Skip to content
  • Experienced a Cyber Attack?
SecuLore
  • About
    Company
    • About SecuLore
    • Meet Your SOC Team
    • Become a Partner
    • Careers
    • Upcoming Events
    Latest SecuLore News
    • Motorola Solutions acquires SecuLore
    • SecuLore’s Frank Arico Appointed to APCO Cybersecurity Committee
    • CJIS Assist, A New Compliance-Focused Monitoring & Scanning Service
    • SecuLore Unveils CyberDSP™: The Future of Scalable Cybersecurity for Public Safety & Critical Infrastructure
    All Company News
  • Solutions
    Proactive Defense
    Cyber Vulnerability/Risk Assessment

    Identify Vulnerabilities, Today

    Attack Surface Management

    Mitigate your attack surface and strengthen your security posture.

    24/7/365 Monitoring

    Uncover anomalous behavior before it becomes a newsworthy incident.

    SOC As a Service

    Keep eyes on your network 24/7 without adding to your headcount. 100% US-Based.

    Detection & Recovery
    Managed Detection & Response

    Continuous monitoring, proactive threat hunting, guided response and remediation

    Incident Response & Mitigation

    Real-time expert guidance to contain and mitigate threats.

    Post-Threat Analysis & Remediation

    Forensic analysis and guidance

    By Industry
    • Public Safety
      • 911 Agencies, PSAPs, & ECCs
      • Law Enforcement & Police Departments
      • Fire Departments
      • EMS Providers
    • State & Local Gov’t Agencies
    • Healthcare
    • Energy & Utilities
    • Transportation
    • Government & DoD
    • Critical Infrastructure
    • Educational Institutions
  • Services
    CyberSight™

    Managed Detection & Response (MDR)

    • US-based 24/7/365 SOC monitoring

    • Threat hunting & early detection powered by CyberShapes™

    • Rapid response & guided mitigation

    • Post-threat analysis & remediation

    CJIS Assist

    Monitoring & Scans for CJIS

    • 24/7/365 Monitoring

    • Monthly vulnerability scanning

    • Actionable remediation suggestions

    • Drafted cyber incident response plans

    Cyber Benchmark

    Cyber Risk Assessment

    • Comprehensive network scan

    • Prioritized list of vulnerabilities

    • Actionable remediation suggestions

    • Cyber incident response plans

    Training

    • Incident Response Drills
    • Cybersecurity Defense Training
    • Cybersecurity Awareness Training
  • ResourcesFREE
    Critical Cyber Alerts
    • SonicWall Breach – Backup Files Exposed: Advice for Critical Networks

      2025-10-13

    • Update – Cisco ASA Zero-Day Attacks: What Public Safety Agencies Need to Know

      2025-09-09

    • Cyber Alert: Mitel and Oracle Vulnerabilities

      2025-01-13

    All Cybersecurity Alerts
    Blog Posts
    • How Hackers Map 911 Networks Before Launching an Attack
    • CJIS 6.0 Compliance Does Not Require More Staff
    • If You Had Seculore This is What We Would Have Caught
    All Blog Posts
    Webinars
    • 2025 Cybersecurity Year in Review for SLED + 2026 Threat Predictions
    • CJIS Cybersecurity Requirements: What You Need to Know
    • Why PSAP Cybersecurity Leadership Matters: Lessons from Sean Scott
    All Webinars
    Topics
    • Attack Variants & Cyber Defense
    • Current Cyber Events
    • Cyber Incident Preparation
    • Cyber Incidents
    • Network Architecture
    • Policy Guidance & Funding
    • Year in Review
Get Started
Cybersecurity Resources

Nevada’s 2025 Ransomware Incident: Case Study in Detection, Response, and Recovery

ALL CYBERSECURITY RESOURCES

According to the State of Nevada’s Governor’s Technology Office (GTO) After Action Report (AAR), the office identified a system outage in the early hours of August 24, 2025 (approximately 1:50 AM PDT) that took multiple machines, systems and services offline. The system outage was attributed to a ransomware attack that began as early as May 14, 2025.

As often is the case with cyber attacks against critical networks that rely on interoperability and uptime, the attackers were able to use the initial compromise to spread laterally within the network and wind up impacting over 60 agencies in the state due to one entry point. Being able to have that much impact with one initial compromise over a lengthy period of time before being noticed results in damaging impacts that take time and money to recover from, and sometimes not completely possible. Downtime of services costs lives, money from agencies, public money and then reputation. Even if some attacks are inevitable and unavoidable, it’s important to take every step possible and necessary to prevent the attack, because it blunts the damage it will cause in the end.

The statewide cyber attack on the state of Nevada gives us a good lesson on initial compromise, lateral movement, well time, impact, and a great example of being prepared to respond when – not if, a cyber attack is successful against critical networks.

