Report blames Nevada hack on employee downloading malware

JasonDoiy via Getty Images

The August cyber incident took down state websites after a state worker inadvertently downloaded malware onto a government machine. And while hackers demanded a ransom, none was paid.

A Nevada cyberattack earlier this year that resulted in widespread disruption to state services was caused by an employee accidentally downloading malware, according to a report released last week.

In its after-action report on the August incident, the Nevada Governor’s Technology Office — known as GTO — said in May an employee unknowingly downloaded a system administration tool laced with malware from a spoofed website. The tool then installed a hidden backdoor that remained active even after endpoint protection mitigated the malware in June.

Hackers then installed remote monitoring software to compromise user accounts and were able to move across various critical systems to access sensitive directories and the state’s password vault server. In late August, hackers deployed ransomware to disrupt state services, although the report says containment and recovery protocols were quickly initiated to minimize the damage and ensure continuity of operations.

“This incident highlights the importance of proactive defense and the critical role of GTO personnel in safeguarding public assets,” Nevada CIO Timothy Galluzi said in a statement accompanying the report. “The foresight of Executive Branch Leadership and the State Legislature in funding key cybersecurity initiatives helped ensure a potential full-scale ransomware event was contained and remediated. The resilience shown throughout this event reflects Nevada’s technical capabilities and the dedication of the teams responsible for protecting them.”

At the time, the attack resulted in around 60 state agencies and their websites being disabled and unable to offer electronic services. The state’s Department of Motor Vehicles and social service offices were unable to process applications, while law enforcement could not access DMV records. Full recovery took 28 days, and in mid-September Gov. Joe Lombardo said 90% of public-facing websites had been restored. The state’s $7 million cybersecurity insurance policy was expected to cover the costs from the attack.

The hackers demanded the state pay a ransom to end the attack, but officials refused. Instead, the state used backup and recovery systems, as well as robust partnerships with the private sector, to ensure it did not compromise its overriding principle of not paying ransoms to bad actors.

“The coordinated efforts between internal teams and external partners ensured that data integrity was preserved and services were restored efficiently,” the report says. “This approach demonstrated fiscal responsibility by avoiding the financial and ethical pitfalls of ransom payments. It also reinforced the State’s commitment to protecting taxpayer resources.”

The report says after the attackers escalated on Aug. 15, the state detected outages nine days later as several virtual machines went offline. Within hours, the incident had been escalated to the CIO and governor’s offices, with access regained just eight hours after outages were detected. The state then isolated the impacted virtual machines and engaged with its legal counsel and outside vendors. Having detected the outage at 1:52 a.m. on Aug. 24, the state began its recovery protocols at 5 p.m. that same day.

Over the next 28 days, the state recovered around 90% of its data and prioritized critical systems first. The report says a combination of scenario planning, tabletop exercises and a robust communications strategy helped mitigate the worst of the attack. That included having Lombardo play a role as a spokesperson to reassure the public and frame how the incident impacted the state, while the CIO’s office shared technical milestones and updates.

Restoring payroll was a top priority, and it was successful as no state employee or retiree missed a paycheck because of the hack and outages. The state estimated 50 state employees in GTO and partner agencies logged over 4,000 hours of overtime in the 28-day response and recovery period, an effort it said helped make sure paychecks did not stop.

“Thanks to [staff] efforts and the foresight of the State Legislature in funding key cybersecurity initiatives, what could have escalated into a full-scale ransomware event was effectively contained and remediated,” the report says. “The resiliency demonstrated throughout this event reflects both the strength of our technical capabilities and the dedication of the teams entrusted with protecting them.”

While the report says the state’s response to the incident was successful, it says it also shows the need to invest further in cybersecurity. The state’s cybersecurity preparedness must keep evolving, it says.

Part of that evolution will involve a centralized security operations center, something that is gaining traction in other states to monitor threats on state agencies, local governments and other sectors. The state also will implement a modern endpoint detection and response platform, a “comprehensive patching strategy,” stronger identity protection and expanded employee training. GTO urged the state legislature to keep funding cybersecurity effectively and allow it to pursue these goals.

“Looking ahead, the State recognizes that cybersecurity is a continuous journey, not a one-time achievement,” the report concludes. “While the response to this incident was a success, it also revealed opportunities to further enhance monitoring, detection, and response capabilities.… Continued support from the State Legislature will be essential to fund these initiatives and ensure the resilience of Nevada’s digital government.”

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.