Related Posts
Subscribe via Email
Subscribe to our blog to get insights sent directly to your inbox.
When the Pennsylvania Office of Attorney General (OAG) went offline this August, it wasn’t just a technical disruption, it was an operational paralysis. For days, attorneys couldn’t reach witnesses, courts issued stay orders, and critical cases stalled. The office responsible for defending the Commonwealth found itself defending its own networks instead.
The OAG confirmed that a malicious actor infiltrated its systems, encrypting files and attempting extortion. The agency reports that no ransom was paid, but the recovery is ongoing. Email, phone systems, and public websites were impacted. A limited number of individuals were notified of possible data exposure, and the investigation remains active. In short: Pennsylvania’s legal nerve center faced the same playbook we’ve seen deployed against cities, hospitals, and school districts...but with far higher stakes.
On August 11, state officials detected unauthorized activity inside the Attorney General’s network. Systems were taken offline immediately to contain the spread. The incident halted nearly all digital operations. Prosecutors lost access to evidence databases, litigation files, and internal communications. The fallout extended beyond the agency: the U.S. District Court for the Middle District of Pennsylvania issued standing orders delaying civil cases because OAG attorneys couldn’t access case materials.
The attack fits the pattern of a ransomware incident, reportedly claimed by the “INC Ransom” group. While their data-theft claims remain unverified, the tactics are familiar — compromise, encrypt, exfiltrate, then pressure with public leaks.
The Attorney General’s Office, to its credit, refused to pay ransom. It’s rebuilding from clean backups, re-establishing services in phases, and coordinating with law enforcement and the Commonwealth’s cybersecurity teams. This response, while disruptive, sends the right signal: public institutions should never negotiate with criminals.
This breach isn’t Pennsylvania’s problem alone; it’s a blueprint for what can happen anywhere that government, law, and data intersect.
The Attorney General’s office sits at the crossroads of public trust. It holds sensitive evidence, consumer data, and active investigations. It connects to courts, law enforcement, and dozens of agencies. When it goes down, the entire ecosystem feels it.
If this can happen to one of the most security-mature offices in the country, it can happen to any of us. Here’s why it matters:
The lesson here isn’t just “improve security.” It’s that resilience is the new measure of readiness. Every CIO, CISO, and state leader should ask: If we went dark tomorrow, how long before we’re back up? And who would we call first?
The Attorney General’s Office has not released technical details, which is standard practice during an active investigation. Based on patterns from similar incidents, we can infer several likely possibilities:
Until forensics are complete, we won’t know the precise chain of compromise. But we know this much: the playbook isn’t new. The tactics are simple, the consequences severe, and the pattern entirely predictable.
Most agencies already have the right policies on paper. The gap is execution. This is what should be in place today to keep your organization from reliving Pennsylvania’s headlines.
If your SOC isn’t monitoring for these signals, your agency is blind to its most common early indicators of compromise.
The Pennsylvania incident proves that even highly capable agencies can be disrupted. But resilience is built before the breach, not during it.
Public sector leaders have to think differently now: security isn’t an IT problem, it’s an operational continuity problem. The difference between a setback and a shutdown is preparation.
As one state CISO told me recently, “We’re not defending computers; we’re defending courtrooms, classrooms, and communities.” That’s exactly right. The mission is bigger than malware removal. It’s maintaining public trust when adversaries try to erode it.
If you need help defending your ecosystem, reach out to the NuHarbor team.
Don't miss another article. Subscribe to our blog now.
Justin (he/him) is the founder and CEO of NuHarbor Security, where he continues to advance modern integrated cybersecurity services. He has over 20 years of cybersecurity experience, much of it earned while leading security efforts for multinational corporations, most recently serving as global CISO at Keurig Green Mountain Coffee. Justin serves multiple local organizations in the public interest, including his board membership at Champlain College.
Subscribe to our blog to get insights sent directly to your inbox.