School ransomware attacks are on the rise What can districts do K12 Dive
p
Let K12 Dives free newsletter keep you informed straight from your inbox
ppppCyberattacks inflict logistical legal and financial damage on schools and take an emotional and physical toll on their communitiesppPhoto illustration Industry Dive K12 SixppThis is the first installment of a fivepart series on ransomware in schoolsppThe Tucson Unified School District and Nantucket Public Schools seem to have little in common Tucson schools with 42000 students is one of the largest districts in Arizona and sits in a bustling urban area Nantucket schools on the other hand enrolls fewer than 2000 students and populates a small island off the coast of MassachusettsppBut in early 2023 just one day apart on Jan 30 and 31 both school systems fell victim to ransomware attacks that disrupted operations leading to school closures in Nantucket and the compromise of personally identifiable data in Tucson ppRansomware where threat actors use malware to block access to network systems and then demand payment to unlock it has been ballooning in the K12 sector over the last seven years according to the K12 Security Information eXchange Known as K12 SIX the national nonprofit helps protect schools from cybersecurity threatsppAn estimated 325 ransomware attacks hit public K12 schools between April 2016 and November 2022 From that date through Oct 3 of this year schools have experienced another some 85 ransomware attacks according to K12 SIX ppAdding to the pain a handful of school districts were hit with ransomware twice between April 2016 and November 2022 according to K12 SIX data ppThe numbers its important to note can shift upon further investigation to determine whether the events were definitely ransomware attacksppBut Roberto Rodriguez assistant secretary for the US Department of Educations Office of Planning Evaluation and Policy Development said an estimated five cybersecurity incidents hit K12 each weekppThe increase in the number of ransomware attacks on K12 from 14 in 2016 to 69 in 2022 according to data from K12 SIXppNot only do these cyberattacks inflict logistical legal and financial damage they also take an emotional and physical toll on school communities say education administrators and technology professionals ppPlus there are national security concerns given that perpetrators are often international criminalsppAt the end of the day were a country that offers a free and public education and when an outside entity and a nationstate actor attacks that theyre not attacking just the school theyre attacking the concept of a free and public education and our approach to how we do things in the US said Amy McLaughlin project director of Cybersecurity and Network and Systems Design Initiatives at Consortium for School Networking or CoSN a professional association for K12 ed tech leadersppOne of the most significant factors putting a target on K12s back is that the sector has rich digital assets but underresourced cybersecurity infrastructures The assets are all in the information names birth dates Social Security numbers student disability status financial details that districts private schools and the third party companies they work with are supposed to protectppYet many districts and public and private schools lack the technology or staffing to stay ahead of criminals and safeguard the sensitive data entrusted to them The K12 education sector like some other industries also has no federal mandatory and uniform cybersecurity standards for identifying and reporting attacksppAt the same time bad actors are always finding new ways to take advantage of vulnerabilities ppAt the end of the day were a country that offers a free and public education and when an outside entity and a nationstate actor attacks that theyre not attacking just the school theyre attacking the concept of a free and public education and our approach to how we do things in the USppAmy McLaughlinppProject director of Cybersecurity and Network and Systems Design Initiatives at CoSNppA concerning development for example is dual and triple extortion ransomware attacks That is when threat groups steal and encrypt data forcing victims to figure out both how to access their data and how to stop it from being released on the dark web or elsewhere Student staff and family data released in this way poses downstream risks for identity theft credit and tax fraud and other nefarious activityppIts as if someone moved into your house locked you out stole your possessions and then demanded payment to turn over the keys said Richard Bowman chief technology officer of New Mexicos Albuquerque Public Schools which experienced a ransomware attack in January 2022ppMcLaughlin adds Theyre out here stealing your data and charging you for it Nationstate adversaries and criminal or terrorist organizations attack education entities to fund their business model she saidppIndeed Doug Levin cofounder and national director of K12 SIX said the attacks are 100 about moneyppA number of characteristics including a lack of robust cybersecurity measures make K12 into attractive prey Levin said Weve been slow to implement common sense protections like multifactor authentication which makes us easier targets compared to other sectors he saidppOther contributors include disjointed response protocols and underresourced cybersecurity staff Twothirds of districts had no fulltime cybersecurity position in 2023 according to CoSN survey data And 12 of districts said they dont dedicate any funds for cybersecurityppA 2024 US Department of Homeland Security threat assessment report said K12 districts have been a near constant ransomware target The federal agency blamed this on budget constraints of school systems IT departments a lack of dedicated resources and cybercriminals success in getting schools to pay ransomsppIn addition districts are simply managing a lot of ed tech these days During the 202324 school year they used 2739 different ed tech tools on average an 8 increase from the previous school year according to a report released earlier this year by Instructure and the companys LearnPlatform which helps districts research and choose digital learning products
