Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

Latest News

Physical AI Talent War Drives Salaries Surge Across Robotics And Autonomous Vehicle Industry

  Salaries climb fast as demand surges for experts who blend AI know-how with hands-on hardware skills. Firms in robotics, military tech, an...

All the recent news you need to know

Uffizi Cyber Incident Serves as a Warning for Europe’s Cultural Sector

 


The cyber intrusion at the Uffizi Galleries in early 2026 has quickly evolved from an isolated security lapse into a case study of systemic digital exposure within Europe’s cultural infrastructure. One of the continent’s most prestigious custodians of artistic heritage, the institution disclosed that attackers succeeded in extracting its photographic archive an asset of both scholarly and operational value before containment measures were enacted.

Although restoration from secured backups ensured continuity of operations, the incident has sharpened attention on how legacy systems, often peripheral to core modernization efforts, can quietly become high-risk vectors within otherwise well-defended environments. Subsequent forensic assessments indicate that the breach was neither abrupt nor opportunistic.

Investigative timelines trace initial compromise activity as far back as August 2025, suggesting a calculated persistence campaign rather than a single-point intrusion. The suspected entry vector was an overlooked software component responsible for handling low-resolution image flows on the museum’s public-facing infrastructure an element deemed non-critical and therefore excluded from rigorous patch cycles. This miscalculation enabled attackers to establish a stable foothold, from which they executed disciplined lateral movement across interconnected systems spanning the Uffizi complex, including Palazzo Pitti and the Boboli Gardens.

Operating under a low-and-slow exfiltration model, the actors deliberately avoided triggering conventional detection thresholds, transferring data incrementally over several months. By the time administrative servers exhibited disruption, the extraction phase had largely concluded underscoring a level of operational maturity that challenges traditional assumptions about breach visibility and response timelines. 

Beyond its digital architecture, the Uffizi Galleries safeguards some of Italy’s most iconic works, including The Birth of Venus and Primavera by Sandro Botticelli, alongside Doni Tondo by Michelangelo a cultural weight that amplifies the implications of any security compromise. 

Institutional statements have sought to contextualize the operational impact, indicating that service disruption was limited to the restoration window required for backup recovery, with public disclosure issued post-incident in line with internal verification protocols. 

Reports circulating in Italian media suggested that threat actors had extended their reach across interconnected sites, including Palazzo Pitti and the Boboli Gardens, briefly asserting control over the photographic server and issuing a ransom demand directly to director Simone Verde. 

However, the institution maintains that comprehensive backups remained intact and that parallel developments such as restricted access to sections of Palazzo Pitti and the temporary relocation of select valuables to the Bank of Italy were pre-scheduled measures linked to ongoing renovation cycles rather than reactive security responses.

Similarly, the transition from analogue to digital surveillance infrastructure, initially recommended by law enforcement in 2024, was accelerated within a broader risk recalibration framework influenced in part by high-profile incidents such as the Louvre Museum theft case. 

The convergence of these events including the recent theft of works by Pierre-Auguste Renoir, Paul Cézanne and Henri Matisse from a northern Italian museum reinforces a broader pattern in which physical and cyber threats are increasingly intersecting, demanding integrated security postures across Europe’s cultural institutions. 

The reference to the Louvre Museum is neither incidental nor rhetorical. On 19 October 2025, a highly coordinated physical breach exposed critical lapses in on-site security when individuals, posing as construction workers, accessed restricted areas via a freight lift, breached a second-floor entry point, and removed multiple pieces of the French Crown Jewels within minutes.

Subsequent findings from a Senate-level inquiry pointed to systemic deficiencies, including limited CCTV coverage across exhibition spaces, misaligned external surveillance equipment, and fundamentally weak access controls at the credential level. The incident, which ultimately led to the resignation of director Laurence des Cars in February 2026, remains unresolved, with the stolen artefacts yet to be recovered. 

Against this backdrop, the distinction drawn by the Uffizi Galleries becomes materially significant. Unlike the Louvre breach, the Uffizi incident remained confined to the digital domain, with no evidence of physical intrusion or compromise of exhibition assets. 

Public-facing operations, including ticketing systems and visitor access, continued uninterrupted, with the only measurable impact attributed to backend restoration processes following data recovery. Amid intensifying scrutiny, conflicting narratives have emerged regarding the scope of data exposure. 

Reporting referenced by Cybernews, citing local sources including Corriere della Sera, alleged that attackers exfiltrated operationally sensitive artefacts ranging from authentication credentials and alarm configurations to internal layouts and surveillance telemetry before issuing a ransom demand.

The Uffizi Galleries has firmly contested these assertions, maintaining that forensic validation has yielded no evidence supporting the compromise of architectural maps or restricted security schematics, and emphasizing that certain observational elements, such as camera placement, remain inherently visible within public-facing environments. 

From a technical standpoint, the institution reiterated that core security systems are logically segregated and not externally addressable, limiting the feasibility of direct remote extraction as described. While investigations indicate that threat actors may have leveraged interconnected endpoints—including workstation nodes and peripheral devices to incrementally profile the environment, officials stress that no physical assets were impacted and no confirmed data misuse has been established. 

The ransom communication, reportedly directed to director Simone Verde with threats of dark web exposure, further underscores the psychological dimension often accompanying such campaigns. Notably, precautionary measures observed in parallel such as temporary gallery closures and the transfer of select holdings to the Bank of Italy have been attributed to pre-existing operational planning rather than reactive containment. 

In the broader context of heightened sectoral vigilance following incidents like the breach-linked vulnerabilities exposed at the Louvre Museum, the Uffizi has accelerated its transition from analogue to digital surveillance infrastructure, aligning with law enforcement recommendations issued in 2024. 

In its final clarification, the Uffizi Galleries moved to separate speculation from confirmed facts. While it did not deny that some valuables had been temporarily moved to a secure vault at the Bank of Italy, officials stressed that this step was part of planned renovation work, not a response to the cyber incident.

Reports from Corriere della Sera about sealed doors and restricted staff communication were also addressed, with the museum explaining that certain closures were linked to long-pending fire safety compliance and structural adjustments required for a historic building of its age. 

On the technical front, the Uffizi confirmed that its photographic archive remained safe, clarifying that although the server had been taken offline, it was done to restore data from backups a process now completed without any loss.

Despite the attention surrounding the breach, the museum continues to function normally, with visitor areas and ticketing operations unaffected, underlining how effective backup systems and planning helped limit real-world impact.

UNC6692 Uses Microsoft Teams Impersonation to Deploy SNOW Malware

 



A newly tracked threat cluster identified as UNC6692 has been observed carrying out targeted intrusions by abusing Microsoft Teams, relying heavily on social engineering to deliver a sophisticated and multi-stage malware framework.

According to findings from Mandiant, the attackers impersonate internal IT help desk personnel and persuade employees to accept chat requests originating from accounts outside their organization. This method allows them to bypass traditional email-based phishing defenses by exploiting trust in workplace collaboration tools.

The attack typically begins with a deliberate email bombing campaign, where the victim’s inbox is flooded with large volumes of spam messages. This is designed to create confusion and urgency. Shortly after, the attacker initiates contact through Microsoft Teams, posing as technical support and offering assistance to resolve the email issue.

This combined tactic of inbox flooding followed by help desk impersonation is not entirely new. It has previously been linked to affiliates of the Black Basta ransomware group. Although that group ceased operations, the continued use of this playbook demonstrates how effective intrusion techniques often persist beyond the lifespan of the original actors.

Separate research published by ReliaQuest shows that these campaigns are increasingly focused on senior personnel. Between March 1 and April 1, 2026, 77% of observed incidents targeted executives and high-level employees, a notable increase from 59% earlier in the year. In some cases, attackers initiated multiple chat attempts within seconds, intensifying pressure on the victim to respond.

In many similar attacks, victims are convinced to install legitimate remote monitoring and management tools such as Quick Assist or Supremo Remote Desktop, which are then misused to gain direct system control. However, UNC6692 introduces a variation in execution.

Instead of deploying remote access software immediately, the attackers send a phishing link through Teams. The message claims that the link will install a patch to fix the email flooding problem. When clicked, the link directs the victim to download an AutoHotkey script hosted on an attacker-controlled Amazon S3 bucket. The phishing interface is presented as a tool named “Mailbox Repair and Sync Utility v2.1.5,” making it appear legitimate.

Once executed, the script performs initial reconnaissance to gather system information. It then installs a malicious browser extension called SNOWBELT on Microsoft Edge. This is achieved by launching the browser in headless mode and using command-line parameters to load the extension without user visibility.

To reduce the risk of detection, the attackers use a filtering mechanism known as a gatekeeper script. This ensures that only intended victims receive the full payload, helping evade automated security analysis environments. The script also verifies whether the victim is using Microsoft Edge. If not, the phishing page displays a persistent warning overlay, guiding the user to switch browsers.

After installation, SNOWBELT enables the download of additional malicious components, including SNOWGLAZE, SNOWBASIN, further AutoHotkey scripts, and a compressed archive containing a portable Python runtime with required libraries.

The phishing page also includes a fake configuration panel with a “Health Check” option. When users interact with it, they are prompted to enter their mailbox credentials under the assumption of authentication. In reality, this information is captured and transmitted to another attacker-controlled S3 storage location.

The SNOW malware framework operates as a coordinated system. SNOWBELT functions as a JavaScript-based backdoor that receives instructions from the attacker and forwards them for execution. SNOWGLAZE acts as a tunneling component written in Python, establishing a secure WebSocket connection between the compromised machine and the attacker’s command-and-control infrastructure. SNOWBASIN provides persistent remote access, allowing command execution through system shells, capturing screenshots, transferring files, and even removing itself when needed. It operates by running a local HTTP server on ports 8000, 8001, or 8002.

Once inside the network, the attackers expand their control through a series of post-exploitation activities. They scan for commonly used network ports such as 135, 445, and 3389 to identify opportunities for lateral movement. Using the SNOWGLAZE tunnel, they establish remote sessions through tools like PsExec and Remote Desktop.

Privilege escalation is achieved by extracting sensitive credential data from the system’s LSASS process, a critical Windows component responsible for storing authentication information. Attackers then use the Pass-the-Hash technique, which allows them to authenticate across systems using stolen password hashes without needing the actual passwords.

To extract valuable data, they deploy tools such as FTK Imager to capture sensitive files, including Active Directory databases. These files are staged locally before being exfiltrated using file transfer utilities like LimeWire.

Mandiant researchers note that this campaign reflects an evolution in attack strategy by combining social engineering, custom malware, and browser-based persistence mechanisms. A key element is the abuse of trusted cloud platforms for hosting malicious payloads and managing command-and-control operations. Because these services are widely used and trusted, malicious traffic can blend in with legitimate activity, making detection more difficult.

A related campaign reported by Cato Networks underlines similar tactics, where attackers use voice-based phishing within Teams to guide victims into executing a PowerShell script that deploys a WebSocket-based backdoor known as PhantomBackdoor.

Security experts emphasize that collaboration platforms must now be treated as primary attack surfaces. Controls such as verifying help desk communications, restricting external access, limiting screen sharing, and securing PowerShell execution are becoming essential defenses.

Microsoft has also warned that attackers are exploiting cross-organization communication within Teams to establish remote access using legitimate support tools. After initial compromise, they conduct reconnaissance, deploy additional payloads, and establish encrypted connections to their infrastructure.

To maintain persistence, attackers may deploy fallback remote management tools such as Level RMM. Data exfiltration is often carried out using synchronization tools like Rclone. They may also use built-in administrative protocols such as Windows Remote Management to move laterally toward high-value systems, including domain controllers.

These intrusion chains rely heavily on legitimate software and standard administrative processes, allowing attackers to remain hidden within normal enterprise activity across multiple stages of the attack lifecycle.

Anthropic's Mythos: AI-Powered Vulnerability Discovery Forces Cybersecurity Reckoning

 

Anthropic’s Mythos is less a single “hacker AI” than a signal that cybersecurity is entering a new phase. The real reckoning is not that one model can break everything at once, but that software weakness will be found faster, cheaper, and at greater scale than defenders are used to. Anthropic’s own testing says Mythos can identify and chain serious vulnerabilities across major operating systems and browsers, which is why the company withheld public release and limited access to select organizations for defense work.

That shift matters because security teams have long relied on human pace. Vulnerability research, exploit development, patch validation, and incident response usually move slower than attackers would like; Mythos compresses that timeline. Anthropic says the model can uncover subtle, long-standing flaws, including issues that survived years of automated testing and human review. That does not mean every discovered flaw becomes an immediate catastrophe, but it does mean the window between “bug found” and “weaponized” could shrink dramatically.

Threat analysts believe that AI’s biggest cybersecurity impact may come from existing tools, not only from frontier models like Mythos. Even before Mythos, attackers and defenders were already using AI agents to generate code, search for weaknesses, and automate parts of exploitation and remediation. So the danger is not a sudden cliff where the world changes overnight; it is a steady acceleration that makes old security assumptions look outdated. In that sense, Mythos is a spotlight, not the whole show. 

A second layer of concern is organizational. Anthropic is giving Mythos to more than 40 companies and several security-focused groups so they can test their own systems and harden critical software. That defensive access may help, but it also reveals an uncomfortable reality: the same capabilities that strengthen security can also lower the barrier for misuse if they spread beyond controlled settings. This creates pressure on companies to treat AI as part of the threat model rather than as a productivity add-on. 

Threat analysts ultimately argues for a change in mindset. Security can no longer be an afterthought or a compliance layer added at the end of development. If AI can find and chain vulnerabilities at machine speed, then “secure by design” has to become the default, with better code practices, stronger testing, faster patching, and tighter controls around high-risk AI systems. Mythos may not trigger the exact cybersecurity crisis many people imagined, but it does force a more serious one: software defense must evolve as quickly as software attack.

OpenAI Tightens macOS Security After Axios Supply Chain Attack and Physical Threat Incident

 

Security updates rolled out by OpenAI for macOS apps follow discovery of a flaw tied to the common Axios library. Because of risks exposed through a software supply chain breach, checks on app validation tightened noticeably. One outcome: stronger safeguards now guide distribution methods across desktop platforms. Verification steps increased where imitation attempts once slipped through. The company says the hacked Axios package entered a dev process via an automated pipeline, possibly revealing key signing methods tied to macOS app authentication. 

Though worries emerged over software trustworthiness, OpenAI stated no signs exist of leaked user information, breached internal networks, or tampering with its source files. Starting May 8, older versions of OpenAI’s macOS apps will no longer be supported. Updates are now mandatory, not optional. The shift pushes users toward newer releases as a way to tighten defenses. Functionality depends on using recent builds - this cuts openings for tampering. Fake or modified copies become harder to spread when outdated clients stop working. 

Security improves when only authenticated software runs. Protection rises when unverified versions fade out. Keeping systems current closes gaps exploited by malicious actors. Outdated installations pose higher risk, so access ends automatically. Upgraded versions meet stricter validation standards. Support withdrawal isn’t arbitrary - it aligns with safety priorities. 

Continued operation requires compliance with updated requirements. It could be part of a broader pattern - security incidents tied to groups connected with North Korea have recently focused on infiltrating software development environments through indirect routes. Instead of breaking into main platforms, attackers often manipulate components already trusted within workflows. This shift toward subtle intrusion methods has made early identification more difficult. Detection lags because weaknesses hide inside approved tools. 

One sign points to coordinated efforts stretching across multiple targets. The method avoids obvious entry, favoring quiet access over force. Compromised updates act like unnoticed messengers. Such strategies thrive where verification is light. Hidden flaws emerge only after deployment. Trust becomes the weak spot. Observers note similar tactics appearing elsewhere in recent breaches. Indirect pathways now draw more attention than frontal assaults. Stealth matters more than speed. Systems appear intact until downstream effects surface. Monitoring grows harder when threats arrive disguised as normal operations. 

Besides digital safety issues, OpenAI now faces growing real-world dangers. In San Francisco, law enforcement took someone into custody after a suspected firebomb was thrown close to Chief Executive Sam Altman’s home, followed by further warnings seen near corporate offices. Though nobody got hurt, the events point to rising friction tied to artificial intelligence development. OpenAI collaborates with authorities, addressing risks across online and real-world domains. Strengthening internal safeguards remains an ongoing effort, shaped by evolving challenges. 

Instead of waiting for incidents, recent steps like requiring updated macOS versions aim to build confidence in their systems. This move comes before any verified leaks occur - its purpose lies in prevention, not damage control. OpenAI pushes further into business markets right now, with growing income expected from ad tech powered by artificial intelligence along with corporate offerings. 

At the same time, efforts such as the “Trained Access for Cyber” project move forward, delivering advanced cybersecurity tools driven by machine learning to carefully chosen collaborators. Still, the event highlights how today's cyber threats are becoming harder to manage, as flaws in shared software meet tangible dangers in practice. 

Notably, OpenAI’s actions follow a wider trend across tech - companies now prioritize tighter checks, quicker updates, sometimes reworking entire defenses before problems spread.

Open Source Security Tools impacted by Microsoft Account Suspensions


 

Several widely trusted security tools have been affected by the disruption beyond routine enforcement, including the distribution pipelines. Microsoft suspended developer accounts associated with VeraCrypt, WireGuard, and Windscribe without any prior technical clarification, effectively preventing them from accessing Microsoft's code signing and update delivery systems. 

Practically, this disruption hinders the delivery of authenticated binaries, delays incremental updates, and restricts timely responses to emerging vulnerabilities. Since Windows environments are reliant on timely security updates to maintain their security, such a halt can pose a serious risk to users who utilize these tools for encryption, tunneling, and secure communication. 

As a result of the incident, open-source maintainers and contributors have stepped up to respond, raising concerns over opaque enforcement mechanisms and the lack of transparency in the remediation process. Microsoft acknowledges the issue in public forums following the escalation. A representative has stated that internal teams are actively reviewing the suspensions and working towards restoring the affected accounts. 

Still, there has been no clear indication of a timeline for doing so. This initial disruption set the stage for a deeper pattern that soon began to unfold across multiple projects. As the scope of the disruption became clearer, what initially appeared to be isolated enforcement actions began to reveal a broader and more coordinated pattern affecting multiple high-impact projects. 

Timeline of Account Suspension and Developer Impact

The sequence of events provides critical insight into how the disruption unfolded and why it quickly escalated beyond a routine compliance issue. Rather than being an isolated administrative action, the sequence of events underpinning the suspensions suggest a systemic enforcement anomaly. There was no preceding warning, audit flag, or remediation notice given to the maintainers of critical open-source security projects as to the sudden access restrictions across their Microsoft developer accounts in early April 2026. 

VeraCrypt's lead developer, Mouhinir Idrassi, first reported the problem, which involved the termination of his long-standing account that had previously been used to sign Windows drivers and bootloaders. The pattern became more evident as similar constraints began to surface across other critical projects. 

A similar barrier arose for Jason Donenfeld, the architect of WireGuard, as he attempted to push a significant Windows update that had been in development for a long time. Several similar accounts surfaced over the course of several years. As similar access loss confirmed by Windscribe, attention quickly shifted to the systems that govern these access controls.

While the timeline highlights the outward symptoms of the disruption, the underlying cause appears to originate from internal policy enforcement mechanisms. 

Policy Enforcement and Verification Breakdown

It is Microsoft's Windows Hardware Program, a critical trust framework governing kernel-mode driver distribution that is at the core of the disruption. 

Unless Windows systems are signed with cryptographic signatures, low-level drivers cannot be loaded, effectively halting deployment within the operating system. This dependency effectively places a centralized control layer over the distribution of low-level software, amplifying the impact of any disruption within the system. 

Developers have consistently denied receiving any formal notification regarding identity verification, despite statements made by Scott Hanselman that multiple communication attempts had been made over the preceding months, as a result of a policy revision introduced in late 2023. However, this assertion contrasts sharply with developer accounts, where no actionable or verifiable communication trail was observed. 

A notable point is that Donenfeld completed the required validation workflow through Microsoft’s designated third-party provider, which confirmed successful validation. However, his account remains inaccessible, raising concerns about inconsistencies between verification status and enforcement actions in Microsoft’s developer identity infrastructure. 

The inconsistencies further heightened scrutiny of the implementation of enforcement policies. Clarification emerging around the incident indicates the suspensions were not arbitrary, but linked to a tightening of Microsoft's compliance enforcement within its developer identity framework, even though critical communication and verification reconciliation gaps appear to have been exposed during the execution. 

Some maintainers have claimed that either the mandated verification steps were already complete or that no actionable notification was ever received, so affected parties have been forced to go through an extended appeals process that has reportedly lasted several weeks. As concerns escalated publicly, senior leadership intervention became necessary to address the growing uncertainty within the developer community.

As the situation became public, Pavan Davuluri responded directly, acknowledging the issue and informing us that internal teams are working on remediation. The enforcement is tied to an October policy update of the Windows Hardware Program, which required partners who had not re-verified their accounts since April 2024 to re-verify their identities. 

In spite of Microsoft's claims that multiple notification channels, including email alerts and in-platform prompts, were used to signal the transition, the company has concurrently conceded these mechanisms failed to reliably reach all stakeholders, particularly within open-source projects that have high impact. 

Moreover, Davuluri stated that Microsoft has contacted VeraCrypt and WireGuard developers directly in order to restore account access, framing the episode as a lapse in operational processes that will inform future policy changes. Despite the ongoing restoration efforts, signing capabilities are expected to be restored shortly, so users can resume getting security patches promptly.

However, beyond policy and process, the technical consequences of this disruption began to raise more immediate concerns. 

Security Implications and Systemic Risk Exposure 

It is important to note that the incident, in addition to interrupting update pipelines immediately, introduces a more consequential risk vector related to trust anchors and certificate lifecycle management within the Windows ecosystem. 

As Microsoft plans to revoke the certificate authority used to sign the VeraCrypt bootloader, existing trusted binaries may be invalidated, affecting system integrity. Users of VeraCrypt are facing a significant threat to system integrity. As a consequence of the revocation, encrypted systems may experience boot-time failures once the update takes effect unless timely access is provided to re-sign and redistribute an updated boot component, effectively locking users out of their environments.

Having highlighted the severity of this scenario, Mounir Idrassi notes that the inability to restore a valid trust chain could render the software non-viable for deployment on Windows. This marked the first publicly visible indication that the issue was not limited to routine account enforcement, but potentially rooted in deeper systemic controls. 

Moreover, the implications of the breach extend beyond encryption alone, extending into network security dependencies as a whole. This exposure is similar within the networking stack, since WireGuard underpins a wide range of privacy-focused services, including Mullvad, Proton VPN, and Tailscale implementations. It has been highlighted by Jason Donenfeld that any emerging security vulnerabilities within the Windows driver layer would not be patchable under current constraints, leaving a substantial user base at risk. 

While alternative platforms, such as Linux and macOS, are unaffected by the incident due to their independent distribution and signing models, the concentration of users on Windows greatly magnifies the effect, effectively isolating critical security updates from the largest segment of the install base. These risks together indicate a deeper architectural dependency within the Windows ecosystem, and more broadly, underscore a structural dependency embedded within the Windows security architecture. 

During kernel mode execution, compliance with Microsoft's driver signing requirements is enforced via centralized infrastructure and developer account controls through centralized infrastructure. MemTest86, a tool that goes beyond encryption and VPN software, suggests a systemic vulnerability rather than a domain-specific vulnerability. Any disruption within the Partner Center or associated identity systems may cascade into a complete halt to software deployment at the kernel level, which is incapable of returning to normal operation. 

For security practitioners, this reinforces a long-standing concern that critical open-source tools remain operationally dependent on a single vendor-controlled distribution and trust pipeline, despite being decentralized in development. In turn, this structural dependency frames the incident's broader impact on the industry as a whole. 

A wider reassessment of how critical security tools interact with centralized platform controls is likely to follow the episode, particularly in environments where a single security authority controls execution at the deepest layers of the system. Developers and security teams should be aware of the importance of operational resilience strategies, including diversifying distribution channels and contingency signing arrangements, as well as establishing clearer audit visibility into compliance status within vendor ecosystems. 

The rule also places renewed responsibility on platform providers to ensure that enforcement mechanisms are not only technically effective but also operationally transparent, with verifiable communication trails and fail-safe recovery mechanisms. In the midst of remediation, the industry's longer-term success will depend on whether these disruptions lead to structural improvements that balance platform security with the continuity of the tools that are designed to safeguard it.

Winona County Cyberattack Disrupts Key Services, Minnesota Deploys National Guard for Emergency Response

 

cyberattack on Winona County has disrupted critical systems, leading Minnesota authorities to step in with emergency assistance.

The attack began on April 6 and continued into April 7, impacting core digital infrastructure used for emergency response and municipal operations. Officials said the incident significantly affected their ability to manage essential services, including administrative and public-facing functions.

Governor Tim Walz responded by signing an executive order authorizing the Minnesota National Guard to support recovery efforts.

"Cyberattacks are an evolving threat that can strike anywhere, at any time," said Governor Walz. "Swift coordination between state and local experts matters in these moments. That's why I am authorizing the National Guard to support Winona County as they work to protect critical systems and maintain essential services."

County officials confirmed that teams have been working continuously since detecting the breach. The response involves coordination with Minnesota Information Technology Services, the Minnesota Bureau of Criminal Apprehension, the League of Minnesota Cities, the Federal Bureau of Investigation, and external cybersecurity experts.

Despite these efforts, authorities acknowledged that the scale and complexity of the attack exceeded both internal capabilities and commercial support, prompting a formal request for assistance from the National Guard.

Under the executive order, the Adjutant General is authorized to deploy personnel, equipment, and additional resources to assist with the response. The state can also procure necessary services, with costs covered through Minnesota’s general fund.

The order is currently active and will remain in place until the situation stabilizes or is officially lifted. The immediate focus is on containing the threat, preventing further damage, and restoring affected systems.

Officials emphasized that emergency services remain operational. Systems supporting 911 calls, fire response, and other urgent services are functioning, ensuring public safety is not compromised.

However, disruptions have slowed other county operations, and residents may experience delays while systems are restored.

Authorities have not yet disclosed the exact nature of the cyberattack or confirmed whether ransomware is involved.

The FBI, along with state agencies and cybersecurity experts, is investigating the incident. The probe aims to determine how the breach occurred, identify affected systems, and assess whether sensitive data was accessed.

This event follows a ransomware incident reported by Winona County in January 2026.

At that time, officials stated, "We recently identified and responded to a ransomware incident affecting our computer network. Upon discovery, we immediately initiated an investigation to assess the scope and impact of the incident."

During the earlier attack, a local emergency was declared to maintain service continuity. While emergency operations remained active, other services faced temporary disruptions.

The recurrence of cyber incidents within a short period has raised concerns about ongoing vulnerabilities and the growing cyber threat landscape for local governments. The incident highlights a broader trend: smaller government bodies are increasingly targeted by sophisticated cyberattacks but often lack the resources to respond effectively.

As systems go offline, public services are immediately affected, and recovery can take time. While state support is helping stabilize operations in Winona County, the situation underscores the need for stronger cybersecurity defenses at the local level.

Featured