DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Minneapolis Public Schools systems restored, no ransom paid

Posted on March 2, 2023 by Dissent

Jeremiah Jacobsen has an update to the “encryption event” previously disclosed by Minneapolis Public Schools (MPS).

[Note: MPS’s phrase “encryption event” appeared to be a ridiculous — and dare we say, sleazy–  attempt not to call it a “ransomware attack.” The district still has not described it as ransomware attack.]

Minneapolis Public Schools released a new statement Wednesday. According to the new statement, the district was able to “restore the MPS environment using internal backups.”  MPS did not pay a ransom. MPS’s statement does not claim that no ransom had been demanded, however.

Of note:

However, KARE 11 also obtained a slightly different version of the statement that appeared to be sent as a letter to staff and families, cautioning them not to pay a ransom, and that “the threat actors may contact employees or staff in an attempt to coerce MPS to pay a ransom.”

So it was a ransomware incident and the district just played word games — or tried to.

KARE11 also reports:

District officials said the investigation so far “has not found any evidence that any data accessed has been used to commit fraud,” but MPS will continue to work with law enforcement as authorities investigate.

No evidence of fraud? But given that they have apparently refused to pay ransom and publicly indicated their refusal to pay, shouldn’t staff and parents expect to see data dumped or sold on the dark web? Or maybe it won’t be seen publicly but will be sold or traded privately?

Yesterday, the following tweet was posted on Twitter by @jjake61:

Current staff, former staff and retirees now reporting problems with being locked out of bank accounts and fraudulent bank and credit card charges. Why is @MPS_News not being forthcoming with what actually happened? We are clearly victims of a cyber crime so why be in CYA mode?

— jjake61 (@jjake61) March 1, 2023

DataBreaches was unable to find any confirmation or other sources on this claim, but this incident does not appear to be over. The incident is not currently listed on any dark web leak site checked by DataBreaches, but this post will be updated as more information becomes available.

In the meantime: those who believe they may be affected by the incident might do well to place security freezes on their credit reports. That will make it harder for criminals to open up new accounts using your information if the new account would require a credit check.  This would also be a good time to perhaps create new and stronger passwords for banking and other important accounts and also employ multifactor authentication that does not use your phone as the second factor.


Related:

  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
  • John Bolton Indictment Provides Interesting Details About Hack of His AOL Account and Extortion Attempt
  • A business's cyber insurance policy included ransom coverage, but when they needed it, the insurer refused to pay. Why?
  • Before Their Telegram Channel Was Banned Again, ScatteredLAPSUS$Hunters Dropped Files Doxing Government Employees (2)
  • Scenes from a "No Kings" Protest, 10-18-25
  • No Kings. Not Today. Not Ever.
Category: Breach IncidentsCommentaries and AnalysesEducation SectorMalwareU.S.

Post navigation

← Za: Businessman convicted of Experian data breach skips sentencing, court issues warrant for his arrest
CISA Advisory: Royal Ransomware →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.