Executive Summary

According to the AAR, on or around May 14, 2025, a Nevada state employee unknowingly and unintentionally downloaded malware after searching for a regularly used admin tool and wound up on compromised website from a phishing engineering tactic known as SEO poisoning.

Once this malware was active on the user’s computer, the threat actor was able to gain access to the network remotely and move laterally though various networks and systems. Access to the network was maintained over a period of roughly 100 days.

On August 24, unauthorized ransomware code was deployed after alternating security settings that encrypted files, backups were deleted and more than 60 Nevada state agencies were impacted through this single point of entry.

Despite unauthorized access, encrypted files, and deleted backups, the state was able to recover about 90% of the files and mostly recovered from the attack in 28 days.

A ransom note on August 5 was left by the threat actor. The amount that was requested in the note after files were encrypted and systems were taken offline, the demand was not disclosed, and the state chose not to pay the ransom to the threat actor.

The state incurred costs to vendors in the recovery and remediation process that totaled about $1.3 million.

Initial Compromise via SEO Poisoning (May 14)

The entry point of the attack on the state of Nevada that impacted multiple systems and agencies began with a social engineering/phishing technique known as SEO poisoning.

SEO poisoning is where threat actors will use deceptive practices to attempt to position their malicious website as legitimate in search rankings so it looks similar to a site a searcher is looking for, and one they will be familiar with. This website will often push malware of other malicious actions when visited by the user. sometimes known as HTTPS phishing, where these sites also have SSL certificates to appear legitimate.

The website that the state employee was searching for was a regularly used system administration tool that the threat actor had spoofed to look like the legitimate site. The spoofed website led to a trojanized version of the tool being downloaded, laced with malware, that led to the initial compromise of the state’s systems on May 14, 2025.

Endpoint detection and protection was able to quarantine and delete the malicious system administration tool that was downloaded from the spoofed website on June 26. However, the hidden backdoor that it created on the network, so the persistent mechanism remained active on the system and through the state’s network.

What the Threat Actor Did During Dwell Time

Though access through a hidden backdoor was gained on May 14, the threat actor used three months of reconnaissance (learning the system, gaining information without being detected) before installing remote software to conduct screen recording and log keystrokes on August 5. Another user’s system was compromised with the remote monitoring software on August 15. The tools installed through the malware and backdoor led to stolen information that allowed them to eventually bypass security controls to access systems remotely and steal passwords to multiple accounts.

In between the threat actor’s actions of installing remote monitoring software on the first system and the second, a customized encryption tunnel was deployed that enabled the ability to bypass security controls, and facilitate Remote Desktop Protocol access within the network.

Also within the same timeline (August 16-24), the threat actor used RDP access to move between servers, multiple directories, services, files, including a password vault, where 26 account passwords were stolen.

What made this access even more challenging to track was the threat actor’s ability to clear event logs to cover up what would have been monitored as suspicious activity. Had that activity been discovered before the deployment of ransomware, the threat actor’s access could been contained and eradicated to thwart the attack, saving time and money.

Why This Matters for Public Safety

The roughly 100 days of dwell time in the network is much longer than the average dwell time per attack of 60 days, per IBM.

The longer a threat actor has access to a system, networks and files undetected, it gives them more time to conduct reconnaissance. When threat actors persist in critical networks over a long period of time without proper detection, eradication and remediation, the more chances they have to move laterally throughout the network, end up with unauthorized access to sensitive accounts that have increased privileges, and they can gain more sensitive and valuable information they will use for leverage in a ransom demand.

In this particular case, the long dwell time in the network allowed the threat actor to increase its access to systems in the network that led to the shutdown of multiple state services used by the public. Some of those networks were used by DPS, dispatch, the DMV, courts and other citizen facing services.

Before ransomware was deployed, the threat actors were able to use encrypted tunnels that allowed them to bypass network defensives and establish remote desk protocol (RDP) control between systems. While accessing services for passwords and other credentials, the threat actors also cleared their event logs to hide trades of their movements that would have triggered suspicious activity. When attackers can dwell in networks like this, and move laterally, it’s important to have a baseline of network activity and access logs. The ability to erase activity logs makes it harder to detect their presence for the people trying to defend and monitor network activity.

Timeline of Detection & Initial Response

Let’s look at the timeline of events that led to detection (when the ransomware was deployed) after the issue was believed to be resolved with the removal of the malicious tool downloaded in June. This will demonstrate the time between the ransomware deployment, the ability to detect the issues, and how quickly action was taken to begin the response process.

The following events all happened on August 24, 2025.

