A pilot program co-run by the Cybersecurity and Infrastructure Agency (CISA) and the Joint Ransomware Task Force has notified hundreds of government and critical infrastructure organizations that their devices may be vulnerable to cyber hijackers.The Ransomware Vulnerability Warning Pilot (RVWP) made 1,754 notifications in 2023 to organizations with internet-facing devices vulnerable to attack. Of those, 852 or roughly half, were either “patched, implemented a compensating control, or taken offline after notification from CISA.”More than 641 of those notifications went to government entities, including schools, state, local, tribal, and territorial governments (SLTT) and federal agencies. Another 440 went to organizations in the healthcare sector while 173 were delivered to energy and 127 to financial services. Taken together, those four industries totaled nearly 80% of the overall notifications for 14 of 16 critical infrastructure sectors.Notifications include key information regarding the vulnerable system, such as the manufacturer and model of the device, the IP address in use, how CISA detected the vulnerability, and guidance on how the vulnerability should be mitigated, RVWP said in a blog post. Receipt does not mean the organization has been compromised but does indicate it is at risk. CISA leverages multiple open-source and internal tools to research and detect vulnerabilities within U.S. critical infrastructure.The reports enable CISA to deploy resources and assist victims “suffering attacks, analyze incoming reporting across sectors to spot trends, and quickly share that information” with cyber defenders to inform other potential victims, officials said.Following notification of the vulnerabilities, CISA regularly conducts vulnerability scans to determine whether the entities appear to have mitigated their vulnerable devices.Enroll in the no-cost CISA Cyber Hygiene Vulnerability Scanning to not only identify vulnerabilities but also help organizations to raise their cybersecurity posture and reduce business risk. Review the #StopRansomware Guide, which includes a valuable and very useful checklist on how to respond to a ransomware incident and protect your organization. Always report observed ransomware activity, including indicators of compromise and tactics, techniques, and procedures (TTPs), to CISA and our federal law enforcement partners.