Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

The Pennsylvania Office of the Attorney General Confirms a Data Breach Following a Ransomware Attack



The Pennsylvania Office of the Attorney General has confirmed that it was the victim of a data breach following a ransomware attack in August, resulting in the theft of 5.7 terabytes of sensitive data. The breach is believed to have occurred sometime between August and September, and may have included names, Social Security numbers, and medical information for some individuals. If you are affected by this incident, contact the OAG's toll-free call center at (1-833-353-8060) for assistance.

  • The Pennsylvania Office of the Attorney General (OAG) suffered a data breach following a ransomware attack in August, resulting in the theft of 5.7 terabytes of sensitive data.
  • Certain files were accessed without authorization during the breach, potentially containing personal data such as names, Social Security numbers, and medical information.
  • The attack is believed to have been carried out by the Inc Ransom group, which claimed responsibility and posted a message on its website detailing the stolen data.
  • A toll-free call center has been set up to assist those affected by the breach.
  • Cybersecurity researcher Kevin Beaumont reported that attackers exploited the Citrix NetScaler vulnerability to gain access to OAG's systems.
  • The incident highlights the growing threat posed by ransomware attacks and the importance of maintaining robust cybersecurity measures.
  • Ransomware attacks have been targeting various types of organizations, including government agencies, healthcare providers, and private companies in recent years.



  • The Pennsylvania Office of the Attorney General (OAG) has confirmed that it was the victim of a data breach following a ransomware attack in August. The incident, which is believed to have occurred sometime between August and September, resulted in the theft of 5.7 terabytes of sensitive data. This information includes various types of personal data, such as names, Social Security numbers, and medical information, which was contained within certain files.

    According to a statement released by OAG, certain files were accessed without authorization during the breach. The organization has reviewed the data involved in the breach and determined that it may have included name, Social Security number, and/or medical information for some individuals. However, at this time, there is no evidence of any misuse or attempted misuse of the information that was potentially involved.

    The attack on OAG's systems is believed to have been carried out by a group called Inc Ransom group. This group claimed responsibility for the security breach and posted a message on its website detailing the stolen data, including the theft of 5.7 TB of sensitive data. The message also mentioned that the attackers had gained access to the internal network of the FBI.

    The OAG set up a toll-free call center (1-833-353-8060) to assist those affected by the breach, and it is available Monday through Friday from 8 a.m. to 8 p.m. ET, excluding U.S. holidays.

    It is worth noting that cybersecurity researcher Kevin Beaumont reported in September that attackers had exploited the Citrix NetScaler vulnerability known as CitrixBleed2 to gain access to OAG's systems. According to Beaumont, "Pennsylvania Office of Attorney General has been down for several weeks from a ransomware attack. They haven't mentioned it, but I'm told the group got in via CitrixBleed 2."

    The incident highlights the growing threat posed by ransomware attacks and the importance of maintaining robust cybersecurity measures to protect against such threats. It also underscores the need for organizations to have adequate incident response plans in place to quickly respond to and contain security breaches.

    In recent years, there has been a significant increase in the number of ransomware attacks targeting various types of organizations, including government agencies, healthcare providers, and private companies. These attacks often involve the use of malware and other techniques to gain unauthorized access to an organization's systems and steal sensitive data.

    The OAG is not the first government agency to be targeted by a ransomware attack in recent years. Other organizations have also been affected, including hospitals, schools, and local governments. In some cases, these attacks have resulted in significant disruptions to operations and the theft of sensitive data.

    In addition to the OAG, other organizations that have been affected by recent ransomware attacks include DoorDash, Google, and Jaguar Land Rover. These incidents highlight the need for organizations to prioritize cybersecurity and take proactive steps to protect themselves against ransomware threats.

    In conclusion, the Pennsylvania Office of the Attorney General's confirmation of a data breach following a ransomware attack highlights the growing threat posed by these types of attacks and the importance of maintaining robust cybersecurity measures. The incident also underscores the need for organizations to have adequate incident response plans in place to quickly respond to and contain security breaches.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/The-Pennsylvania-Office-of-the-Attorney-General-Confirms-a-Data-Breach-Following-a-Ransomware-Attack-ehn.shtml

  • https://securityaffairs.com/184795/data-breach/pennsylvania-office-of-the-attorney-general-oag-confirms-data-breach-after-august-attack.html

  • https://attack.mitre.org/groups/G1032/

  • https://sosransomware.com/en/ransomware-groups/inc-ransom-anatomy-and-solutions-for-a-major-threat-in-2025/


  • Published: Tue Nov 18 15:39:10 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us