DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Dallas Independent School District reveals breach, but details are still missing

Posted on September 3, 2021 by Dissent

As seen on their web site:

Information on Dallas ISD data security incident

The Dallas Independent School District recently received notice of a data security incident involving the district’s electronic records that may affect former and current students, alumni, parents, and district employees.

The confidentiality, privacy, and security of information in our care is one our highest priorities.  We take this matter very seriously and have invested significant resources to protect sensitive data. Despite our efforts, the district is now one of a growing number of public and private organizations experiencing cyberattacks.

Federal law enforcement authorities have been contacted. At this time, it appears the affected information has been contained and that none of it has been shared or sold. However, we cannot be 100 percent certain until additional forensic analysis is completed.

The district’s IT team, assisted by forensic consultants, has addressed specific vulnerabilities that were exploited during this event and will continue efforts to augment security going forward.

We regret any inconvenience this incident may have caused and believe it is our responsibility to inform the public that we are taking steps to notify individuals whose records have been impacted.

We are committed to transparency and will continue to share updates with you, as they are available. Please check back on this website for the latest information.

Last Updated 9/2/2021

An FAQ on their site that accompanies the statement provides a bit more detail, but still leaves the situation unclear.  Texas school districts have been frequent targets of ransomware threat actors (in fact, the whole k-12 sector has been frequently attacked).  The district reports that it became aware of an incident on August 8.  According to their FAQ,

An unauthorized third party accessed our network, downloaded data, and temporarily stored it on an encrypted cloud storage site. The data have since been removed from the site. To date, our cybersecurity experts have found no evidence indicating the data was otherwise accessed, disseminated, or sold. However, we cannot be 100% sure until our ongoing investigation is complete.

And therein lies much of the confusion.  Was this a ransomware attack? Were any files encrypted? Was any ransom demand or extortion demand made?  How did the data get removed from the site? By the host or by whoever uploaded it?

The incident reportedly potentially affects anyone who was a student, contractor, or employee between 2010 and the present.  The data types involved were described as:

  1. For some current and former employees/contractors: first and last name, address, phone number, social security number, date of birth, dates of employment, salary information, and reason for ending employment
  2. For some current and former students: first and last name, social security number, date of birth, parent/guardian contact information, and grades. For a subset of students, custody status and/or medical condition was also exposed.

This incident has not appeared on any of the leak sites maintained by dozens of threat actors, forums, or markets, but that does not mean that it will never show up and the district and others will continue monitoring to be on the lookout for any of the district’s data.

DataBreaches.net submitted an inquiry through the district’s web site last night seeking clarification as to the nature of the breach and will update this post if a response is received.

Category: Breach IncidentsCommentaries and AnalysesEducation SectorOf Note

Post navigation

← US farm loses $9 million in the aftermath of a ransomware attack
Town of Deerfield offering credit monitoring after data breach potentially exposed more than 8,100 residents’ info →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • New evidence links long-running hacking group to Indian government
  • Zaporizhzhia Cyber ​​Police Exposes Hacker Who Caused Millions in Losses to Victims by Mining Cryptocurrency
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Google: Hackers target Salesforce accounts in data extortion attacks
  • The US Grid Attack Looming on the Horizon
  • US govt login portal could be one cyberattack away from collapse, say auditors
  • Two Men Sentenced to Prison for Aggravated Identity Theft and Computer Hacking Crimes
  • 100,000 UK taxpayer accounts hit in £47m phishing attack on HMRC
  • CISA Alert: Updated Guidance on Play Ransomware
  • Almost one year later, U.S. Dermatology Partners is still not being very transparent about their 2024 breach

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • How the FBI Sought a Warrant to Search Instagram of Columbia Student Protesters
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Malaysia enacts data sharing rules for public sector
  • U.S. Enacts Take It Down Act
  • 23andMe Bankruptcy Judge Ponders Trump Bill’s Injunction Impact
  • Hell No: The ODNI Wants to Make it Easier for the Government to Buy Your Data Without Warrant
  • US State Dept. says silence or anonymity on social media is suspicious

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.