Key Takeaways
- Winona County suffered a ransomware attack detected on April 7, 2026, marking the second such incident for the county this year.
- Attackers exfiltrated data from the county’s network and later released it publicly; the county learned of the leak on Wednesday and announced it the same day.
- The county is conducting a thorough review with law enforcement and third‑party cyber‑security experts to identify what personal information was compromised and to notify affected individuals promptly.
- Resources will be made available to help those whose data may have been exposed protect their identities and mitigate potential harm.
- Although parts of the network—including vital statistics and DMV systems—were taken offline to contain the threat, emergency services remained operational throughout the incident.
- The Minnesota National Guard assisted in the response, and a local state of emergency was declared for both the January and April attacks.
- Preliminary findings suggest the two ransomware events were carried out by different cybercriminal groups.
- The county aims to restore normal operations while strengthening its defenses against future threats.
Incident Overview and Timeline
On April 7, 2026, Winona County’s information technology team detected anomalous activity indicative of a ransomware infection within the county’s computer network. The alert triggered an immediate incident‑response protocol, leading to the isolation of affected systems to prevent further spread. By April 24, the county reported that most offices had returned to near‑normal operations, though certain services remained temporarily restricted while remediation efforts continued. The timeline underscores a swift detection followed by a measured containment strategy designed to balance operational continuity with security imperatives.
Data Exfiltration and Public Release
Following the initial containment, investigators discovered that the attackers had not only encrypted files but also exfiltrated sensitive data before deploying the ransomware payload. On the subsequent Wednesday, the county learned that the stolen information had been released on a public forum or dark‑web leak site associated with the criminal group. County officials announced the breach later that day, emphasizing transparency and a commitment to keeping the public informed as the situation unfolded.
Official Response and Investigative Measures
Winona County issued a statement acknowledging the gravity of the breach and outlining a multi‑pronged response. The county pledged to conduct a comprehensive review of the leaked data in collaboration with local law enforcement, state cyber‑security agencies, and third‑party forensic specialists. This review aims to determine precisely what categories of information—such as names, addresses, social‑security numbers, or health records—were compromised and which individuals may be affected. The investigative process is expected to take considerable time given the volume and sensitivity of the data involved.
Notification and Support for Affected Individuals
In accordance with applicable state and federal data‑breach notification laws, Winona County committed to informing any individuals whose personal information is identified in the leaked dataset “as quickly as possible.” The notice will include details about what data was exposed, potential risks, and recommended protective steps. Additionally, the county announced plans to provide resources such as credit‑monitoring services, identity‑theft protection guidance, and dedicated help‑desk support to assist affected residents in safeguarding their identities and financial well‑being.
Impact on County Services and Operations
To limit the ransomware’s propagation, the county deliberately took portions of its network offline, notably affecting the vital statistics division and the Department of Motor Vehicles (DMV). These systems handle records such as birth and death certificates, marriage licenses, vehicle registrations, and driver‑license services. Despite the disruption, Winona County confirmed that emergency services—including police, fire, and medical response—remained uninterrupted throughout the incident. By April 24, most administrative functions had resumed, although some services continued to operate in a reduced capacity while security patches and system validations were completed.
Role of the Minnesota National Guard
Recognizing the scale and potential ramifications of the cyberattack, Winona County requested assistance from the Minnesota National Guard’s cyber‑protection unit. Guard personnel contributed expertise in network forensics, malware analysis, and defensive hardening, working alongside the county’s IT staff and external consultants. Their involvement helped accelerate the identification of compromised assets, facilitated the eradication of malicious code, and supported the implementation of tighter access controls and monitoring mechanisms.
Previous Attack and State of Emergency Declarations
The April incident marked the second ransomware attack experienced by Winona County in 2026; an earlier breach had been disclosed in January. A preliminary investigation indicated that the two events were likely perpetrated by distinct cybercriminal groups, suggesting that the county may have been targeted opportunistically rather than as part of a sustained campaign. In response to both attacks, local officials declared a state of emergency, enabling the mobilization of additional resources, expedited procurement of cyber‑security tools, and heightened coordination with state and federal agencies.
Broader Implications and Lessons Learned
The Winona County episodes illustrate the growing threat ransomware poses to municipal governments, which often manage critical citizen data while operating with limited cyber‑security budgets. The attacks underscore the importance of layered defenses—including regular patching, employee phishing awareness training, network segmentation, and robust backup strategies—as well as the value of rapid detection and incident‑response capabilities. The county’s commitment to a thorough forensic review, transparent communication, and provision of victim support reflects best practices that other jurisdictions may emulate to mitigate harm and preserve public trust in the face of evolving cyber threats.

