DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Minneapolis Public Schools systems restored, no ransom paid

Posted on March 2, 2023 by Dissent

Jeremiah Jacobsen has an update to the “encryption event” previously disclosed by Minneapolis Public Schools (MPS).

[Note: MPS’s phrase “encryption event” appeared to be a ridiculous — and dare we say, sleazy–  attempt not to call it a “ransomware attack.” The district still has not described it as ransomware attack.]

Minneapolis Public Schools released a new statement Wednesday. According to the new statement, the district was able to “restore the MPS environment using internal backups.”  MPS did not pay a ransom. MPS’s statement does not claim that no ransom had been demanded, however.

Of note:

However, KARE 11 also obtained a slightly different version of the statement that appeared to be sent as a letter to staff and families, cautioning them not to pay a ransom, and that “the threat actors may contact employees or staff in an attempt to coerce MPS to pay a ransom.”

So it was a ransomware incident and the district just played word games — or tried to.

KARE11 also reports:

District officials said the investigation so far “has not found any evidence that any data accessed has been used to commit fraud,” but MPS will continue to work with law enforcement as authorities investigate.

No evidence of fraud? But given that they have apparently refused to pay ransom and publicly indicated their refusal to pay, shouldn’t staff and parents expect to see data dumped or sold on the dark web? Or maybe it won’t be seen publicly but will be sold or traded privately?

Yesterday, the following tweet was posted on Twitter by @jjake61:

Current staff, former staff and retirees now reporting problems with being locked out of bank accounts and fraudulent bank and credit card charges. Why is @MPS_News not being forthcoming with what actually happened? We are clearly victims of a cyber crime so why be in CYA mode?

— jjake61 (@jjake61) March 1, 2023

DataBreaches was unable to find any confirmation or other sources on this claim, but this incident does not appear to be over. The incident is not currently listed on any dark web leak site checked by DataBreaches, but this post will be updated as more information becomes available.

In the meantime: those who believe they may be affected by the incident might do well to place security freezes on their credit reports. That will make it harder for criminals to open up new accounts using your information if the new account would require a credit check.  This would also be a good time to perhaps create new and stronger passwords for banking and other important accounts and also employ multifactor authentication that does not use your phone as the second factor.


Related:

  • Two more entities have folded after ransomware attacks
  • British institutions to be banned from paying ransoms to Russian hackers
  • Microsoft Releases Urgent Patch for SharePoint RCE Flaw Exploited in Ongoing Cyber Attacks
  • Michigan ‘ATM jackpotting’: Florida men allegedly forced machines to dispense $107K
  • Premier Health Partners issues a press release about a breach two years ago. Why was this needed now?
  • Authorities released free decryptor for Phobos and 8base ransomware
Category: Breach IncidentsCommentaries and AnalysesEducation SectorMalwareU.S.

Post navigation

← Za: Businessman convicted of Experian data breach skips sentencing, court issues warrant for his arrest
CISA Advisory: Royal Ransomware →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
  • Hacker group “Silent Crow” claims responsibility for cyberattack on Russia’s Aeroflot
  • AIIMS ORBO Portal Vulnerability Exposing Sensitive Organ Donor Data Discovered by Researcher
  • Two Data Breaches in Three Years: McKenzie Health
  • Scattered Spider is running a VMware ESXi hacking spree
  • BreachForums — the one that went offline in April — reappears with a new founder/owner
  • Fans React After NASCAR Confirms Ransomware Breach
  • Allianz Life says ‘majority’ of customers’ personal data stolen in cyberattack (1)
  • Infinite Services notifying employees and patients of limited ransomware attack
  • The safe place for women to talk wasn’t so safe: hackers leak 13,000 user photos and IDs from the Tea app

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • White House ordered to restore Medicaid funding to Planned Parenthood clinics
  • California Attorney General Announces $1.55M CCPA Settlement with Healthline.com
  • Canada’s Bill C-2 Opens the Floodgates to U.S. Surveillance
  • Wiretap Suits Pit Old Privacy Laws Against New AI Technology
  • Action against tiny Scottish charity sparks huge ICO row
  • Congress tries to outlaw AI that jacks up prices based on what it knows about you
  • Microsoft’s controversial Recall feature is now blocked by Brave and AdGuard

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.