DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Highly sensitive files from Berkeley County Schools dumped by ransomware gang

Posted on March 11, 2023 by Dissent

In early February, Berkeley County Schools in West Virginia experienced a ransomware attack.  On March 3, the district issued a notice on its website that stated their investigation determined “some data stored in Berkeley County Schools’ network may have been accessed that included employee Social Security numbers and direct deposit information.”

That notice makes no mention of any student information being involved. The district reports they started mailing letters to affected individuals on March 10, but they do not indicate whether any of those letters are to former or current students or their families. 

On March 10, Vice Society threat actors added Berkeley County Schools to their leak site.

Berkeley County Schools' was added to Vice Society dark web leak site.
Vice Society is the same group that attacked the Los Angeles School District and then dumped highly sensitive student data from that district when the district refused to pay their demanded ransom.

 

Folders in the Berkeley County Schools data leak by Vice Society include PupilServices, SpecialEd, and other student-related files.
Folders in the Berkeley County Schools data leak by Vice Society include PupilServices, SpecialEd, and other student-related files. Image: DataBreaches.net.

Even a cursory inspection of files in their data leak indicates that they acquired and have now leaked a lot of personal and sensitive information on students. Some of the files go back years.

As just one example, the following screencap, redacted by DataBreaches, shows a directory of files for named students who had FBAs and/or BIPs completed for them.

One folder contained completed FBA and BIP forms for named students.

An FBA is a Functional Behavioral Assessment conducted to help school personnel identify what factors contribute to problematic behavior for a  student and what factors might maintain it or mitigate it.  The BIP is the Behavior Intervention Plan that the school develops to then address the problematic behavior. The FBA may contain sensitive information such as the student’s diagnoses, medications, home issues, or other factors.

In addition to files on FBAs/BIPs, DataBreaches also noted files with 504 Accommodation Plans for students with disabilities and other folders with pupils’ emergency contact information for the past decade or so.

There were also disciplinary matters. As one example, DataBreaches noted a letter to a parent in 2013 that informed her that the district was recommending that her son be expelled for one school year.

“I am taking this action for the following reasons,” the administrator wrote, because “On [date redacted by DataBreaches], 2013, [student’s name redacted by DataBreaches] was suspended from school for grabbing a fifth grade, female student in her genital area. He made sexual gestures toward the student, told her he “watches porn” and asked her to come to his house when his parents aren’t home so they could have sex. His previous disciplinary referrals this school year include: insubordination; use of profane language; making obscene gestures; disrupting class; failure to serve detention; battery against a student; disrespectful conduct; indecent act toward a school employee; and indecent act toward a student.”

Not all sensitive information in the leak concerned students, though. DataBreaches spotted one very sensitive harassment and bullying complaint filed by a school employee against two fellow school employees that described in painful detail their alleged physical abuse of a named and reportedly low-functioning disabled student. The report was filed in 2017.

The preceding are just a few examples of data in the leak. Berkeley County Schools needs to provide an accurate and full accounting of what files Vice Society accessed and acquired.  This is much more than just some employee information. Former and current students and their families are also impacted by this breach.

 

 


Related:

  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
  • A business's cyber insurance policy included ransom coverage, but when they needed it, the insurer refused to pay. Why?
  • Before Their Telegram Channel Was Banned Again, ScatteredLAPSUS$Hunters Dropped Files Doxing Government Employees (2)
  • Massachusetts hospitals Heywood, Athol say outage was a cybersecurity incident
  • Data BreachesProsper Data Breach Impacts 17.6 Million Accounts
Category: Education SectorMalwareU.S.

Post navigation

← Data Exfiltration Trends in Healthcare
Weekend update: Non-US hospitals hit by cyberattacks →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.