texas capitol building

Ransomware Attacks Hit 23 Texas Towns, Prompting Statewide Response

The state suspects that the attack, which took place Friday morning and targeted small local governments, was coordinated by “one single threat actor.”

After 23 towns in Texas were targeted by a coordinated ransomware attack on Friday, the state government is leading the response against what is suspected to be “one single threat actor,” according to the Texas Department of Information Resources.

In an update issued by the agency on Saturday, the DIR said the majority of the organizations hit by the attack were “smaller local governments.” The towns are just the latest victims of ransomware, a type of malware that locks computer systems and files until a ransom is paid to the hackers.

Cities like Atlanta and Baltimore have been targeted in recent years, with the latter still recovering from a May attack. In January, the town of Del Rio, Texas was forced to abandon electronic services and shut down all of its servers to prevent the spread of a similar attack.

Read more: How to Recover From A Ransomware Attack

Gov. Greg Abbott ordered a “Level 2 Escalated Response” after the incident took place Friday morning, CNBC reported. That means the scope of the emergency has “expanded beyond that which can be handled by local responders,” according to Texas’ emergency management planning guide.

The state said that its own systems and networks have not been impacted, and that responders are “actively working with [affected] entities to bring their systems back online.” The DIR did not publish a list of the local governments that were hit by the attack, but said that all of the towns impacted by the malware were notified.

“Investigations into the origin of this attack are ongoing; however, response and recovery are the priority at this time,” the DIR wrote on Saturday.

Tim Erlin, the vice president of product management and strategy at security technology company Tripwire, said the coordinated attack represents an “escalation” in ransomware incidents.

“If this is really a coordinated attack, it’s hard to imagine how it’s a good thing for the ransomware attackers and for this specific criminal,” Erlin said. “Raising the bar on the response to a coordinated state level will decrease the likelihood that ransom will actually get paid, and increase the likelihood that both Texas and other states are better prepared for these events in the future.”

Pierluigi Stella, the chief technology officer of the Houston-based cybersecurity company Network Box USA, said that cities must recognize the urgency of improving their cybersecurity now rather than waiting to update their systems later.

“This is war, plain and simple,” Stella said. “And in war, you don’t go through budgets and boards and approvals. There is none of that bureaucracy and red tape in such instances.”

Stella added: “Government entities must find a way to properly empower someone to make decisions quickly, use the budget as necessary, when it’s necessary, and stay on top of issues as they arise, and certainly not two years later. Unless that happens, this will never be anything but a lost cause.”

About the Author

Haley Samsel is an Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.

Featured

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

  • TSA Introduces New $45 Fee Option for Travelers Without REAL ID Starting February 1

    The Transportation Security Administration (TSA) announced today that it will refer all passengers who do not present an acceptable form of ID and still want to fly an option to pay a $45 fee to use a modernized alternative identity verification system, TSA Confirm.ID, to establish identity at security checkpoints beginning on February 1, 2026. Read Now

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.