People within schools and districts educators students staff are also for the most part trusting caring and optimistic educators and technology experts note Educators often dont assume others are acting with ill intent This attitude is needed to create nurturing school environments but it also can give an advantage to criminals who prey on vulnerable systemsppMore than half 62 of lower education systems worldwide that are victimized by ransomware pay the criminals to recover their hijacked data according to a 2024 report from UKbased cybersecurity firm Sophos The data was based on a survey of 300 lower education IT and cybersecurity leaders in 14 countries ppThe ransom payments averaged 75 million according to the 99 lower education survey participants who had paid demands ppThe average price for restoring data with backup technology excluding ransom payments was 376 million or about the expense of 54 US teaching positions That average cost is more than double the 159 million figure from the companys 2023 surveyppAccording to Comparitech a cybersecurity and online privacy product review website the K12 and higher education sectors lost 126 school days on average in 2023 from ransomware attacks That downtime calculates to 548185 per day or about 123744 school lunches for one dayppThe companies and organizations that collect and report data about K12 cyberattacks do so with a caveat they say the data may be underreported Thats because there is no national mandatory reporting system ppThe new federal Cyber Incident Reporting for Critical Infrastructure Act is expected to change that however when it takes effect sometime in 2026 CIRCIA will require state education agencies and school districts with more than 1000 students to report to the Cybersecurity and Infrastructure Security Agency within 72 hours of a disruptive cyber incident and within 24 hours of making a ransom payment to cybercriminals according to the proposed rule for implementing the provision ppIn addition to financial fallout ransomware can wreak havoc on productivity teaching and learning not to mention the emotional wellbeing of a school community ppI think that the challenge the hardest part and the biggest piece of this is that the disruption can be really significant said McLaughlin For instance if a district has to close schools due to a cyberattack parents have to find child care sports games have to be postponed and state testing has to be rescheduledppOnce a breach is discovered and a ransom demanded district or school response can vary with the circumstances But experts recommend these steps ppThe FBI and CISA as well as the nonprofit MultiState Information Sharing Analysis Center all discourage victims from paying ransoms as theres no guarantee the files will actually be recovered But some education economists and tech experts say making that decision is not so easy as paying the ransom may be less disruptive or less expensive than rebuilding a schools networkppIn some cases districts have kept details of ransomware attacks hidden from the public and even staff An investigative report by the Florida Sun Sentinel found that the 248000student Broward County Public Schools system waited five months to report key information to people impacted by a March 2021 cyberattack In a Nov 29 2021 statement the district said it was offering free credit monitoring to those affected and who requested the serviceppAcross the country some school districts have had to respond to parents demands for answers when personally identifiable information was compromised ppFor instance parents in a class action lawsuit filed Oct 31 2023 allege that negligent andor reckless failure by Nevadas Clark County School District resulted in a ransomware attack that led to the release of sensitive data about teachers students families and former students ppDespite knowing about this breach for almost a month CCSD continues to fail to adequately inform those affected continues to characterize what we understand was and may still be an ongoing breach of its systems as a single incident and continues to portray itself as an innocent victim rather than an accountable governmental body said an undated statement from plaintiff law firm Sklar Williams The case Doe v Clark County School District remains openppLiability is one reason school districts may want to stay silent about an attack But theres another reason too shameppThe topic of ransomware is rarely shared among organizations and is viewed as a scarlet letter or badge of dishonor to technology and security teams said Lacey Gosch assistant superintendent of technology at Judson Independent School District in Live Oak Texas Goschs comment came during testimony on Sept 27 2023 before a US House joint subcommittee hearing on combating ransomware attacksppThe 25900student Judson system fell victim to a ransomware attack on June 17 2021 just a month after Gosch came to the district A full investigation found the data breach affected about 429000 people The district paid a 547000 ransom to ensure the threat actors deleted the stolen data Gosch told the joint subcommittee ppDistrict contractors had to install new cybersecurity software on each of the school systems 4500 devices In the end it took Judson ISD more than a year to fully recover from the breach ppThe mentality that any organization is too small or insignificant to be affected by a cybersecurity breach is living under a false sense of security Gosch said The truth is that cybersecurity events in organizations need to be viewed not as improbable but as absolute The question is not if it will happen but when it will happenppAfter years of victimized school