DataBreaches.net

DataBreaches.net

The Office of Inadequate Security

Menu
  • Breach Laws
  • About
  • Donate
  • Contact
  • Privacy
  • Transparency Reports
Menu

Update: Wawasee Community School Corporation victim of BlackCat attack

Posted on February 16, 2023 by Dissent

The Wawasee Community School Corporation in Indiana was reportedly the victim of a cyberattack by BlackCat. The threat actors have now leaked what they claim are 9.78 GB of files on their leak site because Wawasee did not pay their demands.  Perhaps luckily for Wawasee, the download link is not working at this time.

There does not seem to be any notice of any data leak on Wawasee’s website, but the district had previously alerted parents and employees in January that it was investigating a possible ransomware attack.  By January 23, media reported:

As they continued investigation, they confirmed that the corporation had been subject to a ransomware attack that impacted all of their windows-based computers, servers, and other technology systems.

This caused significant disruption to daily operations but the teachers, staff and students were great as they have adapted to the challenging circumstances.

At this time, they do not believe student and employee information and data systems are impacted as they are not located on local servers.

BlackCat did not make any claims as to what types of data or information are in the stolen files. If the files are ever available, we may find out if there is any personal information on personnel or students.

Related Posts:

  • IN: Wawasee Hit With Ransomware
  • IL: Morrison Community Hospital patient data leaked…
  • Update on Plainedge School District ransomware attack
  • Ie: MTU obtains temporary emergency injunction…
  • Parents, students are baffled by letters confirming…

Post navigation

← Crypto giant Binance moved $400 million from U.S. partner to firm managed by CEO Zhao
MKS Instruments’ breach notification includes a surprising statement to reassure those affected →

Sponsored or Paid Posts

This site doesn’t accept sponsored posts and doesn’t respond to requests about them.

Have a News Tip?

Email:

Breaches[at]Protonmail.ch
Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Telegram: @DissentDoe

Browse by News Section

Latest Posts

  • Update: Cardiovascular Consultants Ltd. ransomware attack reportedly affected 500,000 patients, guarantors, and staff
  • Data breach by Addenbrooke’s Hospital reveals patient information
  • Millions of patient scans and health records spilling online thanks to decades-old protocol bug
  • Cybersecurity: Federal Agencies Made Progress, but Need to Fully Implement Incident Response Requirements (GAO Report)
  • Hackers Exploited ColdFusion Vulnerability to Breach Federal Agency Servers
  • CBIZ KA Notice of Data Privacy Incident (Prime Healthcare)
  • Seeking clarification on Maine’s data breach notification statute
  • East River Medical Imaging notifies 605,809 patients of breach

Please Donate

If you can, please donate XMR to our Monero wallet because the entities whose breaches we expose are definitely not supporting our work and are generally trying to chill our speech!

Donate- Scan QR Code   Donate!

Social Media

Find me on Infosec.Exchange.

I am also on Telegram @DissentDoe.

RSS

Grab the RSS Feed

Copyright

© 2009 – 2023, DataBreaches.net and DataBreaches LLC. All rights reserved.

HIGH PRAISE, INDEED!

“You translate “Nerd” into understandable “English” — Victor Gevers of GDI Foundation, talking about DataBreaches.net

©2023 DataBreaches.net