Nevada’s Government Hit by Sophisticated Ransomware Attack, Inside the Full Breakdown

By  
Gigabit Systems
November 12, 2025
20 min read
Share this post

Nevada’s Government Hit by Sophisticated Ransomware Attack, Inside the Full Breakdown

A Transparent Look at How the Hack Happened

The State of Nevada has released a rare, fully transparent after-action report detailing how cybercriminals infiltrated more than 60 government agencies in August — crippling websites, communication systems, and online services across the state.

Despite widespread disruption, Nevada refused to pay a ransom. Within 28 days, the state’s IT teams restored 90% of all critical systems — earning praise for its resilience and transparency.

🕵️ How the Attack Started

The breach began months earlier, on May 14, when a state employee unknowingly downloaded a trojanized version of a legitimate system administration tool.

  • The employee searched Google for the tool, clicked a malicious search ad, and installed a fake version laced with malware.

  • Once executed, the program created a hidden backdoor that reconnected to the attackers’ infrastructure every time the employee logged in.

This tactic — using malvertising to target IT professionals — has become increasingly common, with fake versions of WinSCP, AnyDesk, KeePass, and other admin tools used to breach corporate and government systems.

💻 From Backdoor to Ransomware

Even after Symantec Endpoint Protection flagged and quarantined the malware in June, the attacker’s persistence mechanism remained active.

By early August, the hackers installed commercial remote monitoring software, giving them access to keystrokes, screen recordings, and network data.

They then used Remote Desktop Protocol (RDP) sessions and custom encrypted tunnels to move laterally — reaching privileged servers, including the password vault.

The attackers stole credentials from 26 accounts, wiped event logs, and began staging data for exfiltration. Although investigators found no evidence the data was actually removed, over 26,000 files were accessed.

Finally, on August 24 at 8:30 UTC, the attackers deleted all backup volumes, disabled recovery mechanisms, and deployed ransomware across the state’s virtualized infrastructure.

Within 20 minutes, the Governor’s Technology Office detected the mass outage and initiated emergency response procedures.

🧩 Recovery Without Paying Ransom

Instead of paying cybercriminals, Nevada’s IT staff worked around the clock.

  • 50 employees logged 4,200 overtime hours, costing $259,000.

  • The decision to rely on in-house recovery saved an estimated $478,000 compared to hiring external contractors.

External vendors, including Microsoft DART, Mandiant, and Dell, provided additional forensics, network rebuilding, and legal guidance — costing roughly $1.3 million in total.

Vendor

Service

Cost

Microsoft DART

Infrastructure rebuild

$354,481

Mandiant

Forensics & IR

$248,750

Aeris

Recovery support

$240,000

BakerHostetler

Legal & privacy counsel

$95,000

SHI (Palo Alto)

Network security

$69,400

Dell

Data recovery

$66,500

🔒 Strengthening Defenses

Following the attack, Nevada’s Governor’s Technology Office (GTO) took immediate steps to fortify systems:

  • Removed outdated accounts and security certificates

  • Reset all privileged passwords

  • Restricted access to sensitive infrastructure

  • Reviewed and hardened system rules and permissions

The report also highlights the need for continuous monitoring, rapid threat detection, and better staff training, as threat actors refine their techniques.

⚠️ Why It Matters

Nevada’s decision to release a full technical report sets a new standard for government transparency in cybersecurity.

The case also illustrates how a single malicious download can lead to statewide disruption — and how proper response playbooks and refusal to pay ransom can make recovery possible.

Share this post
See some more of our most recent posts...