  • 01:50 AM (PDT) – System outage that resulted in multiple VM going offline

  • 07:37 AM – Incident involving VM going offline was escalated to CIO + Governor’s Office

  • 09:51 AM – Access to machines was regained while confirming of ransomware deployment and ransom note

  • 4:44 PM – Third-party vendors and outside services were notified and brought into the response process

  • 7:03 PM – Launch of the state’s recovery protocol

What Public Safety Leaders Should Note

Though the threat actor was able to use three months to conduct reconnaissance through the encrypted tunnels, RDP, and deleting event logs, the escalation process from discovery to response showed careful preparation for this type of event.

The system outage was discovered early in the morning, overnight, on August 24 and in six hours. Once it was determined this was an incident that required further investigation, it was escalated to the state and CIO of Nevada. From there, it took around two hours to regained access to these VMs and find the ransom note from the incident. Within three hours, the team was able to confirm it had isolated the affected machines to prevent the ransomware from spreading to other systems.

In the next four hours, third party vendors and outside services were notified to assist in the response and recovery process.

In less than 24 hours after the ransomware attack took the VMs offline, the state was able to follow the NIST incident response timeline to escalate the incident, response and initiate the recovery processes.

When threat actors gain access to your network and can evade detection through techniques like deleting access logs, it can be difficult to eradicate the source of the original issue. Once ransomware is deployed, and the threat actor is no longer undetected, by choice at this stage, the response plan of the organization is tested. The ability to move from discovery, escalation, response, and recovery, are critical to minimizing downtime, reducing impact and financial loss.

Agencies and Services Affected

With multiple VMs being affected and the threat actor being able to move laterally throughout the network, and gain access to multiple, high level credentials, the list of impacted agencies spanned over 60, including:

  • DPS divisions

  • DMV

  • Court systems & public portals

  • Human services programs (SNAP, TANF)

  • Emergency Management website

  • Citizen services that rely on verification systems

Operational Consequences

Verification systems in public safety and other identification services that are public facing are important to have 100% uptime. When they incur outages, it can have an impact that slows response times, processes, and delaying other critical services and efforts.

Uptime, continuity and redundancy are all hallmarks of a properly operational public safety network. Even when these networks are the main target or entry point of an attack, this incident shows that these public safety services and systems can be heavily impacted by intrusions into statewide IT systems and functions. The uptime of these systems and services are heavily dependent on functioning and protected state network systems.

Immediate Containment Measures

The state took the first important step to cut off access to other VM and systems by isolating the known affected machines and systems first.

Isolating the systems allowed the state to contain the threat to the already affected systems, and confirm that the threat actor was no longer present in the system after leaving the ransom note and isolation the system.

Once they were able to isolate systems, that allowed the state to take the next step to recovery and bring in external incident response partners (cybersecurity, legal team, etc) to take the steps towards recovery, communication of that plan and execution.

The Backup Challenge

What made the recovery process slower for the state is that before the threat actor deployed ransomware and encrypted files and data on the systems on August 24, they also deleted backup volumes and data.

The government’s technology office engaged DELL Recovery Support once this was discovered. The support team was able to recover 90% of the data over a 28 day period.

Having offline, offsite backups that aren’t connected to your network so that they are impenetrable to attacks is key to a quicker recovery process than contacting outside firms and waiting to a restore.

Decision Not to Pay the Ransom

The state of Nevada was proactive in securing support by state legislature about three years prior to invest in cyber insurance. This initiative led to the state’s cyber insurance provider recommending a cybersecurity firm to lead the ransomware response and recovery process. The firm’s expertise in handling ransomware threats allowed the state government to rely on the cyber insurance to provide the services and avoid feeling the pressure to pay the ransom, of which the price was never disclosed.

Major Recovery Milestones

A full Active Directory rebuild started almost immediately thanks to its vendor network, as Dell’s team worked alongside internal IT personnel to retire redundancy points.

The recovery process was smooth and quick thanks to implementing tiering models for segmentation as well as deploying Windows LAPS (local administrator password solution)

During recovery, legacy protocols were disabled for authentication and enabling conditional access, part of implementing zero trust processes.

State passwords were reset during the recovery process. This included all systems and the removal of outdated and unnecessary user accounts. They replaced all old digital keys in order to prevent unauthorized access, something that is addressed in policies such as CJIS Security updates.

With 60+ agencies being impacted, the state had to prioritize which services and agencies to restore by using, and communicating a detailed plan to restore these areas that directly impacted public welfare.

This response and recovery process to keep essential services active and ogoing, a total of 4,212 overtime hours were logged between August 24 and September 20. That estimate of overtime cost the state approximately $259,037.84.

The vendor costs with the cybersecurity provider and Dell totaled $1.3M.

Why This Recovery Was Fast

According to Comparitech, in 1,133 confirmed ransomware attacks between 2018 and 2024, the average recovery time for government agencies was 27.8. Based on that study, the recovery time was about average. Nevada was able to recover right on time because of the proactive incident response plan that included an investment in cyber insurance.

