DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Booneville and Lancaster school districts dealing with alleged cyberattacks

Posted on July 15, 2021 by Dissent

Clover Park School District in Washington state is only one of several k-12 districts recently attacked by threat actors calling themselves “Grief.” The same threat actors also attacked Booneville School District in Mississippi and Lancaster Independent School District in Texas.  Note that DataBreaches.net has no information or confirmation to indicate whether either of the victims had their files encrypted by the threat actors.

Booneville School District, MS

Booneville listing

The threat actors first added Booneville to their leak site on June 30, and recently added files to the data dump. Their listing confusingly says:

Booneville School District is located in Booneville, MS, United States and is part of the Public Schools K-12 Industry. Booneville School District has 125 total employees across all of its locations and generates $8.31 million in sales (USD). (Sales figure is modelled). There are 6 companies in the Booneville School District corporate family.

Sales? A k-12 district? 6 companies?  Do they mean schools?

In any event, the data that Grief has dumped so far is mostly, well, to be blunt, garbage. There are four folders with student-related information. The folders have files for named students that contain some of their work or exercises. In a subset of the writings, students may reveal personal information about themselves or their families, but there are no spread sheets with demographic or educational records in the dump. So other than a few files with personal narratives, most of the data (student names) might be directory information under FERPA anyway.

Could the threat actors have more data that would be concerning? Perhaps, but it may be unlikely as they listed Booneville under their “Complete Grief” list.

DataBreaches.net emailed the district to request a statement and additional information, but no reply has been received. This post may be updated if a reply is received.

Lancaster ISD, TX

Lancaster ISD listing

Grief’s attack on Lancaster ISD was more extensive. The threat actors wrote:

The network of Lancaster Independent School District was screwed and now we have about 9 GB data from file servers, including internal company documents, personal and customers data. According to our rules we are publishing this data step by step in case if this company will keep silence.

Lancaster Independent School District is a public school district based in Lancaster, Texas. The district serves most of the city of Lancaster, a small portion of Dallas, and a small portion of the city of Hutchins.

Well, no, it’s not a company and there are no customers, but they seem to have exfiltrated some data that would be of concern to the district. While many of the files relate to routine district operations and budgeting that would be publicly available on request, other files contain employee demographic information for current and former employees, payroll information, banking information, Social Security numbers, and other Human Resources-related files such as termination letters and requests for leave, etc.

New Partners in Education Form
Hiring information included employee’s name, date of birth, address, phone number, email address, race,  Social Security number, and pay rate. This screencap contains just a small portion of a 59-page file for the employee. There were 122 employees who had files in this one particular folder. Redacted by DataBreaches.net

Some files were quite extensive, such as one employee’s file that was more than 140 pages of personal and professional information.

As we found with Clover Park, there were also files with personal and sensitive information relating to employees that are old files where many were probably not needed for current functions. A folder of files concerning child support included orders for the district to garnish certain employees’ wages for past-due child support. Those files — more than a decade old in most cases — contained an employee’s name, SSN, the name of the child for whom support was owed, and the amounts to be garnished, as the following image depicts:

Order to garnish wages

We did not observe any databases or spreadsheets with student information, but personal information on some students was exposed in the files relating to child support payments as well as files relating to the district’s free or reduced-cost lunch program. The district required information on the parents’ income and other details so they could determine or verify eligibility for the program.

DataBreaches.net sent an email to Lancaster asking them for a statement about the incident and their response to it, but no response has been received, and there is no statement on their web site that we could find.

Clover Park in Washington, Booneville in Mississippi, and Lancaster in Texas are just three recent k-12 attacks. In an upcomng post, we will report on yet another Texas district that was attacked by a different group of threat actors. Like the Lancaster, breach, the other Texas breach also involved a lot of information on employees. But in the upcoming report, you will see a lot of student files were involved as well.


Reporting by Dissent and Chum1ng0

Category: Breach IncidentsEducation SectorMalwareU.S.

Post navigation

← Cancer patient to sue Cork’s Mercy Hospital over HSE ransomware incident
U.S. Government Launches First One-Stop Ransomware Resource at StopRansomware.gov →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Central Maine Healthcare tackles suspected cybersecurity issue; hospitals remain open
  • Cartier Data Breach: Luxury Retailer Warns Customers that Personal Data Was Exposed
  • Beyond the Pond Phish: Unraveling Lazarus Group’s Evolving Tactics
  • Akira doesn’t keep its promises to victims — SuspectFile
  • Fraudsters, murderers, students: who the GRU assembled a team of hacker provocateurs from and why it failed
  • Order of Psychologists of Lombardy fined 30,000 € for inadequate data security protection and detection following ransomware attack
  • Lower Merion School District says a data breach was caused by a computer glitch (1)
  • After $1 Million Ransom Demand, Virgin Islands Lottery Restores Operations Without Paying Hackers
  • Junior Defence Contractor Arrested For Leaking Indian Naval Secrets To Suspected Pakistani Spies
  • Mysterious leaker GangExposed outs Conti kingpins in massive ransomware data dump

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Stewart Baker vs. Orin Kerr on “The Digital Fourth Amendment”
  • Fears Grow Over ICE’s Reach Into Schools
  • Resource: HoganLovells Asia-Pacific Data, Privacy and Cybersecurity Guide 2025
  • She Got an Abortion. So A Texas Cop Used 83,000 Cameras to Track Her Down.
  • Why AI May Be Listening In on Your Next Doctor’s Appointment
  • Watch out for activist judges trying to deprive us of our rights to safe reproductive healthcare
  • Nebraska Bans Minor Social Media Accounts Without Parental Consent

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.