DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Update on Griggsville-Perry School District ransomware incident

Posted on March 25, 2022 by Dissent

In January, the Griggsville-Perry School District in Illinois announced it had been hit with a ransomware attack. Now, two months later, Vice Society threat actors have added the district to their leak site and dumped files that they had infiltrated.

Listing on Vice Society
Image: DataBreaches.net

Inspection of the more than 3,000 files in the data dump revealed that most of them did not contain any personal information.  Many were log files or other files relating to assignments or routine district and school functions.  There were enrollment lists that named students but the lists did not include any SSN or date of birth or other information. Simply providing the names of students in each school is generally considered “directory information” under FERPA and hence, their leak would probably not be considered a breach (unless a particular student was not supposed to be named publicly for reasons of safety, but in those cases, students are often given aliases to be used).

Once again, however, we found old and no-longer needed files that did contain personal information such as a student sent for in-school suspension in December, 2014 for talking after being told not to.

Detention Referral in 2014
Student sent for in-school suspension in 2014. Redaction by DataBreaches.net

 
Files like the suspension/disciplinary note are not considered directory information under FERPA, and although FERPA does not require the district to notify the now-former student of this exposure or breach, it’s a breach that didn’t have to happen if data were routinely purged or moved offline to storage.

Apart from some other scattered files that did contain some personal or personnel information such as W-9 forms and contract information, the only files that appeared to be of concern were more than 300 payment-related files that contained employee names and their payment information, including bank direct deposit information. The files were not recent, dating back to 2012 – 2015, but if any of those bank accounts might still in use by the employees or former employees, they need to be made aware of the breach.

DataBreaches.net sent an email inquiry to the superintendent earlier this week asking if there had been any notification sent to employees or students about this incident. No reply was received.

As far as education sector / k-12 breaches go, apart from the banking information, this appears to be a fairly low-impact breach in terms of personal information if the threat actors actually dumped all the data they exfiltrated (which they always claim that they do). If other findings emerge with additional investigation, this post will be updated.


Related:

  • IVF provider Genea notifies patients about the cyberattack earlier this year.
  • #StopRansomware: Interlock
  • Two more entities have folded after ransomware attacks
  • British institutions to be banned from paying ransoms to Russian hackers
  • Microsoft Releases Urgent Patch for SharePoint RCE Flaw Exploited in Ongoing Cyber Attacks
  • Premier Health Partners issues a press release about a breach two years ago. Why was this needed now?
Category: Breach IncidentsEducation SectorMalware

Post navigation

← Hotel WiFi across MENA compromised and exposing private data
FBI: Ransomware hit 649 critical infrastructure orgs in 2021 →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
  • Hacker group “Silent Crow” claims responsibility for cyberattack on Russia’s Aeroflot
  • AIIMS ORBO Portal Vulnerability Exposing Sensitive Organ Donor Data Discovered by Researcher
  • Two Data Breaches in Three Years: McKenzie Health
  • Scattered Spider is running a VMware ESXi hacking spree
  • BreachForums — the one that went offline in April — reappears with a new founder/owner
  • Fans React After NASCAR Confirms Ransomware Breach
  • Allianz Life says ‘majority’ of customers’ personal data stolen in cyberattack (1)
  • Infinite Services notifying employees and patients of limited ransomware attack
  • The safe place for women to talk wasn’t so safe: hackers leak 13,000 user photos and IDs from the Tea app

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Congress tries to outlaw AI that jacks up prices based on what it knows about you
  • Microsoft’s controversial Recall feature is now blocked by Brave and AdGuard
  • Trump Administration Issues AI Action Plan and Series of AI Executive Orders
  • Indonesia asked to reassess data privacy terms in new U.S. trade deal
  • Meta Denies Tracking Menstrual Data in Flo Health Privacy Trial
  • Wikipedia seeks to shield contributors from UK law targeting online anonymity
  • British government reportedlu set to back down on secret iCloud backdoor after US pressure

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.