DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Mars k-12 district in Pennsylvania victim of ransomware attack; data leaked

Posted on October 12, 2022 by Dissent

The Vice Society added more schools to their “partners” leak site yesterday. One of them is the Mars Area School District in Pennsylvania.

According to niche.com, MASD is a k-12 district with 3,334 students.  In a notice posted on the district’s website on October 3, Superintendent Gross described the progress the district was making in recovering from a ransomware attack they originally disclosed on September 27.

In their earliest announcement, the district had indicated that it did not have access to e-mail or to the District’s Internet network, but the phone system was unaffected and that schools would remain open as they worked through the recovery. They had also announced, “at this time, there is no evidence that student or employee records were compromised or at risk.”

As of October 3, the investigation was still in its early stages, and they no longer stated that there was no evidence of student or employee records being compromised. In that update, they wrote, “The District will give appropriate notice to those affected, in accordance with applicable data protection obligations, once we have completed our forensic review.”

A preliminary review by DataBreaches of the data leaked by Vice reveals that a lot of old files, some with personal information, have been dumped on the internet for anyone to download.

Of special note: a file with personnel information from 2016-2017 contains information on more than 350 employees with their Social Security Numbers, first and last names, date of birth, work and personal email addresses, and phone numbers.

No databases were noted in DataBreaches’ preliminary review, but a number of individual records on employees and students revealed sensitive information on named individuals. As a few examples, DataBreaches noted:

  • files concerning the arrest and disciplinary action taken by the district with respect to an employee who was criminally charged for driving under the influence (2022);
  • a report of an ambulance called for an employee who fainted in class (2012);
  • a report on an ambulance called after a school bus driver discovered a student on the bus had lost consciousness and how the parents refused treatment for the child (2014);
  • work complaints history about a custodian from 2006-2011 (2011);
  • notice of a disciplinary hearing considering negligence charges against an employee (2021); and
  • a letter to the state’s Chief Counsel responding to parent allegations about deprivation of their child’s rights in a disciplinary matter (2019).

How many notifications will the district need to make for older incidents with personal or sensitive information — files that didn’t need to be currently connected to the internet?

Earlier this year, the Pennsylvania legislature considered an act that would prohibit local governments and school districts from using taxpayer dollars to pay ransom unless the governor declared an emergency. Victims would also have to notify the state within an hour of discovery of an attack. The bill passed in the Senate, but stalled in the House, and there has been no further action on it.

DataBreaches sent an email inquiry to Vice Society to ask whether MASD had responded to their demands or communications at all, and whether such laws would have any impact on whether Vice attacked a district or not. If a reply is received, this post will be updated.

Updated October 14: A Vice Society spokesperson responded that the district had communicated for a while, but then stopped.  In response to my question as to whether any law prohibiting ransom payments would influence their decision to attack a public school district or not,  they replied:

We don’t care about laws. Any attacked company is glory or money. They can choose what to give us. We love both of it.
If other groups feel the same way, then state laws prohibiting ransom payments may not deter attacks. In time, we’ll see if they do.

Related:

  • KT Chief to Resign After Cybersecurity Breach Resolution
  • Cyber-Attack On Bectu’s Parent Union Sparks UK National Security Concerns
  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
  • John Bolton Indictment Provides Interesting Details About Hack of His AOL Account and Extortion Attempt
  • A business's cyber insurance policy included ransom coverage, but when they needed it, the insurer refused to pay. Why?
  • Before Their Telegram Channel Was Banned Again, ScatteredLAPSUS$Hunters Dropped Files Doxing Government Employees (2)
Category: Breach IncidentsCommentaries and AnalysesEducation SectorMalware

Post navigation

← Aesthetic Dermatology Associates notifies patients of breach, but data already leaking on dark web
Quarter of Healthcare Ransomware Victims Forced to Halt Operations – Report →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.