DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

MO: Rockwood School District Provides Notice of Ransomware Incident

Posted on August 20, 2021 by Dissent

EUREKA, Mo., Aug. 19, 2021 /PRNewswire/ — Rockwood School District (the “District”) today is providing information about a recent event that may impact the privacy of some personal data related to current and former employees and students.  The confidentiality, privacy, and security of information in the District’s care is one of its highest priorities and the District takes this incident very seriously.  Although the District has not received any reports of actual or attempted misuse of the impacted information, the District is providing this notice in an abundance of caution.

What Happened?  On June 17, 2021, the District discovered that certain computer systems in its network had been infected with malware which prevented access to certain files on those systems.  Upon discovery, the District immediately notified law enforcement and began an investigation with the assistance of third-party computer forensic specialists.  The investigation recently determined that certain District systems were subject to unauthorized access between April 20, 2021 and June 24, 2021.  Through this investigation, it was determined that the District was the victim of a criminal ransomware attack.  While the investigation was able to determine that certain District systems were accessed, the investigation was unable to confirm what information within those systems was actually accessed.  Therefore, out of an abundance of caution, the District conducted an extensive review of the contents of the impacted systems in order to provide notice to impacted individuals.

What information was involved?The information contained within the files at issue varied by individual but contained names, addresses, Social Security number, date of birth, financial account information, District employee identification number, MOSIS identification number, and/or student records.  The District does not have any evidence that information was subject to actual or attempted misuse.

What Are We Doing? The District takes the confidentiality and security of information very seriously.  The District promptly investigated this incident and took steps to secure our systems. The District also implemented additional security measures and is reviewing and enhancing existing policies and procedures to reduce the likelihood of a similar future event. The District is also offering credit monitoring for individuals whose information was impacted.

For more information.  We understand some people may have additional questions concerning this incident.  Individuals can direct questions to (636) 733-1111 Monday – Friday between 7:00 a.m. and 4:30 p.m or visit the District’s website at www.rsdmo.org.

Read more of their press release on Woodland Report.

Update: this incident was reported to the Maine Attorney General’s Office as impacting 77,294 individuals.

Category: Education SectorMalwareU.S.

Post navigation

← Willdan Group, Inc. (“Willdan”) Provides Notice Of Data Privacy Incident
Singapore real estate firm breached by ALTDOS →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Iran-Linked Threat Actors Leak Visitors and Athletes’ Data from Saudi Games
  • UK: Oxford City Council still investigating cyberattack from earlier this month
  • Steelmaker Nucor Says Hackers Stole Data in Recent Attack
  • People’s Republic of China cyber threat activity: Cyber Threat Bulletin
  • Ukrainian Web3 security auditing company Hacken suffered an attack that allowed a hacker to create 900 million HAI tokens
  • McLaren provides written notice to 743,131 patients after ransomware attack in July 2024
  • A state forensics lab was leaking its files. Getting it locked down involved a number of people.
  • CoinMarketCap Hacked, Scrambles to Remove Malicious Wallet Verification Popup
  • Montana Attorney General launches investigation into Lee Enterprises data breach
  • AT&T gets preliminary approval for $177 million data breach settlement

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Sky Views Personal Data as a Potential Weapon in IPTV Piracy War
  • Florida Used a Nationwide Surveillance Camera Network 250 Times To Aid in Immigration Arrests
  • Federal Court Strikes Down HIPAA Reproductive Health Care Privacy Rule
  • The Markup caught 4 more states sharing personal health data with Big Tech
  • Privacy in the Big Sky State: Montana’s Consumer Privacy Law Gets Amended
  • UK Passes Data Use and Access Regulation Bill
  • Officials defend Liberal bill that would force hospitals, banks, hotels to hand over data

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.