Several Ohio government websites hacked by pro-ISIS group

DAYTON, Ohio (WDTN) – An investigation is underway Sunday after seven Ohio government websites were hacked. Now, officials are trying to figure who exactly is behind it.

In this day and age, experts say it’s seemingly impossible to figure who may have orchestrated an attack or where it came from. The cyber security expert we spoke with says in this case the attack could be a diversion.

Local cyber security expert Shawn Waldman with Cyber Secure Defense in Miamisburg has been working in cyber security for over 20 years. He says nowadays anyone can be hacker. All you need to know how to do is buy the right software.

Jordan: “Real-life hackers are making money off wanna be hackers?”
Waldman: “Absolutely.”

Waldman points to a recent case locally where the website of a small business was hacked. The attack caused the website to be flooded with traffic, making it unable to access. It was made possible because of software hackers bought in what’s known as the ‘dark web’.

“You can go to the digital underground and buy the tool,” Waldman said. “Buy how much bandwidth you want in order to flood this company with and you just make the purchase point the tool to it and it will take down the site.”

In Sunday’s attack, the alleged hacking group believed to have been behind it calls themselves ‘Team System DZ’. The same group is believed to have been behind similar attacks in Israel and France. Waldman says the attack could be diversion to shift officials’ focus away from normal operations, meaning a larger attack could be in the works.

“It’s not out of the ordinary to take just a website deface, get a bunch of security and I-T people focused on restoring a website and on the other side of the network there’s an attacker breaking in taking information while everyone is diverted on just restoring the website.”

“All affected servers have been taken off line,” according to a statement released Sunday by the Ohio Department of Administrative Services. “We are investigating how these hackers were able to deface these websites. provides commenting to allow for constructive discussion on the stories we cover. In order to comment here, you acknowledge you have read and agreed to our Terms of Service. Commenters who violate these terms, including use of vulgar language or racial slurs, will be banned. Please be respectful of the opinions of others and keep the conversation on topic and civil. If you see an inappropriate comment, please flag it for our moderators to review.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s