DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Update on Griggsville-Perry School District ransomware incident

Posted on March 25, 2022 by Dissent

In January, the Griggsville-Perry School District in Illinois announced it had been hit with a ransomware attack. Now, two months later, Vice Society threat actors have added the district to their leak site and dumped files that they had infiltrated.

Listing on Vice Society
Image: DataBreaches.net

Inspection of the more than 3,000 files in the data dump revealed that most of them did not contain any personal information.  Many were log files or other files relating to assignments or routine district and school functions.  There were enrollment lists that named students but the lists did not include any SSN or date of birth or other information. Simply providing the names of students in each school is generally considered “directory information” under FERPA and hence, their leak would probably not be considered a breach (unless a particular student was not supposed to be named publicly for reasons of safety, but in those cases, students are often given aliases to be used).

Once again, however, we found old and no-longer needed files that did contain personal information such as a student sent for in-school suspension in December, 2014 for talking after being told not to.

Detention Referral in 2014
Student sent for in-school suspension in 2014. Redaction by DataBreaches.net

 
Files like the suspension/disciplinary note are not considered directory information under FERPA, and although FERPA does not require the district to notify the now-former student of this exposure or breach, it’s a breach that didn’t have to happen if data were routinely purged or moved offline to storage.

Apart from some other scattered files that did contain some personal or personnel information such as W-9 forms and contract information, the only files that appeared to be of concern were more than 300 payment-related files that contained employee names and their payment information, including bank direct deposit information. The files were not recent, dating back to 2012 – 2015, but if any of those bank accounts might still in use by the employees or former employees, they need to be made aware of the breach.

DataBreaches.net sent an email inquiry to the superintendent earlier this week asking if there had been any notification sent to employees or students about this incident. No reply was received.

As far as education sector / k-12 breaches go, apart from the banking information, this appears to be a fairly low-impact breach in terms of personal information if the threat actors actually dumped all the data they exfiltrated (which they always claim that they do). If other findings emerge with additional investigation, this post will be updated.

Category: Breach IncidentsEducation SectorMalware

Post navigation

← Hotel WiFi across MENA compromised and exposing private data
FBI: Ransomware hit 649 critical infrastructure orgs in 2021 →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Ransomware Attack on ADP Partner Exposes Broadcom Employee Data
  • Anne Arundel ransomware attack compromised confidential health data, county says
  • Australian national known as “DR32” sentenced in U.S. federal court
  • Alabama Man Sentenced to 14 Months in Connection with Securities and Exchange Commission X Hack that Spiked Bitcoin Prices
  • Japan enacts new Active Cyberdefense Law allowing for offensive cyber operations
  • Breachforums Boss “Pompompurin” to Pay $700k in Healthcare Breach
  • HHS Office for Civil Rights Settles HIPAA Cybersecurity Investigation with Vision Upright MRI
  • Additional 12 Defendants Charged in RICO Conspiracy for over $263 Million Cryptocurrency Thefts, Money Laundering, Home Break-Ins
  • RIBridges firewall worked. But forensic report says hundreds of alarms went unnoticed by Deloitte.
  • Chinese Hackers Hit Drone Sector in Supply Chain Attacks

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law
  • Montana Becomes First State to Close the Law Enforcement Data Broker Loophole
  • Privacy enforcement under Andrew Ferguson’s FTC
  • “We would be less confidential than Google” – Proton threatens to quit Switzerland over new surveillance law
  • CFPB Quietly Kills Rule to Shield Americans From Data Brokers
  • South Korea fines Temu for data protection violations
  • The BR Privacy & Security Download: May 2025

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.