Ohio State Lottery Hit by Cybersecurity Event: DragonForce Ransomware Group Claims Responsibility

The Ohio State Lottery, a popular gaming organization, recently fell victim to a significant cybersecurity event. The incident has had a considerable impact on its operations, with key systems being temporarily shut down to contain the breach. While the lottery assures the public that its gaming system remains fully functional, the availability of winning numbers and jackpots on the Ohio Lottery website and mobile app has been affected. Further investigations into the breach have revealed that a ransomware group known as DragonForce is behind the attack, claiming responsibility on December 27th.

Impact on Operations

Despite the cybersecurity incident, the Ohio Lottery reassures its customers that the gaming system is still operational. However, as a precautionary measure, the organization has decided to temporarily shut down some key systems. This step was taken to contain and mitigate the effects of the breach, ensuring that the event does not escalate further. As a result, certain services, such as access to winning numbers and jackpots, may be unavailable on the Ohio Lottery website and mobile app.

Attribution of Attack

The newly emerged ransomware group, DragonForce, has taken credit for the cyberattack on the Ohio State Lottery. With their claim made public on December 27th, the group has grabbed attention with their audacious act. This incident marks the group’s first major attack, establishing their presence in the cybersecurity landscape.

Stolen Data

DragonForce has claimed to have gained unauthorized access to over 600 GB of data from the Ohio Lottery’s systems. Among the compromised data are databases containing records associated with employees and players, totaling more than three million. The stolen information reportedly includes sensitive details such as names, email and postal addresses, winnings, dates of birth, and even social security numbers. This breach has serious implications for individuals whose personal information may be exposed and vulnerable to misuse.

Publication of Proof

To substantiate their claims, the cybercriminals behind DragonForce have published several screenshots of the stolen data. These screenshots serve as evidence that the group has indeed accessed and exfiltrated the Ohio Lottery’s sensitive information. This move is not only intended to demonstrate their capabilities but also to instill fear and exert further pressure on the organization.

Ransom Demand and Response

In an alarming twist, DragonForce has issued a ransom demand to the Ohio Lottery. They have threatened to make all the stolen data public within three days if their demands are not met. The group implies that the Ohio Lottery is unwilling to pay the ransom, raising concerns about the potential fallout from a public data release. The organization finds itself at a crossroads, balancing the weight of potential financial loss against the ethical and legal implications of negotiating with cyber criminals.

DragonForce’s History and Activity

DragonForce has quickly risen to infamy as one of the most active ransomware gangs in recent times. Their leak website currently lists 21 other victims, underlining the extensive reach and impact of their operations. The group’s prolific activities highlight the escalating threats posed by ransomware attacks and the urgent need for robust cybersecurity measures.

The cyberattack on the Ohio State Lottery has created significant disruptions and potential risks for both the organization and its customers. As investigations continue and efforts to contain the breach persist, it is crucial for the Ohio Lottery and other organizations to prioritize cybersecurity and fortify their systems against such malicious threats. The ramifications of this breach extend beyond the immediate incident, as affected individuals face potential identity theft and financial risks. The response to this incident will not only determine the fate of the Ohio Lottery but will also serve as a crucial test for the broader cybersecurity landscape.

Explore more

A Beginner’s Guide to Data Engineering and DataOps for 2026

While the public often celebrates the triumphs of artificial intelligence and predictive modeling, these high-level insights depend entirely on a hidden, gargantuan plumbing system that keeps data flowing, clean, and accessible. In the current landscape, the realization has settled across the corporate world that a data scientist without a data engineer is like a master chef in a kitchen with

Ethereum Adopts ERC-7730 to Replace Risky Blind Signing

For years, the experience of interacting with decentralized applications on the Ethereum blockchain has been fraught with a precarious and dangerous uncertainty known as blind signing. Every time a user attempted to swap tokens or provide liquidity, their hardware or software wallet would present them with a wall of incomprehensible hexadecimal code, essentially asking them to authorize a financial transaction

Germany Funds KDE to Boost Linux as Windows Alternative

The decision by the German government to allocate a 1.3 million euro grant to the KDE community marks a definitive shift in how European nations view the long-standing dominance of proprietary operating systems like Windows and macOS. This financial injection, facilitated by the Sovereign Tech Fund, serves as a high-stakes investment in the concept of digital sovereignty, aiming to provide

Why Is This $20 Windows 11 Pro and Training Bundle a Steal?

Navigating the complexities of modern computing requires more than just high-end hardware; it demands an operating system that integrates seamlessly with artificial intelligence while providing robust security for sensitive personal and professional data. As of 2026, many users still find themselves tethered to aging software environments that struggle to keep pace with the rapid advancements in cloud computing and data

Notion Launches Developer Platform for AI Agent Management

The modern enterprise currently grapples with an overwhelming explosion of disconnected software tools that fragment critical information and stall meaningful productivity across entire departments. While the shift toward artificial intelligence promised to streamline these disparate workflows, the reality has often resulted in a chaotic landscape where specialized agents lack the necessary context to perform high-stakes tasks autonomously. Organizations frequently find