April 11, 2026
Overview of the Incident
On October 31, 2024, the City of Sheboygan’s network was infiltrated by the Chort ransomware gang, resulting in the unauthorized exfiltration of personally identifiable information—Social Security numbers, state IDs and license plate records—for approximately 67,000 individuals. Though the city initially reported no evidence of data theft, an independent forensic investigation concluded on May 14, 2025, confirming the breach and triggering regulatory notifications on May 27, 2025.
Impact & Key Vulnerabilities
High-Value Data at Risk: Exposed PII of nearly 67,000 residents increases likelihood of identity theft and fraud.
Delayed Detection & Response: Nearly six months elapsed between intrusion and confirmation, highlighting gaps in continuous monitoring.
Insufficient Segmentation: Lateral movement enabled exfiltration of sensitive archives without containment.
Limited Backup Strategy: Absence of immutable, air-gapped backups forced reliance on negotiated remediation.
Actionable Mitigation Strategies
Proactive Risk Assessments
Conduct quarterly Ransomware Readiness Assessments to identify exploitable gaps in your IT/OT ecosystem.
Leverage InfoSight’s proprietary maturity-scoring model to benchmark against industry peers.
Robust Network Segmentation & Zero Trust
Enforce micro-segmentation between user endpoints, administrative domains and critical back-office systems.
Implement strict Zero Trust policies: authenticate and authorize every transaction by default.
Continuous Monitoring & 24×7 SOC-as-a-Service
Deploy next-gen SIEM with behavioral analytics to detect anomalous file-access patterns in real time.
Engage InfoSight’s SOC-as-a-Service for round-the-clock threat detection, triage and escalation.
Immutable, Air-Gapped Backups
Establish segmented backup repositories with write-once-read-many (WORM) storage to thwart encryption of backup data.
Automate backup integrity tests and recovery drills to ensure rapid restoration.
Incident Response Planning & Tabletop Exercises
Develop and validate a formal Incident Response (IR) playbook tailored to ransomware scenarios.
Conduct semi-annual tabletop exercises with key stakeholders, leveraging InfoSight’s IR specialists.
Employee Awareness & Phishing Simulation
Roll out quarterly phishing simulations to inoculate staff against social-engineering attacks.
Integrate security awareness into new-hire onboarding and executive training.
InfoSight’s Comprehensive Remediation Solutions
Ransomware Readiness Assessment: A deep-dive audit of your environment, culminating in a prioritized roadmap for hardening against extortion threats.
24×7 SOC-as-a-Service & Managed Detection & Response (MDR): End-to-end threat hunting, alert validation and active remediation by our team of former utility CISOs and incident-response experts.
Incident Response Retainer & Digital Forensics: On-demand IR support and forensic analysis to contain breaches swiftly, preserve evidentiary data and comply with regulatory mandates.
Vulnerability Management & Penetration Testing: Regular vulnerability scans and red-team exercises—including Active Directory pentests—to identify and eliminate critical attack vectors.
Zero Trust Architecture & Network Segmentation: Design and implementation of granular access controls and micro-segmentation to isolate high-risk assets.
Immutable Backup & Disaster Recovery Solutions: Consulting and deployment of air-gapped backup infrastructures with automated recovery validations.
Ransomware attacks on municipal bodies are escalating in both frequency and sophistication. The Sheboygan breach emphasizes the necessity of a holistic, proactive security posture—one that blends continuous monitoring, rigorous assessments and rapid IR capabilities. InfoSight Inc. stands ready to partner with your organization to harden defenses, streamline incident response and ensure operational resilience.
To schedule a Ransomware Readiness Assessment or to learn more about our 24×7 SOC-as-a-Service, contact us or email info@infosightinc.com. Let us fortify your defenses before the next attack strikes.
Subscribe to our newsletter to keep you updated on the latest cybersecurity insights & resources.
One follow-up from a security expert—no spam, ever.
Enter your details below to download the PDF.