DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

WA: Clover Park School District investigating ransomware attack

Posted on May 26, 2021 by Dissent

Kevin Ko reports:

Facing a “system outage,” the Clover Park School District is investigating why it’s “experiencing a technology issue,” a district spokesperson said in a statement.

“We are working with third-party cybersecurity specialists to investigate the root cause of this system outage and will provide more information as our investigation continues,” the statement reads.

Read more on KIRO7, who was sent screencaps by an employee. The screencap indicates that CPSD was the victim of a ransomware attack by what appears to be a new group or relatively unknown group of threat actors who appear to be calling themselves “PayOrG” (PayOrGrief).  The attackers have demanded $350,000 in ransom and have given the district 21 days to pay or have data dumped. They do not provide any proof of claims, but do offer to decrypt a “couple files” as proof if contacted via chat.

Ransom note
Threat actors’ ransom note. IMAGE: KIRO7

DataBreaches.net is not publishing the url of the leak site.

One tweet in the district’s timeline earlier today announced:

CPSD experiencing a temporary tech issue. Follow district’s Power & Internet Outage Guidance. Students participating in virtual learning @home will continue w/classwork from home; students scheduled for in-person learning @school will continue on schedule. We’ll provide updates.

— Clover Park Schools (@CloverParkSD) May 26, 2021

CPSD experiencing a temporary tech issue. Follow district’s Power & Internet Outage Guidance. Students participating in virtual learning @home will continue w/classwork from home; students scheduled for in-person learning @school will continue on schedule. We’ll provide updates.

None of their subsequent tweets today referred to the problem or provided any update, however. Attempts to connect to the district’s web site tonight timed out.


Related:

  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • TX: Kaufman County Faces Cybersecurity Attack: Courthouse Computer Operations Disrupted
  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
  • Before Their Telegram Channel Was Banned Again, ScatteredLAPSUS$Hunters Dropped Files Doxing Government Employees (2)
Category: Education SectorU.S.

Post navigation

← A former DarkSide listing shows up on REvil’s leak site
CEFCO Allegedly Victim of Data Theft →

5 thoughts on “WA: Clover Park School District investigating ransomware attack”

  1. Ash says:
    May 26, 2021 at 11:41 pm

    What kind of asshole hacks a school. Then demands funds that they don’t have? Special place in hell. Attack Amazon or Google. Not a school. Ffs

    1. Dissent says:
      May 27, 2021 at 6:58 am

      The education sector is one of the top two sectors for such attacks because their security is usually not as good as other sectors.

    2. zer0 says:
      May 30, 2021 at 3:29 pm

      the school wont pay unless they were fools and didnt have cyber insurance but if so, depending on the policy cyber insurance will pick up the tab at the end of the day. This happens daily and not many people have insight to it.

    3. Nix says:
      June 2, 2021 at 1:26 pm

      Schools – with users starting at 5 years old – can’t maintain the kind of security the Defense Department can (and how many federal agencies got victimized in that last round?). When pandemic forced them to convert, overnight, into remote learning, solutions were hasty and catch-as-catch-can, with no planned budget/funding behind them. Even staff went remote – removing them from being behind district firewalls and enterprise connections. In short, schools have always been more vulnerable, and the events of the past year have made them more vulnerable than ever.

      On the other side of the equation, threat actors have been focusing on schools, hospitals and public services – people they know can’t afford to just shut down during a pandemic. There’s a TON of this happening, as these illegal enterprises capitalize on the current situation.

  2. Angel O says:
    June 1, 2021 at 11:11 pm

    Right! I haven’t got a paycheck because of this! And cpsd only pays once a month at the end of the month. I been waiting on this check!

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Threat actors have reportedly launched yet another campaign involving an application connected to Salesforce
  • Russian hackers target IVF clinics across UK used by thousands of couples
  • US, allies sanction Russian bulletproof hosting services for ransomware support
  • Researchers claim ‘largest leak ever’ after uncovering WhatsApp enumeration flaw
  • Large medical lab in South Africa suffers multiple data breaches
  • Report released on PowerSchool cyber attack
  • Sue The Hackers – Google Sues Over Phishing as a Service
  • Princeton University Data Breach Impacts Alumni, Students, Employees
  • Eurofiber admits crooks swiped data from French unit after cyberattack
  • Five major changes to the regulation of cybersecurity in the UK under the Cyber Security and Resilience Bill

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Closing the Privacy Gap: HIPRA Targets Health Apps and Wearables
  • Researchers claim ‘largest leak ever’ after uncovering WhatsApp enumeration flaw
  • CIPL Publishes Discussion Paper Comparing U.S. State Privacy Law Definitions of Personal Data and Sensitive Data
  • India’s Digital Personal Data Protection Act 2023 brought into force
  • Five major changes to the regulation of cybersecurity in the UK under the Cyber Security and Resilience Bill

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.