DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

IL: Pekin high school hit by ransomware and $37,000 demand

Posted on April 30, 2017 by Dissent

Nick Vlahos reports:

A cyberattack last weekend has been forcing students, teachers and administrators at Pekin Community High School to forgo its computer systems.

That hasn’t been easy.

“You really quickly realize how much you rely on technology when you don’t have access to it for a couple of days,” Danielle Owens, the District 303 superintendent, said Wednesday.

Pekin officials discovered the problem Monday. Sometime Sunday, a hacker apparently used malware to infect the school’s computers. Pekin officials have no idea who it was; Owens believed it might even be a non-American entity.

The hacker used encryption to make it impossible for Pekin representatives to access information stored in the system. In return for unlocking it, the saboteur demanded a ransom — $37,000, according to Owens. It was not paid.

Read more on Journal Star.

Thanks to the reader who sent this in.


Related:

  • Kept in the Dark -- Meet the Hired Guns Who Make Sure School Cyberattacks Stay Hidden
  • Leon County Schools vendor's data leak exposed 368,000 current and former FLVS students' details, LCS teacher data, and more
  • k-12 school districts fall prey to Pysa ransomware
  • Audits of New York schools and the State Education Department reveal ongoing significant concerns
  • The New Target That Enables Ransomware Hackers to Paralyze Dozens of Towns and Businesses at Once
Category: Education SectorMalware

Post navigation

← RI: ‘Ransomware’ attack locks down law firm’s files for three months
MVD database compromised: Vehicle registration details leaked →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • HHS’ Office for Civil Rights Settles HIPAA Investigation of MMG Fusion, LLC Breach Affecting 15 Million Individuals
  • NL: Suspects report themselves via new reporting form
  • Nigerian Communication Commission Orders Telecoms to Report Cyber Threats Within 4 Hours
  • Russian Ransomware Administrator Pleads Guilty to Wire Fraud Conspiracy
  • LeakBase seized, arrests made as part of global action
  • Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit
  • 1,700 Dutch police officers get reminder not to access files without legitimate purpose
  • Israeli spies ‘hacked every traffic camera in Tehran to plot killing of Iran’s Ayatollah Ali Khamenei’
  • Congress finds data brokers cost consumers tens of billions of dollars
  • Evoke Wellness at Hilliard updates its breach notification

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Allstate must face privacy lawsuit over cellphone tracking of drivers
  • Spain fines FC Barcelona €500,000 for failing biometric data protection assessment
  • Polish doctors jailed for denying woman abortion
  • France’s Highest Administrative Court Upholds CNIL’s Standard On Anonymization
  • Dutch police reminded not to snoop in files without legitimate purpose

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: Dissent.73

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: Dissent.73
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.