DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

WA: Clover Park School District investigating ransomware attack

Posted on May 26, 2021 by Dissent

Kevin Ko reports:

Facing a “system outage,” the Clover Park School District is investigating why it’s “experiencing a technology issue,” a district spokesperson said in a statement.

“We are working with third-party cybersecurity specialists to investigate the root cause of this system outage and will provide more information as our investigation continues,” the statement reads.

Read more on KIRO7, who was sent screencaps by an employee. The screencap indicates that CPSD was the victim of a ransomware attack by what appears to be a new group or relatively unknown group of threat actors who appear to be calling themselves “PayOrG” (PayOrGrief).  The attackers have demanded $350,000 in ransom and have given the district 21 days to pay or have data dumped. They do not provide any proof of claims, but do offer to decrypt a “couple files” as proof if contacted via chat.

Ransom note
Threat actors’ ransom note. IMAGE: KIRO7

DataBreaches.net is not publishing the url of the leak site.

One tweet in the district’s timeline earlier today announced:

CPSD experiencing a temporary tech issue. Follow district’s Power & Internet Outage Guidance. Students participating in virtual learning @home will continue w/classwork from home; students scheduled for in-person learning @school will continue on schedule. We’ll provide updates.

— Clover Park Schools (@CloverParkSD) May 26, 2021

CPSD experiencing a temporary tech issue. Follow district’s Power & Internet Outage Guidance. Students participating in virtual learning @home will continue w/classwork from home; students scheduled for in-person learning @school will continue on schedule. We’ll provide updates.

None of their subsequent tweets today referred to the problem or provided any update, however. Attempts to connect to the district’s web site tonight timed out.

Category: Education SectorU.S.

Post navigation

← A former DarkSide listing shows up on REvil’s leak site
CEFCO Allegedly Victim of Data Theft →

5 thoughts on “WA: Clover Park School District investigating ransomware attack”

  1. Ash says:
    May 26, 2021 at 11:41 pm

    What kind of asshole hacks a school. Then demands funds that they don’t have? Special place in hell. Attack Amazon or Google. Not a school. Ffs

    1. Dissent says:
      May 27, 2021 at 6:58 am

      The education sector is one of the top two sectors for such attacks because their security is usually not as good as other sectors.

    2. zer0 says:
      May 30, 2021 at 3:29 pm

      the school wont pay unless they were fools and didnt have cyber insurance but if so, depending on the policy cyber insurance will pick up the tab at the end of the day. This happens daily and not many people have insight to it.

    3. Nix says:
      June 2, 2021 at 1:26 pm

      Schools – with users starting at 5 years old – can’t maintain the kind of security the Defense Department can (and how many federal agencies got victimized in that last round?). When pandemic forced them to convert, overnight, into remote learning, solutions were hasty and catch-as-catch-can, with no planned budget/funding behind them. Even staff went remote – removing them from being behind district firewalls and enterprise connections. In short, schools have always been more vulnerable, and the events of the past year have made them more vulnerable than ever.

      On the other side of the equation, threat actors have been focusing on schools, hospitals and public services – people they know can’t afford to just shut down during a pandemic. There’s a TON of this happening, as these illegal enterprises capitalize on the current situation.

  2. Angel O says:
    June 1, 2021 at 11:11 pm

    Right! I haven’t got a paycheck because of this! And cpsd only pays once a month at the end of the month. I been waiting on this check!

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Hearing on the Federal Government and AI
  • Nigerian National Sentenced To More Than Five Years For Hacking, Fraud, And Identity Theft Scheme
  • Data breach of patient info ends in firing of Miami hospital employee
  • Texas DOT investigates breach of crash report records, sends notification letters
  • PowerSchool hacker pleads guilty, released on personal recognizance bond
  • Rewards for Justice offers $10M reward for info on RedLine developer or RedLine’s use by foreign governments
  • New evidence links long-running hacking group to Indian government
  • Zaporizhzhia Cyber ​​Police Exposes Hacker Who Caused Millions in Losses to Victims by Mining Cryptocurrency
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Google: Hackers target Salesforce accounts in data extortion attacks

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The Decision That Murdered Privacy
  • Hearing on the Federal Government and AI
  • California county accused of using drones to spy on residents
  • How the FBI Sought a Warrant to Search Instagram of Columbia Student Protesters
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Malaysia enacts data sharing rules for public sector
  • U.S. Enacts Take It Down Act

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.