Security

Cyber-crime

We're not in e-Kansas anymore: State courts reel from 'unauthorized incursion'

Fax, post, and human messengers can still be used for filing vital evidence


An unspecified security incident is forcing many state courts across Kansas to rely on paper filings, and it may have continue to do so for weeks, a state judge has warned.

The Kansas Supreme Court issued a brief notice that it was "experiencing network issues" on Thursday, October 12, and a short time later the same day said it was turning off its eFiling system until Sunday, October 15, "to give the judicial branch time to examine a security incident."

"Courts are open and operating, but clerks cannot receive electronic filings or electronic payments. All filings must be on paper or by fax. Paper filings can be hand delivered or sent by mail," The Register is told by the Kansas Judicial Branch.

"We continue to serve our communities, but we are using different methods until our systems are restored," said local Chief Justice Marla Luckert.

According to the statement "The Office of Judicial Administration can’t predict when the systems will be brought back online."

Per the Kansas Supreme Court, user access to state eFiling systems, the Protection Order Portal, District Court public access portal, case inquiry system, online marriage applications, payment processing, and a new statewide centralized case management system still being deployed across Kansas are all affected.

As of yesterday, the city of Topeka said its Municipal Court, Probation, and Prosecution divisions would be closed to the public on Monday "out of an abundance of caution," and to allow the city to investigate "possible security concerns with one of the court's systems."

"At this time, it is unknown if the possible security concern is associated with the Kansas Supreme Court's network security incident," Topeka officials said.

Speaking to Wichita's KAKE, 18th Judicial District Court Judge Phil Journey said he expected the system to be down for at least two weeks due to an "unauthorized incursion" that is affecting all of Kansas's state-level courts, based on the Office of Judicial Administration's continuity planning discussions. 

Interestingly enough, one county in the state is able to carry on business as usual: Johnson County is unaffected by the Supreme Court's Friday order, and it also just so happens to be the only one that has yet to be scheduled [PDF] to get Kansas's new centralized eCourt system. 

It's not clear if the eCourt system, Odyssey Case Manager from Tyler Technologies, is where the incident originated. We were unable to reach officials from the Kansas Supreme Court, City of Topeka, or Tyler Technologies for comment.

Is it ransomware?

When a cybersecurity incident response stretches into weeks, it's safe to assume systems or their data are damaged or inaccessible, and when that's the case, ransomware could be involved.

Without a response from someone in Kansas or at Tyler, The Register is unable to confirm the exact nature of the incident, but it would hardly be the first time a US government system – state or federal – were knocked offline for a prolonged period due to ransomware. 

Somerset County, New Jersey, was hit by a ransomware incident so severe last year that it was left without access to any of its records after 1977, and a Royal ransomware attack on the city of Dallas, Texas in May left the city picking up the pieces for weeks afterwards.

Sensitive data belonging to the US Marshals was also stolen in a ransomware incident early this year, and the federal government's response to the trend suggests it's hopelessly behind on protecting government systems, and by extension the data of US citizens. 

It's unclear if the personal data of Kansas citizens was compromised in this latest incident, and if so how much may have been stolen. Given that the systems affected belong to the state courts, anything exfiltrated in the attack could be highly sensitive and valuable to the right buyer. ®

Send us news
4 Comments

Regulator, insurers and customers all coming for Progress after MOVEit breach

Also, CISA cataloging new ransomware data points, 17k WP sites hijacked by malware in Sept., and more critical vulns

Everest cybercriminals offer corporate insiders cold, hard cash for remote access

The ransomware gang changes identities more than Jason Bourne

Chinese smart TV boxes infected with malware in PEACHPIT ad fraud campaign

PLUS: Sony admits to MoveITbreach; Blackbaud fined again, Qakbot's sorta back from the dead; and more

Ransomware attacks register record speeds thanks to success of infosec industry

Dwell times drop to hours rather than days for the first time

BYOD should stand for bring your own disaster, according to Microsoft ransomware data

Rising number of RaaS baddies drive global attack numbers up 200%

Lorenz ransomware crew bungles blackmail blueprint by leaking two years of contacts

Data leakers become data leakees

Feds hopelessly behind the times on ransomware trends in alert to industry

Better late than never, we guess

Thwarted ransomware raid targeting WS_FTP servers demanded just 0.018 BTC

Early attempt to exploit latest Progress Software bug spotted in the wild

MGM Resorts attackers hit personal data jackpot, but house lost $100M

Racecars and cyber insurance will balance its books in no time, though

US State Dept has no idea if its IT security actually works, say auditors

End-of-life systems still in use, poor inventory control, and China's hunting

CDW data to be leaked next week after negotiations with LockBit break down

Ransomware spokesperson scoffs at IT reseller's offer of payment

US construction giant unearths concrete evidence of cyberattack

Simpson Manufacturing yanks systems offline, warns of ongoing disruption