قالب وردپرس درنا توس
Home / Insurance / Software vendor Tyler Technologies says it was hacked

Software vendor Tyler Technologies says it was hacked



(Reuters) – Tyler Technologies Inc., whose products are used by US states and counties to share election data, said on Wednesday that an unknown party had hacked its internal systems.

Tyler, whose platforms are used by election officials who, among other things, showed voting results, confirmed the breach in an email to Reuters after warning clients in an email earlier in the day.

Tyler said in both emails that they did not believe that customers' software had been hacked. ] The company, a major provider of emergency management and other programs to U.S. counties and municipalities, told Reuters in an email that it was working to restore its systems and had reported law enforcement. The company did not say whether there was a ransomware claim or how it had learned about the breach, and it did not answer questions.

The FBI and the US Department of Homeland Security warned this week that foreign hackers could try to access and modify websites that report election results. Neither responded to requests for comment after the East Coast's working hours.

In the email to customers, Tyler stated that there had been a “security incident with unauthorized access to our internal telephone and information technology systems by an unknown third party. ] The email does not say which internal systems have been broken.

"We currently have no reason to believe that client data, client servers or host systems were affected," it said.

Although election results and their reporting are a major concern for security officials, a financially motivated attack could also wreak havoc if spread to Tyler's customers. Tylers system. Tyler can remotely log in to any software it sells, and it is therefore safest to assume that hackers can do the same, says Hamilton, who is previously head of information security for the city of Seattle.

Since the breach at Tyler may have happened some time ago, it is possible that stored passwords have already been taken and used, Hamilton said. Catalog

Catalog


Source link