DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Update: About 9,200 people affected by Clarksville-Montgomery County School System hacking

Posted on August 3, 2012 by Dissent

Adam Tamburin reports:

On Thursday, the school system began notifying about 9,200 people that elements of their personal data were accessed during a June security breach.

That total includes about 4,900 employees and 4,300 students, according to James Prendergast, an attorney with Nelson Levine de Luca & Hamilton, a law firm the school system enlisted to help with notifications.

Hackers gained access to nine of Clarksville-Montgomery County School System’s databases on June 11, which included, among other things, names, Social Security numbers and birthdays of some current and former students and employees, according to a news release from CMCSS spokeswoman Elise Shelton.

Read more on TheLeafChronicle.

A statement posted to CMCSS’s web site reads:

The Clarksville-Montgomery County School System discovered on June 11, 2012 that an unknown individual gained access to nine of its computer databases that contained the names, addresses, and Social Security numbers of certain current and former CMCSS employees, as well as the names, addresses, Social Security numbers, dates of birth, and student identification numbers of certain current and former CMCSS students.  Beginning today, August 2, 2012, CMCSS is notifying each individual whose information was accessed during this intrusion and advising each individual of the elements of personal information exposed.  CMCSS is not aware of any misuse of the personal information accessed during this illegal intrusion at this time; however, CMCSS also is advising affected individuals of steps that can be taken to protect identity and credit from fraud and theft.

Upon discovery of this criminal access, CMCSS retained privacy and data security legal counsel and forensic computer analysts to assist with its investigation of, and response to, this incident.  CMCSS also notified local law enforcement and the Tennessee Bureau of Investigation, which is working in conjunction with the FBI to investigate this incident.    The criminal investigation into this incident is ongoing.

Through the notification process, CMCSS is providing affected individuals with contact information for a call center, which has been established to respond to questions regarding this incident. We appreciate your patience and understanding throughout this process. Thank you.

The school system’s report seems to conflict significantly with claims made by hackers calling themselves Spex Security, who claimed to have acquired data on 110,000. The hackers later dumped 14,500 of the compromised records online on the Internet. So where is this 9,200 figure coming from? Is the school system saying that these were the only records acquired?  I’ve sent an inquiry to the school system’s attorney to request clarification. If I get a response, I’ll update this.

Related posts:

  • Kept in the Dark — Meet the Hired Guns Who Make Sure School Cyberattacks Stay Hidden
Category: Breach Incidents

Post navigation

← FL: Palm Beach County Health Department employee pilfered patient information
Willingboro woman sold IDs of TD Bank customers, used them to take money from accounts: police →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Hunters International to provide free decryptors for all victims as they shut down (1)
  • SEC and SolarWinds Seek Settlement in Securities Fraud Case
  • Cyberattacks Disrupt Iran’s Bread Distribution, Payments Remain Frozen
  • Hacker with ‘political agenda’ stole data from Columbia, university says
  • Keymous+ Hacker Group Claims Responsibility for Over 700 Global DDoS Attacks
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • DOJ investigates ex-ransomware negotiator over extortion kickbacks
  • Hackers Using PDFs to Impersonate Microsoft, DocuSign, and More in Callback Phishing Campaigns
  • One in Five Law Firms Hit by Cyberattacks Over Past 12 Months
  • U.S. Sanctions Russian Bulletproof Hosting Provider for Supporting Cybercriminals Behind Ransomware

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Record-Breaking $1.55M CCPA Settlement Against Health Information Website Publisher
  • Ninth Circuit Reviews Website Tracking Class Actions and the Reach of California’s Privacy Law
  • US healthcare offshoring: Navigating patient data privacy laws and regulations
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • Google Trackers: What You Can Actually Escape And What You Can’t
  • Oregon Amends Its Comprehensive Privacy Statute
  • Wisconsin Supreme Court’s Liberal Majority Strikes Down 176-Year-Old Abortion Ban

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.