Franklin County in Kansas experienced a significant ransomware attack on May 19, 2024, which exposed the personal data of nearly 30,000 residents. The attack targeted the County Clerk’s Office, where hackers gained access to sensitive information, including names, Social Security numbers, driver’s license numbers, financial account details, medical records, and insurance information. Upon discovery of the breach the following day, the county took immediate action, contacting cybersecurity experts and federal law enforcement to investigate the incident and mitigate the damage.
The investigation, which took several weeks, concluded that the ransomware attack specifically targeted the county’s poll book records, which contained a wide range of personal information, including vaccination details and COVID-related data. While the hackers accessed this confidential information, Franklin County officials reported no evidence that the stolen data had been sold or leaked on the Dark Web. Despite this, the county was unable to contact all affected individuals directly, prompting them to post a public notice on their website to inform residents about the breach.
The county’s response to the breach involved significant efforts to secure the affected systems and prevent further unauthorized access. This included disabling inactive user accounts and enhancing overall security measures. The Kansas Secretary of State’s office and other regulatory bodies were notified of the breach, and the county continues to monitor the situation closely, ensuring no further misuse of the exposed data.
Although no ransomware group has taken responsibility for the attack, Franklin County remains vigilant and committed to improving its cybersecurity practices. The county’s investigation found no indication that the compromised data had been offered for sale or misused, but they are advising residents to monitor their personal information closely. The county is providing additional resources to help residents safeguard their information from potential misuse, and they remain dedicated to improving their systems to prevent future incidents.
Reference: