According to sources, Yazoo Valley Electric Power Association (a Critical Infrastructure organization in Mississippi) was hit with a cyber attack. It was first reported on 2025-02-04.

If You're in Mississippi, You're at Increased Risk

Specialized Cybersecurity for Critical Infrastructure

Manage your organization’s attack surface with SecuLore’s passive cyber threat detection.

  • Asset Discovery
  • Vulnerability Assessments
  • Risk Prioritization
  • 24/7 Active Threat Detection

  • Continuous Monitoring

Source 1  |  2025-02-04

Mississippi-based Yazoo Valley Electric Power Association had information from 20,997 customers stolen following a cyberattack in late August, according to The Record, a news site by cybersecurity firm Recorded Future.

“Investigation into the incident completed in October revealed that only "limited" personal information had been compromised from affected individuals.“

“While the electric utility — which serves almost 100,000 people across half a dozen counties along the Mississippi River and Louisiana border — redacted other impacted data aside from customers' names as well as did not provide information regarding the type of attack“

“The intrusion had been claimed by the Akira ransomware gang, which purported stealing files with financial records and Social Security numbers.“

Guarding Against Hacking

  • June 10, 2020

    Best Cyber Practices and Policies for Your Agency

  • April 15, 2020

    COVID-19, Elections, Taxes: How Hot Topics Impact Public Safety Cybersecurity

  • January 8, 2020

    Reviewing the Worst Cyber Attacks of 2019

  • October 16, 2019

    Fixing the Top 5 Public Safety Vulnerabilities

Cybersecurity for Critical Infrastructure

SecuLore provides Managed Detection and Response (MDR) to protect our nation’s critical infrastructure from cyber threats. Our expertise is built on deep knowledge of 9-1-1 technology, cyberwarfare, and ethical hacking, ensuring the highest level of cybersecurity for public safety agencies.

  • 24/7 Vulnerability & Threat Monitoring

  • Automated & AI Threat Detection

  • Specialized Threat Intelligence

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis