Clay County, Indiana has declared a seven-day disaster emergency after falling victim to a crippling ransomware attack that has paralyzed essential government operations and forced officials to communicate through social media platforms.
The disaster declaration, which went into effect on July 11, came just two days after county officials first detected the cyber intrusion on July 9. The attack has severely disrupted operations at the Clay County Courthouse and the Clay County Probation/Community Corrections facilities, leaving critical government services in limbo.
"We, the Clay County Board of Commissioners, declare that a local disaster emergency exists in the county and that we hereby invoke and declare those portions of the Indiana Code which are applicable to the conditions and have caused the issuance of this proclamation, to be in full force and effect in the county for the exercise of all necessary emergency authority for protection of the lives and property of the people of Clay County and the restoration of the local government with a minimum of interruption," the commissioners stated in their official proclamation.

The severity of the attack became apparent when county officials were forced to announce the disaster declaration through the Clay County Emergency Management Agency's Facebook page, as the county government's website remained offline. This unprecedented step underscores the extent to which the ransomware has compromised the county's digital infrastructure.
While the specific cybercriminal group responsible for the Clay County attack has not been identified, officials have drawn connections to a similar incident that struck Monroe County, Indiana just one week prior. That attack, attributed to what authorities described as a "Russia-linked cybercrime syndicate," completely crippled all county offices and local courts in Monroe County.
"Russia-linked cybercrime syndicate,"
According to reporting by The Brazil Times, the commissioners noted that "a separate ransomware attack by a 'Russia-linked cybercrime syndicate' had breached Monroe County, Indiana's computer systems the previous week. This attack crippled all county offices and local courts in Monroe County, and something like it apparently attacked Clay County."
Cybersecurity experts believe the ransomware variant involved may be 'Blacksuit,' which is suspected to be a rebranding of the notorious Royal ransomware operation based in Russia. This connection highlights the evolving nature of ransomware groups, which frequently rebrand themselves to evade law enforcement and continue their criminal operations.

In response to the crisis, Clay County has implemented emergency protocols that require unprecedented coordination across all government departments. All public offices and employees in the county have been instructed to work in partnership with the Emergency Management Agency to enforce emergency laws and directives at both state and local levels. County officials have also urged residents to fully comply with emergency measures and assist public officials in implementing emergency operations plans.
To contain the damage and begin recovery efforts, Clay County has isolated the affected computer systems and brought in external cybersecurity experts to strengthen their defensive capabilities. These measures represent standard incident response protocols but underscore the complexity and resources required to address sophisticated ransomware attacks.
The Clay County incident reflects a troubling national trend that has seen local governments increasingly targeted by ransomware operators throughout 2024. Earlier this year, Fulton County, Georgia confirmed that a ransomware attack in February caused widespread disruptions to its IT systems, affecting services for millions of residents in the Atlanta metropolitan area.
By the Numbers
Similarly, Jackson County, Missouri faced major IT disruptions in April that were severe enough to prompt officials to declare a state of emergency. The attack disrupted court systems, property records, and other essential county services for weeks. In June, Cleveland, Ohio reported significant ransomware-related issues that forced the temporary closure of City Hall and affected various municipal services.
Cybersecurity analysts have documented a concerning surge in ransomware attacks targeting local governments across the United States in 2024. These attacks have become increasingly sophisticated as threat actors adapt their tactics and new criminal groups emerge in the ransomware ecosystem. The frequency and severity of these incidents highlight critical vulnerabilities in public sector cybersecurity infrastructure.
Local governments often present attractive targets for ransomware operators due to several factors: limited cybersecurity budgets, outdated IT systems, the critical nature of government services, and the pressure to restore operations quickly. These conditions create an environment where municipalities may feel compelled to negotiate with criminals to restore essential services.
The Clay County disaster declaration serves as a stark reminder of the vulnerabilities that municipalities face in an increasingly hostile cyber environment. Essential services ranging from court operations to probation monitoring remain at risk when government networks are compromised, potentially affecting public safety and the administration of justice.
Looking Ahead
As the situation in Clay County continues to unfold, local officials and law enforcement agencies are working to restore normal operations while strengthening cybersecurity measures to prevent future incidents. The case underscores the urgent need for enhanced cybersecurity protocols and increased investment in protective measures across public sector institutions nationwide.
The seven-day disaster declaration provides Clay County officials with enhanced emergency powers and access to additional resources as they navigate the complex process of recovering from this cyber attack and rebuilding their digital infrastructure.

