Wednesday, February 26, 2025
HomeRansomwareU.S Public School Pays $10,000 to Hackers For Ransomware Attack and Waiting...

U.S Public School Pays $10,000 to Hackers For Ransomware Attack and Waiting for Unlock the Files

Published on

SIEM as a Service

Follow Us on Google News

Hackers infiltrated Massachusetts school district Leominster school computer system earlier this month and locked down the computer system asking for $10,000 ransom to be paid.

The school paid ransom to unlock computer system from Ransomware Attack on April 20 and systems not yet fully restored.

Police Chief Michael Goldman said the school system is lockdown and there is no ongoing criminal investigation. Goldman told WBZ-TV “It’s something likely to come from out of the country, we can’t trace it”.

The attack took place on April 14 and the district’s computer systems were completely lockdown impacting administrators, faculty, and students, according to a statement from Interim Superintendent of Schools Paula Deacon.

The school systems email also completely down, teachers and employees are using Gmail as a backup communication channel.

Goldman says that he recommended district school to pay the ransomware and there be some negotiations between hackers and the school.

Once the school agreed to pay ransom the attackers sent keys to decrypt certain files as a proof that they can decrypt files.

Deacon said in an Email to parents, “due to sophisticated hacking attack our email systems are down and we are well on our way to having access to our email and other systems restored.”

Leominster, School superintendent reveals that “the lock was placed on our system until a negotiated ransom was agreed upon. We paid through a bitcoin system and are now waiting to be fully restored.”

The police chief said the attacks are untraceable, undetectable due to the number of virtual private networks and fake accounts. He said the attackers have not extracted any data from the school systems.

Also Read:  Indian Hackers Group Hacked & Encrypt Pakistan Website Files Using KCW Ransomware

Ransomware attacks become a turnkey business for some criminals and the cost of Ransomware attacks Crossed more than $1Billion in a single year alone.

Business should have a considerable Ransomware Checklist to respond with Ransomware attack and for mitigations.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Google Issues Warning on Phishing Campaigns Targeting Higher Education Institutions

Google, in collaboration with its Mandiant Threat Intelligence team, has issued a warning about...

TgToxic Android Malware Updated it’s Features to Steal Login Credentials

The TgToxic Android malware, initially discovered in July 2022, has undergone significant updates, enhancing...

Hackers Exploiting Cisco Small Business Routers RCE Vulnerability Deploying Webshell

A critical remote code execution (RCE) vulnerability, CVE-2023-20118, affecting Cisco Small Business Routers, has...

Malicious npm Package Targets Developers for Supply Chain Attack

The Socket Research Team has uncovered a malicious npm package@ton-wallet/create designed to steal sensitive...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

LockBit Ransomware Strikes: Exploiting a Confluence Vulnerability

In a swift and highly coordinated attack, LockBit ransomware operators exploited a critical remote...

CL0P Ransomware Launches Large-Scale Attacks on Telecom and Healthcare Sectors

The notorious CL0P ransomware group has intensified its operations in early 2025, targeting critical...

Ransomware Trends 2025 – What’s new

As of February 2025, ransomware remains a formidable cyber threat, evolving in complexity and...