According to sources, Water for People (a Critical Infrastructure organization in Colorado) was hit with a cyber attack. It was first reported on 2024-01-12.

If You're in Colorado, You're at Increased Risk

Cybersecurity for Critical Infrastructure

Manage your organization’s attack surface with SecuLore’s 24/7 network monitoring services.

  • 24/7 Threat Monitoring

  • Automated & AI Threat Detection

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis

Source 1  |  2024-01-12

Ransomware gang targets nonprofit providing clean water to world’s poorest

“Water for People, a nonprofit that aims to improve access to clean water for people whose health is threatened by a lack of it for drinking and sanitation, is the latest organization to have been hit by ransomware criminals. “

“The ransomware-as-a-service gang Medusa listed Water for People on its darknet site Thursday night, threatening to publish stolen information unless the nonprofit pays a $300,000 extortion fee. “

“A Water for People spokesperson told Recorded Future News: “The accessed data predates 2021, did not compromise our financial systems and no business operations were impacted. We’re working with top incident response firms, as well as our insurance company and hardening our systems with our security team to prevent future incidents.” “

Guarding Against Ransomware

  • August 16, 2023

    Ransomware is on the Rise Again: Defense Against New Players

  • November 9, 2022

    Ransomware’s Hidden Costs: What You Need To Know

  • August 11, 2021

    How to Prevent and Respond to Ransomware Attacks

  • January 25, 2017

    How to Defend Public Safety from Ransomware

Cybersecurity for Critical Infrastructure

SecuLore provides Managed Detection and Response (MDR) to protect our nation’s critical infrastructure from cyber threats. Our expertise is built on deep knowledge of 9-1-1 technology, cyberwarfare, and ethical hacking, ensuring the highest level of cybersecurity for public safety agencies.

  • 24/7 Vulnerability & Threat Monitoring

  • Automated & AI Threat Detection

  • Specialized Threat Intelligence

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis