DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Threat actors dump personal employee and student data from Walled Lake Consolidated District

Posted on October 29, 2020 by Dissent

One of the k-12 district ransomware attacks that DataBreaches.net has been following involves Walled Lake Consolidated District in Michigan. The district suffered a ransomware attack on or about October 10 that they are still working to recover from. But while they focus on recovery of systems, the threat actors have tried to pressure on them to pay the demanded ransom by starting to dump files that contain employee and student information.  To date, the district has not  publicly acknowledged that data is being dumped.

On October 24, the threat actors dumped some limited data as proof of access to, and acquisition of, files from the district’s systems. It was clear from the threat actors’ comments on their leak site that they had read the district’s earlier statement about the attack and wanted to prove that they had exfiltrated data.

They subsequently dumped even more data including personal and personnel information on teachers and information on students.

This time, they quoted a statement from the district’s recent update on the attack and then responded to it:

With the recent hack of Walled Lake Schools’ network on Oct. 10, 2020, our ability to sufficiently prepare for the Nov. 4 scheduled return to in-person learning has been compromised. But better to say, school does not care about anything like privacy and security and have no wish to stop sharing or back to normal work.

Yesterday, DataBreaches.net reported that we had reached out to the district last week to inquire what the district was doing in response to the first small data dump. This site received no response at all.

DataBreaches.net is not going to get too specific about how much data the threat actors have already dumped, but in looking through just some of the files, I saw salary schedules, personnel records involving certifications and assignments, files concerning retirements and resignations, and a spreadsheet with teachers’ names, assigned classes and rooms, their home phone numbers, cell phone numbers, and month and day of their birthday. I also noted a spread sheet with student IDs and logins to the district, and staff injury reports with personal details. And that was just a quick skim at some of the files that had been dumped.

 

Teachers’ names, program, location, as well as their home and cellphone numbers and birthday were in the data dumped by threat actors. This is just the first 20 rows of a bigger database. Redacted by DataBreaches.net.

 

DataBreaches.net had to redact every field in this spreadsheet with student login information that included school/location, the login ID, password, first and last name of the student, their ID, their expected year of graduation, and their Google login if they do not use a district device. This is just the first 20 rows of a larger file.

 

DataBreaches.net redacted this file with a completed injury report filed by a district employee.

The district’s October 27 update makes NO mention of knowing that personally identifiable information is already on the dark web. They write:

We apologize for any inconvenience and appreciate your continued patience. This targeted computer hack of Walled Lake Schools was impossible to anticipate and the timing could not have been worse. However, we are excited to have students return safely to in-person instruction and want to make sure all of our systems are fully operational to ensure a smooth start to the new school year.

DataBreaches.net questions their claim that the attack was impossible to anticipate. Experts have been warning schools for years about the increase in attacks on K-12 districts (e.g, see this 2017 news report) , and there have been even more warnings in 2020.  That’s just this blogger’s opinion, though. Others may obviously disagree.

In any event, because they did not respond to this site’s inquiry,  we have no indication that they have warned employees and parents to take steps to protect themselves from identity theft or fraud attempts. DataBreaches.net therefore decided to publish some limited proof today in this post so that parents and employees hopefully find out that they need to take steps to protect themselves.

Hopefully, the district will start to publicly acknowledge the scope of the breach and advise employees and parents what to do to protect themselves and what the district will do to offer them any protection services or mitigation services.

Category: Education SectorMalwareU.S.

Post navigation

← College Community School District notifies parents of Medicaid billing service breach
Ca: Cyber attack hits Jewish General’s IT network, but no ransomware demand →

1 thought on “Threat actors dump personal employee and student data from Walled Lake Consolidated District”

  1. TruthSeeker says:
    October 30, 2020 at 9:11 pm

    I can assure you they haven’t notified employees or families the extent or even that their information COULD be compromised. I have a close friend who teaches there- and they’re suffering the consequences due to the districts “head in the sand approach”

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Alabama Man Sentenced to 14 Months in Connection with Securities and Exchange Commission X Hack that Spiked Bitcoin Prices
  • Japan enacts new Active Cyberdefense Law allowing for offensive cyber operations
  • Breachforums Boss “Pompompurin” to Pay $700k in Healthcare Breach
  • HHS Office for Civil Rights Settles HIPAA Cybersecurity Investigation with Vision Upright MRI
  • Additional 12 Defendants Charged in RICO Conspiracy for over $263 Million Cryptocurrency Thefts, Money Laundering, Home Break-Ins
  • RIBridges firewall worked. But forensic report says hundreds of alarms went unnoticed by Deloitte.
  • Chinese Hackers Hit Drone Sector in Supply Chain Attacks
  • Coinbase says hackers bribed staff to steal customer data and are demanding $20 million ransom
  • $28 million in Texas’ cybersecurity funding for schools left unspent
  • Cybersecurity incident at Central Point School District 6

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Privacy enforcement under Andrew Ferguson’s FTC
  • “We would be less confidential than Google” – Proton threatens to quit Switzerland over new surveillance law
  • CFPB Quietly Kills Rule to Shield Americans From Data Brokers
  • South Korea fines Temu for data protection violations
  • The BR Privacy & Security Download: May 2025
  • License Plate Reader Company Flock Is Building a Massive People Lookup Tool, Leak Shows
  • FTC dismisses privacy concerns in Google breakup

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.