districts suffering from frustration and shame theres been growing momentum at local state and federal levels to fight back through improved prevention recovery and response practices ppPreventive measures like multifactor verification for accessing files are some of the leading defenses Levin said The best thing is to not be a victim right If youre a victim I think youre faced with a series of bad choices at that point he saidppTo safeguard schools districts are investing in cybersecurity insurance and taking advantage of free tools and resources from CISA Earlier this month the White House Office of the National Cyber Director launched an initiative to encourage districts to adopt free protective domain name system services that prevent connections to malicious website domainsppEducation advocacy groups like CoSN and the State Educational Technology Directors Association are also assisting districtsppThe best thing is to not be a victim right If youre a victim I think youre faced with a series of bad choices at that pointppDoug LevinppCofounder and national director of K12 SIXppStates are likewise stepping up to help The Georgia Department of Education for example dedicated nearly 1 million in 2022 to provide every district in the state with licensing for a cybersecurity platform through a contract with the Georgia Technology Authority The platform allows districts to pinpoint their vulnerabilities and provides recommendations for improvements ppAnd CISA along with the federal Education Department created a Government Coordinating Council earlier this year to address hardships districts face in preventing responding and recovering from cyberattacks ppThe council is made up of school administrative organizations representing principals superintendents school business officials special education directors and others ppIt serves as an informationgathering and collaborating body to better understand K12 cybersecurity challenges It is also documenting best practices and brainstorming potential solutions such as a dedicated technical assistance center said the Education Departments Rodriguez ppCongress has not provided the Education Department with a dedicated funding stream for supporting cybersecurity measures in school districts and state education agencies according to RodriguezppWe are hearing from districts around the country urban rural and suburban about the challenges that they face said Rodriguez adding We think that preventative approach is really something that has great potential and we should be doing more with districts across the country especially those districts that dont have more sophisticated infrastructureppCybersecurity Dive Senior Reporter Matt Kapko contributed background reporting and News Graphics Developer Julia Himmel contributed data and graphics support to this storyppKeep up with the story Subscribe to the K12 Dive free daily newsletterppGet the free daily newsletter read by industry expertsppThe free newsletter covering the top industry headlinesp
Let K12 Dives free newsletter keep you informed straight from your inbox
ppppCyberattacks inflict logistical legal and financial damage on schools and take an emotional and physical toll on their communitiesppPhoto illustration Industry Dive K12 SixppThis is the first installment of a fivepart series on ransomware in schoolsppThe Tucson Unified School District and Nantucket Public Schools seem to have little in common Tucson schools with 42000 students is one of the largest districts in Arizona and sits in a bustling urban area Nantucket schools on the other hand enrolls fewer than 2000 students and populates a small island off the coast of MassachusettsppBut in early 2023 just one day apart on Jan 30 and 31 both school systems fell victim to ransomware attacks that disrupted operations leading to school closures in Nantucket and the compromise of personally identifiable data in Tucson ppRansomware where threat actors use malware to block access to network systems and then demand payment to unlock it has been ballooning in the K12 sector over the last seven years according to the K12 Security Information eXchange Known as K12 SIX the national nonprofit helps protect schools from cybersecurity threatsppAn estimated 325 ransomware attacks hit public K12 schools between April 2016 and November 2022 From that date through Oct 3 of this year schools have experienced another some 85 ransomware attacks according to K12 SIX ppAdding to the pain a handful of school districts were hit with ransomware twice between April 2016 and November 2022 according to K12 SIX data ppThe numbers its important to note can shift upon further investigation to determine whether the events were definitely ransomware attacksppBut Roberto Rodriguez assistant secretary for the US Department of Educations Office of Planning Evaluation and Policy Development said an estimated five cybersecurity incidents hit K12 each weekppThe increase in the number of ransomware attacks on K12 from 14 in 2016 to 69 in 2022 according to data from K12 SIXppNot only do these cyberattacks inflict logistical legal and financial damage they also take an emotional and physical toll on school communities say education administrators and technology professionals ppPlus there are national security concerns given that perpetrators are often international criminalsppAt the end of the day were a country that offers a free and public education and when an outside entity and a nationstate actor attacks that theyre not attacking just the school theyre attacking the concept of a free and public education and our approach to how we do things in the US said Amy McLaughlin project director of Cybersecurity and Network and Systems Design Initiatives at Consortium for School Networking or CoSN a professional association for K12 ed tech leadersppOne of the most significant factors putting a target on K12s back is that the sector has rich digital assets but underresourced