Albemarle County Faces Ransomware Attack, Awards Climate Grants

Edward Zhou
Edward Zhou

CEO & Founder

 
July 16, 2025 2 min read

Albemarle County Ransomware Attack

Albemarle
Image courtesy of The Record from Recorded Future News

Phone and technology outages in Albemarle County were confirmed to be the result of a ransomware attack last month. Officials reported that hackers likely accessed sensitive data of local government and public school employees, including driver’s license numbers, Social Security numbers, passport numbers, and military IDs. Approximately 112,000 residents may have had their names, addresses, and Social Security numbers exposed.

The attack was investigated by the FBI, Cybersecurity and Infrastructure Security Agency (CISA), and the Cyber Fusion Center of the Virginia State Police. The county is offering one year of free identity protection services to all residents and employees affected by the breach. Phone service was restored after two weeks of disruptions, although non-emergency phone lines were affected. The investigation is ongoing, and no cybercriminal group has claimed responsibility as of now.

For more information, visit the Albemarle County official site and updates on the incident can be found on Facebook.

Gloucester County Ransomware Attack

virginia
Image courtesy of The Record from Recorded Future News

Gloucester County, Virginia, experienced a ransomware attack on April 22, which compromised the personal information of over 3,500 current and former employees. The stolen data includes Social Security numbers, driver’s license numbers, bank account information, health insurance numbers, and medical information.

County Administrator Carol Steele confirmed that they engaged cybersecurity experts for recovery efforts and notified the FBI’s Cyber Crimes Division. The county's communications about the attack included warnings about network disruptions but lacked follow-up updates. Notably, the BlackSuit ransomware gang claimed responsibility for the attack and indicated that the county refused to negotiate a ransom.

For further details, see the Gloucester County cyber incident report and updates on their official Facebook page.

Albemarle Community Climate Action Grants

Albemarle County has awarded $100,000 in Community Climate Action grants to support local nonprofits in implementing aspects of its Climate Action Plan. Five projects received funding, aimed at greenhouse gas emission reduction.

  1. The Community Climate Collaborative received $20,000 for workshops on energy efficiency and waste management.
  2. The Local Energy Alliance Program was granted $18,600 for roof repairs and upgrades to low-income households participating in a solar program.
  3. Wildrock was awarded $11,380 for a composting system aimed at reducing food waste emissions.
  4. Charlottesville Community Bikes received an additional $25,000 for their bicycle refurbishment and distribution program.
  5. The International Rescue Committee’s New Roots Farm was granted $25,000 to electrify operations at their farm.

For more information on the Community Climate Action initiatives, you can explore details on the Albemarle County official site.

Edward Zhou
Edward Zhou

CEO & Founder

 

CEO & Founder of Gopher Security, leading the development of Post-Quantum cybersecurity technologies and solutions..

Related Articles

Ransomware Attacks Target Russian Vodka and Healthcare Sectors

The Novabev Group, parent company of the Beluga vodka brand, experienced a ransomware attack on July 14, 2025, causing significant disruptions. The attack affected WineLab, the company's liquor store chain, leading to a three-day closure of over 2,000 locations in Russia. The company reported that the attack crippled its IT infrastructure, particularly point-of-sale systems and online services. Novabev Group stated, "The company maintains a principled position of rejecting any interaction with cybercriminals and refuses to fulfill their demands."

By Alan V Gutnov July 19, 2025 3 min read
Read full article

Retail Sector Faces Surge in Ransomware Attacks: A 2025 Analysis

Publicly disclosed ransomware attacks on the retail sector globally surged by 58% in Q2 2025 compared to Q1, with UK-based firms being particularly targeted, according to a report by BlackFog. This spike in attacks follows high-profile breaches affecting retailers like Marks & Spencer (M&S), The Co-op, and Harrods, attributed to the threat actor known as Scattered Spider.

By Alan V Gutnov July 19, 2025 2 min read
Read full article

AI-Driven Lcryx Ransomware Emerges in Cryptomining Botnet

A cryptomining botnet active since 2019 has incorporated a likely AI-generated ransomware known as Lcryx into its operations. Recent analysis by the FortiCNAPP team at FortiGuard Labs identified the first documented incident linking H2miner and Lcryx ransomware. This investigation focused on a cluster of virtual private servers (VPS) utilized for mining Monero.

By Edward Zhou July 19, 2025 3 min read
Read full article

Preventing ClickFix Attacks: Safeguarding Against Human Error

ClickFix is an emerging social engineering technique utilized by threat actors to exploit human error. This technique involves misleading users into executing malicious commands under the guise of providing "quick fixes" for common computer issues. Threat actors use familiar platforms and deceptive prompts to encourage victims to paste and run harmful scripts.

By Alan V Gutnov July 19, 2025 3 min read
Read full article