Efani<p>🚨 A February ransomware attack on Baltimore City Public Schools has now been confirmed to have compromised sensitive data belonging to over 25,000 individuals — including teachers, staff, contractors, and students.</p><p>On Tuesday, the district issued a public breach notification revealing that:<br>- The ransomware attack occurred on February 13, 2025<br>- Sensitive documents were stolen, including I-9 records and background checks <br>- Impacted data includes Social Security numbers, driver’s licenses, passport info, and even student call logs and attendance records<br>- 55% of all school employees were reportedly affected <br>- Over 1,150 students — roughly 1.5% of the district's enrollment — had personal information accessed </p><p>While no ransom was paid, reports suggest the Cloak ransomware gang may be behind the attack. So far, no group has taken credit publicly.</p><p>Additional context:<br>- Law enforcement was notified <br>- Cybersecurity firms were brought in for investigation and recovery <br>- The school district is now offering two years of credit monitoring to impacted individuals <br>- Affected parties are receiving breach notification letters this week </p><p>In a positive step, the district has rolled out new cybersecurity enhancements:<br>- Endpoint Detection and Response (EDR) software <br>- District-wide password resets <br>- Continued forensic investigation </p><p>Baltimore has been no stranger to cyberattacks:<br>- A 2020 school system breach cost more than $10 million <br>- A 2019 ransomware attack disrupted city-wide operations </p><p>And Baltimore’s not alone — experts have already recorded 75 ransomware attacks on U.S. K-12 schools and colleges in 2025, one of the highest numbers ever tracked.</p><p>At <span class="h-card" translate="no"><a href="https://infosec.exchange/@Efani" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Efani</span></a></span>, we believe that the education sector — often underfunded and digitally vulnerable — is now squarely in the crosshairs. Schools don’t just need backups. They need active defense, endpoint visibility, and employee training that starts at onboarding.</p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/Ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ransomware</span></a> <a href="https://infosec.exchange/tags/EducationSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EducationSecurity</span></a> <a href="https://infosec.exchange/tags/DataBreach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataBreach</span></a> <a href="https://infosec.exchange/tags/K12CyberRisk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>K12CyberRisk</span></a> <a href="https://infosec.exchange/tags/EfaniSecure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EfaniSecure</span></a> <a href="https://infosec.exchange/tags/BaltimoreCyberattack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BaltimoreCyberattack</span></a></p>