Residents of Greenville in Hunt County have faced weeks of confusion and frustration after a cyberattack disrupted the city’s technology systems, including utility billing. The incident left many unable to view or pay their bills, raising concerns at the height of the summer when electricity usage was at its peak. City officials have now confirmed that while systems are gradually coming back online, the investigation into the breach and its perpetrators remains ongoing.
The breach was first identified on August 5 and affected multiple city services. The Greenville Electric Utility System, known as GEUS, reported that customer data could not be accessed, utility bills could not be generated, and online payments were temporarily halted. Police records and other municipal technology systems were also disrupted. In a public statement, GEUS explained that their billing system has since been reactivated, allowing online payments to resume, and staff are now working to update records with transactions received during the outage.
Daniel Starks, Greenville’s communications manager, explained that although investigators have not yet determined who carried out the attack, the city did pay a partial ransom. This step was taken to help restore critical systems, but the investigation remains active with assistance from third-party experts and law enforcement agencies. Starks emphasized that the city will continue to provide updates to residents as new information becomes available.
According to city officials, most of the affected systems are now operational, but some remain offline voluntarily as a precaution. The city wants to ensure that any lingering threats are completely removed before restoring full functionality. Starks described the city’s approach as cautious, stating that the priority is to fully scrub and clean systems before resuming complete operations.
Experts note that cyberattacks targeting municipalities are becoming increasingly common. Dr. Edward Peters, a cybersecurity specialist, said that response plans should be reviewed regularly, ideally every two weeks, and that staff must receive ongoing training. He explained that cybercriminals are continuously evolving their methods, which means defenses must remain active and adaptive.
The Greenville breach has also highlighted the challenge of public communication during cyber crises. Many residents expressed dissatisfaction on social media, saying they felt left in the dark. Starks responded by noting that law enforcement advised the city not to release details prematurely, stressing that transparency would be maintained once accurate information was available.
Attorney General Ken Paxton’s office reported the breach in a catastrophe notice on August 25. Starks clarified that this filing came directly from Greenville itself due to legal obligations related to public information requests. Because the city’s network was down, it could not respond within the required timeframe and had to notify the attorney general’s office formally. He stressed that contrary to some perceptions, this was not a whistleblowing action but a procedural step mandated by law.
As the investigation continues, city officials have reassured residents that no evidence has been found indicating customer personal information was compromised. The focus remains on restoring full services and strengthening cybersecurity measures to prevent future incidents. Starks estimated the inquiry would last about a month, during which more details about the origins of the attack and the extent of the ransom payment may become clearer.
For now, Greenville residents can once again access their utility accounts and make payments, but the episode has underscored how vulnerable local governments can be to cyber threats. With experts urging constant vigilance and updated defense strategies, the Greenville breach serves as a reminder that cyberattacks are not isolated events but part of a broader challenge facing communities across the country.