cybersecurity infrastructures The assets are all in the information names birth dates Social Security numbers student disability status financial details that districts private schools and the third party companies they work with are supposed to protectppYet many districts and public and private schools lack the technology or staffing to stay ahead of criminals and safeguard the sensitive data entrusted to them The K12 education sector like some other industries also has no federal mandatory and uniform cybersecurity standards for identifying and reporting attacksppAt the same time bad actors are always finding new ways to take advantage of vulnerabilities ppAt the end of the day were a country that offers a free and public education and when an outside entity and a nationstate actor attacks that theyre not attacking just the school theyre attacking the concept of a free and public education and our approach to how we do things in the USppAmy McLaughlinppProject director of Cybersecurity and Network and Systems Design Initiatives at CoSNppA concerning development for example is dual and triple extortion ransomware attacks That is when threat groups steal and encrypt data forcing victims to figure out both how to access their data and how to stop it from being released on the dark web or elsewhere Student staff and family data released in this way poses downstream risks for identity theft credit and tax fraud and other nefarious activityppIts as if someone moved into your house locked you out stole your possessions and then demanded payment to turn over the keys said Richard Bowman chief technology officer of New Mexicos Albuquerque Public Schools which experienced a ransomware attack in January 2022ppMcLaughlin adds Theyre out here stealing your data and charging you for it Nationstate adversaries and criminal or terrorist organizations attack education entities to fund their business model she saidppIndeed Doug Levin cofounder and national director of K12 SIX said the attacks are 100 about moneyppA number of characteristics including a lack of robust cybersecurity measures make K12 into attractive prey Levin said Weve been slow to implement common sense protections like multifactor authentication which makes us easier targets compared to other sectors he saidppOther contributors include disjointed response protocols and underresourced cybersecurity staff Twothirds of districts had no fulltime cybersecurity position in 2023 according to CoSN survey data And 12 of districts said they dont dedicate any funds for cybersecurityppA 2024 US Department of Homeland Security threat assessment report said K12 districts have been a near constant ransomware target The federal agency blamed this on budget constraints of school systems IT departments a lack of dedicated resources and cybercriminals success in getting schools to pay ransomsppIn addition districts are simply managing a lot of ed tech these days During the 202324 school year they used 2739 different ed tech tools on average an 8 increase from the previous school year according to a report released earlier this year by Instructure and the companys LearnPlatform which helps districts research and choose digital learning products
People within schools and districts educators students staff are also for the most part trusting caring and optimistic educators and technology experts note Educators often dont assume others are acting with ill intent This attitude is needed to create nurturing school environments but it also can give an advantage to criminals who prey on vulnerable systemsppMore than half 62 of lower education systems worldwide that are victimized by ransomware pay the criminals to recover their hijacked data according to a 2024 report from UKbased cybersecurity firm Sophos The data was based on a survey of 300 lower education IT and cybersecurity leaders in 14 countries ppThe ransom payments averaged 75 million according to the 99 lower education survey participants who had paid demands ppThe average price for restoring data with backup technology excluding ransom payments was 376 million or about the expense of 54 US teaching positions That average cost is more than double the 159 million figure from the companys 2023 surveyppAccording to Comparitech a cybersecurity and online privacy product review website the K12 and higher education sectors lost 126 school days on average in 2023 from ransomware attacks That downtime calculates to 548185 per day or about 123744 school lunches for one dayppThe companies and organizations that collect and report data about K12 cyberattacks do so with a caveat they say the data may be underreported Thats because there is no national mandatory reporting system ppThe new federal Cyber Incident Reporting for Critical Infrastructure Act is expected to change that however when it takes effect sometime in 2026 CIRCIA will require state education agencies and school districts with more than 1000 students to report to the Cybersecurity and Infrastructure Security Agency within 72 hours of a disruptive cyber incident and within 24 hours of making a ransom payment to cybercriminals according to the proposed rule for implementing the provision ppIn addition to financial fallout ransomware can wreak havoc on productivity teaching and learning not to mention the emotional wellbeing of a school community ppI think that the challenge the hardest part and the biggest piece of this is that the disruption can be really significant said McLaughlin For instance if a district has to close schools due to a cyberattack parents have to find child care sports games have to be postponed and state testing has to be rescheduledppOnce a breach is discovered and a ransom demanded district or school response can vary with the circumstances But experts recommend these steps ppThe FBI and CISA as well as the nonprofit MultiState Information Sharing Analysis Center all discourage victims from paying ransoms as