired to conduct a three-week forensic investigation on more than 40 computer servers, the Times Union reported. The attack has not interfered with the pandemic response efforts coordinated by the state government, but the state is footing the bill for CrowdStrik’s endpoint monitoring system that tracks potential suspicious activity on networks.

As Azzopardi told the newspaper: “It’s the cost of doing business these days.”

About the Author

Haley Samsel is an Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Surveillance Cameras Provide Peace of Mind for New Florida Homeowners

    Managing a large estate is never easy. Tack on 2 acres of property and keeping track of the comings and goings of family and visitors becomes nearly impossible. Needless to say, the new owner of a $10 million spec home in Florida was eager for a simple way to monitor and manage his 15,000-square-foot residence, 2,800-square-foot clubhouse and expansive outdoor areas. Read Now

  • Survey: 72% of CISOs Are Concerned Generative AI Solutions Could Result In Security Breach

    Metomic recently released its “2024 CISO Survey: Insights from the Security Leaders Keeping Critical Business Data Safe.” Metomic surveyed more than 400 Chief Information Security Officers (CISOs) from the U.S. and UK to gain deeper insights on the state of data security. The report includes survey findings on various cybersecurity issues, including security leaders’ top priorities and challenges, SaaS app usage across their organization, and biggest concerns with implementing generative AI solutions. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

Featured Cybersecurity

Webinars

New Products

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3