At the time of writing I am not aware of a public, confirmed Union County government ransomware disclosure. That caveat matters because the lessons local governments have learned from past municipal incidents are what should guide military bases and base-support networks today. Local civil infrastructure and base networks are increasingly intertwined through supply chains, shared vendors, and personnel touch points. That convergence makes municipal ransomware a relevant case study for installations that must preserve mission continuity under cyber pressure.
What municipal incidents show at scale
Historic municipal attacks make a clear pattern. Adversaries repeatedly gain an initial foothold through exposed remote services, stolen or weak credentials, or phishing. Once inside, they escalate privileges, move laterally across flat networks, exfiltrate data, and then trigger encryption or extortion. The City of Atlanta episode remains a useful, well documented example of how weak access controls and unsegmented networks multiplied operational impact across multiple city functions. The immediate operational cost and long tail of recovery illustrate why prevention and resilient design are essential for any organization that cannot afford prolonged downtime.
Mitigation priorities that translate to bases
1) Reduce initial access surface and enforce phishing resistant MFA: Multi factor authentication that resists push-based or SMS bypass is a basic barrier for remote-access services. CISA guidance emphasizes eliminating unmanaged remote access, auditing RDP use, and applying phishing resistant MFA for VPNs, webmail, and administration portals. For bases that rely on remote vendor access or cross-agency portals, treat each remote path as untrusted by default.
2) Apply strict segmentation and trust zones: Municipal incidents show how flat networks let attackers pivot from administrative workstations to critical servers. Design tiered trust zones so that base command-and-control, weapons systems networks, and safety-critical OT are isolated from enterprise administrative networks and from networks used by contractors. Enforce strict firewall rules, jump hosts, and microsegmentation where possible to reduce lateral movement.
3) Harden identity, reduce privileged exposure: Compromised domain or service accounts are the most common accelerant. Adopt least privilege for service accounts, rotate and vault secrets, deploy Local Administrator Password Solution or equivalent, and log authentication activity centrally so anomalous privilege escalations can be detected. Privileged Access Management and ephemeral admin sessions reduce persistent attack surfaces.
4) Invest in detection and telemetry you can act on: Many county breaches showed long dwell times before detection. EDR and network telemetry are only useful if teams tune alerts and run threat-hunting playbooks. For bases this means pairing sensors with a staffed SOC or contracted 24/7 monitoring that understands both IT and OT signals. Validate detection capabilities with purple team exercises and simulated intrusions.
5) Immutable, air-gapped backups and restore rehearsals: Backups are not a plan unless they are immutable, offline from production, and regularly restored in exercises. Exercises must include end-to-end recovery including alternate communications and fallback to manual processes for mission essential functions. The goal is assured continuity for critical kinetic and safety systems even when administrative systems are compromised.
6) Assume data exfiltration; protect and minimize data holdings: The shift toward double extortion and exfiltration-focused campaigns means encryption alone is not the only risk. Encrypt sensitive data at rest, apply robust access controls, and minimize retention of high value PII and operational data. Where possible, separate data stores for mission-critical logs and for administrative records so a single compromise cannot harvest everything at once.
7) Rethink vendor and third-party access: Local governments commonly rely on third-party vendors and SaaS providers. Bases often have even more vendors with privileged access for maintenance of critical systems. Enforce strong contractual security requirements, limit vendor access windows and scope, require vendor telemetry exposure to your SOC, and use jump servers and ephemeral credentials for vendor sessions. Validate vendor hygiene through periodic audits and ask for SOC 2 or equivalent evidence appropriate to the risk.
8) Playbooks, coordination, and public communications: Municipal incidents demonstrate that legal, communications, and operational timelines slip during incidents. Preposition incident response playbooks that are military tailored, but also include liaison points with local law enforcement, FBI, CISA, and the state fusion center. Base commanders and public affairs officers must have preapproved templates for rapid transparent communications to preserve trust with local communities and interagency partners.
Operational specifics for base contexts
-
Operational technology separation: Many installations host industrial control systems for utilities, ranges, or flightline support. Those networks must never share authentication domains with office IT. Use physical air gaps where practical and unidirectional data diodes for telemetry flows when necessary.
-
Harden OT access paths: Restrict maintenance laptops, require hardware-based MFA for maintenance sessions, attest vendor tools before they are allowed to run on sensitive networks, and keep a vetted offline backup of critical OT configurations.
-
Contingency for local service dependencies: Bases often rely on county services for payroll, permitting, and civilian employee support. Identify and test contingency procedures when those local services are degraded. Establish alternate secure channels for mission-critical transactions and establish memoranda of understanding with local government and the state for prioritized incident handling.
-
Insider-aware controls: Military bases have unique personnel flows. Apply continuous vetting for privileged roles and monitor for anomalous data access patterns. Complement behavioural analytics with manual oversight for high-risk accounts.
Exercises and governance
Run combined-tabletop exercises that simulate a local county ransomware event spilling over to base support Vendors. Test notification cascades to the installation commander, base legal, communications, and mission owners. Validate that recovery of essential mission capabilities can proceed without reliance on the affected local IT systems.
Closing: treat municipal risk as mission risk
Ransomware targeting civil infrastructure is not only a municipal problem. When county systems fail, services that bases consume can degrade quickly and unpredictably. The right posture is defensive depth and practiced resilience. Follow the playbooks and mitigations developed by CISA and MS-ISAC, design networks for containment instead of convenience, and treat vendor access with the same skepticism you apply to external threat actors. A base that can isolate and restore mission systems while its county partners recover will avoid strategic surprise and preserve operational readiness.