theres no guarantee the files will actually be recovered But some education economists and tech experts say making that decision is not so easy as paying the ransom may be less disruptive or less expensive than rebuilding a schools networkppIn some cases districts have kept details of ransomware attacks hidden from the public and even staff An investigative report by the Florida Sun Sentinel found that the 248000student Broward County Public Schools system waited five months to report key information to people impacted by a March 2021 cyberattack In a Nov 29 2021 statement the district said it was offering free credit monitoring to those affected and who requested the serviceppAcross the country some school districts have had to respond to parents demands for answers when personally identifiable information was compromised ppFor instance parents in a class action lawsuit filed Oct 31 2023 allege that negligent andor reckless failure by Nevadas Clark County School District resulted in a ransomware attack that led to the release of sensitive data about teachers students families and former students ppDespite knowing about this breach for almost a month CCSD continues to fail to adequately inform those affected continues to characterize what we understand was and may still be an ongoing breach of its systems as a single incident and continues to portray itself as an innocent victim rather than an accountable governmental body said an undated statement from plaintiff law firm Sklar Williams The case Doe v Clark County School District remains openppLiability is one reason school districts may want to stay silent about an attack But theres another reason too shameppThe topic of ransomware is rarely shared among organizations and is viewed as a scarlet letter or badge of dishonor to technology and security teams said Lacey Gosch assistant superintendent of technology at Judson Independent School District in Live Oak Texas Goschs comment came during testimony on Sept 27 2023 before a US House joint subcommittee hearing on combating ransomware attacksppThe 25900student Judson system fell victim to a ransomware attack on June 17 2021 just a month after Gosch came to the district A full investigation found the data breach affected about 429000 people The district paid a 547000 ransom to ensure the threat actors deleted the stolen data Gosch told the joint subcommittee ppDistrict contractors had to install new cybersecurity software on each of the school systems 4500 devices In the end it took Judson ISD more than a year to fully recover from the breach ppThe mentality that any organization is too small or insignificant to be affected by a cybersecurity breach is living under a false sense of security Gosch said The truth is that cybersecurity events in organizations need to be viewed not as improbable but as absolute The question is not if it will happen but when it will happenppAfter years of victimized school districts suffering from frustration and shame theres been growing momentum at local state and federal levels to fight back through improved prevention recovery and response practices ppPreventive measures like multifactor verification for accessing files are some of the leading defenses Levin said The best thing is to not be a victim right If youre a victim I think youre faced with a series of bad choices at that point he saidppTo safeguard schools districts are investing in cybersecurity insurance and taking advantage of free tools and resources from CISA Earlier this month the White House Office of the National Cyber Director launched an initiative to encourage districts to adopt free protective domain name system services that prevent connections to malicious website domainsppEducation advocacy groups like CoSN and the State Educational Technology Directors Association are also assisting districtsppThe best thing is to not be a victim right If youre a victim I think youre faced with a series of bad choices at that pointppDoug LevinppCofounder and national director of K12 SIXppStates are likewise stepping up to help The Georgia Department of Education for example dedicated nearly 1 million in 2022 to provide every district in the state with licensing for a cybersecurity platform through a contract with the Georgia Technology Authority The platform allows districts to pinpoint their vulnerabilities and provides recommendations for improvements ppAnd CISA along with the federal Education Department created a Government Coordinating Council earlier this year to address hardships districts face in preventing responding and recovering from cyberattacks ppThe council is made up of school administrative organizations representing principals superintendents school business officials special education directors and others ppIt serves as an informationgathering and collaborating body to better understand K12 cybersecurity challenges It is also documenting best practices and brainstorming potential solutions such as a dedicated technical assistance center said the Education Departments Rodriguez ppCongress has not provided the Education Department with a dedicated funding stream for supporting cybersecurity measures in school districts and state education agencies according to RodriguezppWe are hearing from districts around the country urban rural and suburban about the challenges that they face said Rodriguez adding We think that preventative approach is really something that has great potential and we should be doing more with districts across the country especially those districts that dont have more sophisticated infrastructureppCybersecurity Dive Senior Reporter Matt Kapko contributed background reporting and News Graphics Developer Julia Himmel contributed data and graphics support to this storyppKeep up with the story Subscribe to the K12 Dive free daily newsletterppGet the free daily newsletter read by industry expertsppThe free newsletter covering the top industry headlinesp