{"id":2833,"date":"2024-11-02T06:14:08","date_gmt":"2024-11-02T06:14:08","guid":{"rendered":"https:\/\/aegislens.com\/home\/?p=2833"},"modified":"2024-11-02T06:14:08","modified_gmt":"2024-11-02T06:14:08","slug":"los-angeles-housing-authority-hit-by-cactus-ransomware-confirmed-data-breach","status":"publish","type":"post","link":"https:\/\/aegislens.com\/home\/los-angeles-housing-authority-hit-by-cactus-ransomware-confirmed-data-breach\/","title":{"rendered":"Los Angeles Housing Authority Hit by Cactus Ransomware: Confirmed Data Breach"},"content":{"rendered":"<p>&#8220;`html<\/p>\n<article>\n<h1>LA housing authority confirms breach claimed by Cactus ransomware<\/h1>\n<p>Summary: The Housing Authority of the City of Los Angeles (HACLA), one of the largest public housing authorities in the United States, confirmed that a cyberattack hit its IT network after recent breach claims from the Cactus ransomware gang.<\/p>\n<h2>About the Breach<\/h2>\n<p>Earlier this month, the Cactus ransomware gang claimed responsibility for a cyber attack on the HACLA&#8217;s IT network.<\/p>\n<p>In response, HACLA confirmed that the attack had indeed occurred, confirming the breach declaration of the Cactus ransomware group.<\/p>\n<h2>HACLA&#8217;s Stance and Current Status<\/h2>\n<p>The housing authority has reported that an investigation is presently underway by professional cybersecurity teams to assess the magnitude of the potential data breach, the types of information accessed, and the number of individuals potentially affected.<\/p>\n<h2>Risk to Personal Information<\/h2>\n<p>HACLA provides public housing assistance to over 10,000 low-income households based in Los Angeles, California.<\/p>\n<p>With such a vast database, there is potential risk of compromise to sensitive personal information such as social security numbers, financial records and other personally identifiable information.<\/p>\n<h2>What is Cactus Ransomware?<\/h2>\n<p>Cactus ransomware, a relatively new name in the ransomware scene, is a malicious software designed to block access to a computer system until a sum of money (ransom) is paid.<\/p>\n<p>The Cactus group typically employs tactics such as spear-phishing emails and exploiting software vulnerabilities to gain access to their victim&#8217;s network.<\/p>\n<h2>Practical advice<\/h2>\n<p>For organizations dealing with sensitive information, it&#8217;s essential to employ strong cybersecurity practices to protect against ransomware threats.<\/p>\n<p>These may include:<\/p>\n<ul>\n<li>Regularly backing up data<\/li>\n<li>Implementing an effective patch management process<\/li>\n<li>Providing regular employee training on recognising and avoiding phishing emails<\/li>\n<li>Enforcing stringent access controls to network resources<\/li>\n<\/ul>\n<p>Furthermore, professionally managed encryption keys, two-factor or multi-factor authentication may add an extra level of security protecting organization&#8217;s assets from such attacks.<\/p>\n<h2>Follow-up Reading:<\/h2>\n<ul>\n<li><a href=\"https:\/\/www.cisa.gov\/publication\/ransomware-guide\">CISA&#8217;s Guide to Handling Ransomware Attacks<\/a><\/li>\n<li><a href=\"https:\/\/www.nist.gov\/publications\/guide-cyber-security-event-recovery\">NIST&#8217;s Guide to Cyber Security Event Recovery<\/a><\/li>\n<li><a href=\"https:\/\/www.enisa.europa.eu\/publications\/ransomware-protection-for-smes\">ENISA&#8217;s Ransomware Protection Guide for SMEs<\/a><\/li>\n<\/ul>\n<\/article>\n<p>&#8220;`<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;`html LA housing authority confirms breach claimed by Cactus ransomware Summary: The Housing Authority of<\/p>\n","protected":false},"author":1,"featured_media":2834,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"pmpro_default_level":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[2,5],"tags":[],"class_list":["post-2833","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-news","pmpro-has-access"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/posts\/2833","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/comments?post=2833"}],"version-history":[{"count":1,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/posts\/2833\/revisions"}],"predecessor-version":[{"id":2835,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/posts\/2833\/revisions\/2835"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/media\/2834"}],"wp:attachment":[{"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/media?parent=2833"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/categories?post=2833"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/tags?post=2833"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}