DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

FBI Private Industry Notification warns schools about TheDarkOverlord

Posted on February 8, 2018 by Dissent

On January 31, 2018, the FBI released a Private Industry Notification (PIN) warning schools about the hacker(s) known as TheDarkOverlord. The information in the PIN was provided by the FBI and the Department of Education’s Office of the Inspector General, and it appears to be an expanded version of a prior alert to schools issued by the Department of Education.

While there was nothing really new in the PIN in terms of the description of the TDO’s methods, some of the numbers in the PIN may surprise members of the public. According to the PIN, TheDarkOverlord (TDO) was responsible for “at least 69 intrusions into schools and other businesses, the attempted sale of over 100 million records containing personally identifiable information (PII), and the release of over 200,000 records including the PII of over 7,000 students due to nonpayment of ransoms.”

Unfortunately, the PIN does not break down the 69 intrusions to indicate exactly how many of them involved schools. Nor do I know whether some recent reports out of Florida universities were the work of TDO or were the work of copycats.  But the reference to the release of the  personally identifiable information (PII) of over 7,000 students sounds like a reference to the Johnston Community School District incident.

But has TDO really attempted to sell “almost 100 million records?” I would love to know what  hacks those 100 million records came from, as we haven’t seen any media or HHS reports with numbers that would come anywhere close to that, and I’m aware of somewhat more than 60 of their hacks. Indeed, I suspect that the FBI’s figure of 69 attacks is a significant underestimate or intentional under-reporting of how many attacks have been the work of TDO.

But thinking about the information in the PIN reminded me of one question that’s puzzled me for quite a while now. I’d love to know why we haven’t read about any victims experiencing concrete harm. With hundreds of thousands of patient records up for sale or 100 million records up for sale, wouldn’t you think that we would have heard about large numbers of patients from Doctor A’s practice or customers or employees of Company B’s business becoming victims of ID theft or fraud?

With all of the hacks TDO has done that have been confirmed, how is it that we have not heard of numerous instances of concrete harm that could be linked to specific hacks? 

Importantly, the PIN incorporates IT best practices** for schools to help protect data assets, and I hope districts act upon those recommendations.

DataBreaches.net does not know what TDO thinks of the PIN or if they have even seen it yet, but I imagine that they would likely be pleased that at least now, the FBI refers to them as “highly trained hackers.”

As it has done in other PINs, the FBI notes that it does not recommend paying ransom, but understands that entities will evaluate all options to protect their organizations and those they serve.

Of note, the FBI claims that TDO’s prior threats of violence directed at schools and parents did not result in any financial gain for the hackers. Even if that were true, the fact that schools in Montana were closed for days and people were terrorized means that there was huge cost to the victims on multiple levels – a cost or impact that TDO could try to use for leverage in dealing with future victims. Unless school districts decide to remain open despite threats of bombs or violence, TDO has an interesting model:  pay us or we’ll close you down by scaring parents and students or exposing the students’ sensitive counseling and health records.  If their extortion demands are low enough, some school districts might decide it makes sense to just pay them and hope that then they will not have to deal with school closings, having to make up days, losing state aid, worried parents, or fragile or vulnerable students having their most sensitive information exposed publicly.

TDO has been publicly quiet since early November, but that does not mean that they are not active, and I have reason to believe that they are around but just not poking their head up publicly for now.  Stay tuned, I guess…..


**Note: Normally, this site would not link to a PIN that was marked “TLP:Amber,” but it was made freely and publicly available online not only by PublicIntelligence.net, but by the U.S. Education Department as well.  The US Education Department subsequently restricted access to the file. 


Related:

  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
  • How a hacking gang held Italy’s political elites to ransom
  • Uncovering Qilin attack methods exposed through multiple cases
  • Predatory Sparrow Strikes: Coordinated Cyberattacks Seek to Cripple Iran's Critical Infrastructure
  • Ex-CISA head thinks AI might fix code so fast we won't need security teams
  • NY: Gloversville hit by ransomware attack, paid ransom
Category: Commentaries and AnalysesEducation SectorHackOf NoteU.S.

Post navigation

← Shoot the messenger, Thursday edition: Botched ICO leaks users’ passport data, calls police on guy who found the bug
Accident recovery firm employee who sold personal data to nuisance callers is fined →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.