The government’s technology office had the proper escalation plan in place and engaged the right decision makers in the process in an efficient timeline. Their legal team had a clear recommendation of a cybersecurity firm and knew which vendors to involve to start the recovery process. They were able to execute the prepared plan immediately once the systems went down and it was determined that ransomware was the cause.

Lessons Learned for Public Safety Organizations

The threat actor’s ability to move laterally throughout different networks after three months of access and undetected reconnaissance, while no doubt damaging in its own way, provided a lot of lessons about the path forward for the state of Nevada’s cybersecurity priorities and other similar agencies.

The steps take to strengthen cybersecurity measures prioritized increasing the difficulty to more laterally through networks when there is an initial compromise. Nevada adopted additional zero trust methodologies to increase segmentation between agencies based on operational needs.

Access was restricted with stronger Access Control Lists (ACLs) to create more barriers to gain administrator level domains, applications and services.

Restricting access between accounts and roles make it harder for threat actors to reach other areas of the network, information and critical systems if they come in through a different entry point.

The governor’s technology office took the step to prevent account credentials that belong to highly privileged accounts from being shared on master keys so that they cannot be used to take over critical systems. Just-in-time (JIT) access that only allows for timed access to login to systems and to data.

With dwell time playing a critical role in this attack, the GTO made the decision to deploy a modern endpoint detection and response (EDR) platform to improve threat detection and response. This increases behavioral visibility as well as network. Another important step for the GTO is the EDR platform integrating with a centralized Security Operations Center (SOC) to properly monitor and respond to potential threats in real time, with the right experience. The GTO made the decision to pursue a centrally managed SOC to prioritize continuity of operations and prepare for emerging threats.

With critical backups being deleted in this attack, the GTO also recognized that third party processes and backup recovery is critical, and taking the step to improve its integrity and immutability with off-site, off-line backups.

Nevada’s GTO recognized that conducting regular incident response exercises across multiple agencies will continue to improve more efficient response efforts and increase continuity among agencies that would be potentially impacted by cyber incident.

The GTO also discovered during this incident that application ownership was an issue and additional process improvement were needed along with regular reviews.

One of the actions the GTO will take moving forward in wake of the incident is expanding employee training that addresses future threats, threat recognition, best practices and incident response. They recognized that while technological and process improvements can protect systems and data when an attack takes place, that people are the front lines of the cybersecurity culture in the organization. They also recognized that a strong security culture along with technology is the key to mitigating future risks.

What Nevada’s Incident Means for Public Safety Agencies

The most important takeaways from this incident show that cybersecurity, cyber threats and cyber attacks are not just simply confined to any IT department. We saw examples of real life impacts on critical services, systems that are public facing.

Ransomware was the ultimate outcome by encrypting systems, data, deleting backups and demanding a ransom (that was ultimately, correctly unpaid). What led to that being the outcome was the three months of dwell time in the system to conduct reconnaissance, steal credentials, increase privileges, and ultimate gain more access to the networks. Even though the initial malicious tool was believed to be deleted, the encrypted tunnel and ability to delete activity logs allowed the threat actors to remain undetected during this phase that led to the events in this attack.

Overall, the recovery time for the state of Nevada fell in line with the average time is due to its incident response plan, leadership and partnerships with third party services, vendors, and communication between all phases.

The uptime of mission-critical systems relies on preparation, readiness, communication and leadership to make sure these public facing services can be trusted.

Contents

  • Executive Summary
  • Initial Compromise via SEO Poisoning (May 14)
  • What the Threat Actor Did During Dwell Time
  • Why This Matters for Public Safety
  • Timeline of Detection & Initial Response
  • What Public Safety Leaders Should Note
  • Agencies and Services Affected
  • Operational Consequences
  • Immediate Containment Measures
  • The Backup Challenge
  • Decision Not to Pay the Ransom
  • Major Recovery Milestones
  • Why This Recovery Was Fast
  • Lessons Learned for Public Safety Organizations
  • What Nevada’s Incident Means for Public Safety Agencies

Other Resources

  • How Hackers Map 911 Networks Before Launching an Attack
  • CJIS 6.0 Compliance Does Not Require More Staff
  • If You Had Seculore This is What We Would Have Caught
  • Why Mainstream Cyber Tools Miss PSAP Attacks
  • 2025 Cybersecurity Year in Review for SLED + 2026 Threat Predictions

SOC 2 Type 2 Certified | NIST SP 800-171 Compliant

  • 2288 Blue Water Blvd., Suite #329, Odenton, MD 21113
  • connect@seculore.com
  • (410) 305-0234

Privacy Policy  |  Provide Feedback

Page load link
Go to Top