DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

CA: Woodlake Unified District student and personnel data dumped after ransomware incident

Posted on October 26, 2021 by chum1ng0

Woodlake Unified District in California includes Castle Rock Elementary, Francis J. White Learning Center, Woodlake Educational Options Program, Woodlake Union High School, and Woodlake Valley Middle School.  On April 11, the district took to Facebook to alert the community to a ransomware incident that occurred on April 9.

Facebook post Facebook Post
Image: DataBreaches.net

For months, the breach did not show up anywhere, but on September 13, Pysa threat actors added it to their leak site, noting the incident as April 8.

Listing in Pysa Site
Image: DataBreaches.net

As they tend to do, Pysa dumped a lot of data. In this case, the data dump seemingly should have contained 77 parts that included more than 16 GB of files, compressed. Some parts seem to have been omitted from the dump, however, raising questions and concerns as to what might be in the parts that were not dumped.

The files that were dumped contained a lot of personal and sensitive information of students and employees. The following sections describe just some of what DataBreaches.net found in plain text files available to anyone and everyone.

All redactions in the images in this report were performed by DataBreaches.net.

Student-Related Files

We found files containing the names and surnames of the students with their date of birth and social security numbers. Some spreadsheets contained students’ email addresses and passwords.

In one folder, we found dozens of special education student files. These files contained the name of the teacher, the class, the date and the name of the student with other special education-related information for the students.

In other files, we found scholarship applications containing photos of the students with their personal, family and educational information.

Not all data was for current students. We found older files as well, including disciplinary files such as expulsion records. We also found files with a student transcript, course rosters, and we saw expulsion notes from several years ago, we saw student grades and other education records, including Behavior Intervention Plans (BIPs) for students with disruptive behaviors, and IFSPs (Individualized Family Service Plans) for pre-school children.  As with Individualized Education Programs (IEPs), IFSPs often contain personal and family background information and social and medical history.

Part of IEP
One page of a student’s Individualized Education Program (IEP). Image: DataBreaches.net

There were hundreds of files on individual students of various kinds, but all should have been protected under FERPA, the federal law protecting the privacy of, and disclosure of, education records.

PsychoEd Report
Top portion of PsychoEducational Evaluation of a student with disabilities. Image: DataBreaches.net

One of the exposed files had a complete history of a child in foster care. For such children, their medical records and education records are updated by current foster parents and providers so that the next foster placement will have current and accurate records of medical issues and educational needs and services. The document is referred to as a “passport” because it travels with the student.

Personnel-Related Files

In some folders we found tax-related or payroll-related information. Some files had employees’ names with social security numbers as well as other personally identifiable information.  We also found some personnel issues such as complaints about individuals or investigations.

Information on employees from the 2018-2019 and 2019-2020 included injury status reports with fields like:  Employee Name, Social Security Name, Date of Birth, Address, Phone, Gender, Job Title, Date of Injury, Time, Specific Injury, Supervisors Comments. In other files, there were medical reports related to claims such as physician statements and disability forms.

Physician form for injured employee
Image: DataBreaches.net

Other files had school personnel’s usernames and passwords.

What Wasn’t in the Data Dump

While there was a lot of data in the dump and this report only gives some examples without the full scope of the breach, what we didn’t find was master payroll systems or systems with direct deposit or other financial information on employees.  Nor did we find master education records systems including enrollment. Did Pysa  acquire those files and decide not to dump them but to sell them or misuse them — or did they not acquire them at all?  DataBreaches.net does not know.

Woodlake’s Response

Because DataBreaches.net could find no updated notification on Woodlake’s site, we reached out to the district’s Superintendent, Laura Gonzalez, to ask if the district had sent individual notifications to employees and parents of students, and if so, how many people had been notified.

The superintendent did not respond to our first email, but did respond to our second request with:

“No comment.”

We have found no update on their web site, and we have found no report to the California Attorney General’s Office.  Has the district notified anyone? We do not know, but will update this post if more information becomes available. But it has been six months now since the district was attacked and data exfiltrated. Should  there have been some public disclosure?  Does “no comment” really serve the public well?

Pysa Continues Attacks on Schools

DataBreaches.net has reported on a number of other education sector attacks by Pysa threat actors. This is now the 12th k-12 report this site has published.

Unit 42’s cybersecurity consultants have observed that the education sector is the most affected by the Pysa criminal gang.

Unit 42 Post on Pysa
Image: Palo Alto Networks

If you have been affected by this breach or have received a notification from the district, please email chum1ngo[at]databreaches[dot]net


Research and reporting by chum1ng0, with additional material and editing by Dissent.

Category: Education SectorMalwareOf NoteU.S.

Post navigation

← Central Restaurants Group in Thailand hit by Desorden
NJ: Pinelands Regional School District Investigates Data Breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Rewards for Justice offers $10M reward for info on RedLine developer or RedLine’s use by foreign governments
  • New evidence links long-running hacking group to Indian government
  • Zaporizhzhia Cyber ​​Police Exposes Hacker Who Caused Millions in Losses to Victims by Mining Cryptocurrency
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Google: Hackers target Salesforce accounts in data extortion attacks
  • The US Grid Attack Looming on the Horizon
  • US govt login portal could be one cyberattack away from collapse, say auditors
  • Two Men Sentenced to Prison for Aggravated Identity Theft and Computer Hacking Crimes
  • 100,000 UK taxpayer accounts hit in £47m phishing attack on HMRC
  • CISA Alert: Updated Guidance on Play Ransomware

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • How the FBI Sought a Warrant to Search Instagram of Columbia Student Protesters
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Malaysia enacts data sharing rules for public sector
  • U.S. Enacts Take It Down Act
  • 23andMe Bankruptcy Judge Ponders Trump Bill’s Injunction Impact
  • Hell No: The ODNI Wants to Make it Easier for the Government to Buy Your Data Without Warrant
  • US State Dept. says silence or anonymity on social media is suspicious

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.
Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report