March 4, 2021

Volume XI, Number 63

Advertisement

March 04, 2021

Subscribe to Latest Legal News and Analysis

March 03, 2021

Subscribe to Latest Legal News and Analysis

March 02, 2021

Subscribe to Latest Legal News and Analysis

Ransomware Attack On Nevada School District Highlights Newest Hacker Targets

Highlights

  • A Las Vegas, Nevada, school district, serving over 320,000 students, has become the victim of the largest ransomware attack against an educational institution since the COVID-19 pandemic began

  • The pandemic has opened new opportunities for cybercriminals and attacks are expected to continue to increase in frequency and severity

  • Strong proactive steps should be considered, which can provide an advanced and effective defense

On Sept. 28, 2020, personal student information – including grades, Social Security numbers, and other private information – from the Clark County School District in Las Vegas, Nevada, the nation’s fifth largest public school district, was released online by hackers. The school district serves over 320,000 students. 

The information had previously been hacked and stolen, and when the school district refused to pay a ransom, the hackers published the information.

Recently, ransomers have been using the threat of publishing the files as an incentive to extract the demanded ransom. The amount of ransom demanded has been increasing markedly over the past year as hackers have been emboldened by their success.

According to a Sept. 28 Wall Street Journal article, Clark County is the largest school district to be hit with ransomware since the pandemic began, however, it is not the first. Since 2016, cyberattacks on school districts have been steadily rising in frequency and severity. According to the K-12 Cybersecurity Resource Center, as of fall 2020, over 1,000 cybersecurity incidents have occurred since 2016, and that number is expected to continue to climb. 

According to a notice posted on the Clark County School District’s website, its computer systems were infected on Aug. 27 with ransomware, locking up the infected files and rendering them inaccessible unless money was paid to the ransomer. 

With the majority of school districts across the country adapting to some form of distance education, there is an even greater strain on schools’ already limited technical resources,  making them more vulnerable than ever. Recognizing this vulnerability, the FBI issued a warning to all K-12 schools regarding the expected increase in ransomware attacks during the coming months, saying that “cyber actors are likely to increase targeting of K-12 schools during the COVID-19 pandemic,” and urging school districts to take extra precautions to secure their networks. 

The potentially devastating effects of a ransomware attack make it clear that the best defense is a strong offense. Since ransomware infections are often the result of personnel inadvertently opening an attachment or a link in an email that deploys the ransomware, organizations should consider taking the following actions to help prevent and prepare for such an incident:

  1. Increase Frequency of Data Backups: A critical component to averting disaster in the event of a ransomware attack is to back up essential data offsite or offline frequently, particularly of data that changes daily. Being able to quickly restore the majority of locked up data is the most important factor in determining whether to pay a ransom.

  2. Increase Employee Training: Train personnel more frequently on recognizing bad emails. As noted, the most frequent cause of successful cyberattacks is untrained personnel inadvertently clicking on a bad link or infected file in an email.

  3. Incident Response Plan: If your school or organization does not already have an incident response plan, one should be put in place as soon as possible. It is a best practice to include procedures on who, how and when personnel should report an incident, and what should be done in response. It is also a best practice to have someone heading the response team who is experienced in responding to breaches, especially ransomware attacks. 

  4. Implement Multi-Factor Authentication: Implement multi-factor authentication (MFA) processes to help protect account access.

  5. Password Strengthening: Require strong passwords with regular change intervals. Do not use the same password for multiple accounts or common names or sequences in passwords. A suggested best practice would be to use a passphrase, which is longer and more difficult to break.

  6. Vulnerability Patching: An organization should consider applying software patches and updates as soon as possible. Hackers often exploit known vulnerabilities because organizations often do not install the patch promptly. 

  7. Penetration Testing: If your school or organization has the capabilities internally or through an experienced forensics consulting firm, attempt to breach the security of your organization’s systems to identify vulnerabilities. Also, ensure that regular scans of your systems are done.

  8. Insurance Coverage: As a best practice, review insurance policies to make sure there is coverage for ransomware events and that policy limits are sufficient based on your needs.

    Advertisement
© 2020 BARNES & THORNBURG LLPNational Law Review, Volume X, Number 276
Advertisement
Advertisement

TRENDING LEGAL ANALYSIS

Advertisement
Advertisement

About this Author

Jason Bernstein Data Security & Privacy Attorney
Partner

A co-chair of the firm’s Data Security and Privacy practice, Jason Bernstein is a business adviser who helps clients develop, manage, protect and leverage their IP assets and valuable data. By offering real depth in a multitude of disciplines and industries, Jason is appreciated for his proven business acumen and creative problem-solving ability.

Inventions, innovations and information, particularly information security and privacy matters, are at the core of Jason’s practice. With more than three decades of experience, Jason advises on strategic planning for and the protection of...

404-264-4040
Todd Vare IP lawyer Barnes Thornburg
Partner

Todd G. Vare is a partner resident in the Indianapolis office of Barnes & Thornburg LLP. Mr. Vare represents clients in the protection and enforcement of intellectual property rights in trial and appellate courts around the country, and was listed in the 2012 edition of Best Lawyers in America.

Mr. Vare has litigated patent disputes covering a wide variety of technologies, including herbicides/pesticides, dielectric fluids, genetics, pharmaceuticals, medical devices, telecommunications, microprocessor and integrated circuit designs, software programs...

317-231-7735
Brian J. McGinnis, Barnes Thornburg Law Firm, Indianapolis, Intellectual Property Law Attorney
Partner

Brian J. McGinnis is an attorney with Barnes & Thornburg LLP where he is a member of the firm's Intellectual Property Department and the Internet and Technology and the Data Security and Privacy practice groups. He is resident in the firm’s Indianapolis office.

Brian's practice is focused at the intersection of the law and technology. He has developed a national practice advising clients ranging from multinational corporations to startups on the broad range of legal matters pertaining to technology, intellectual property protection and...

317-231-6437
Mario Arango Intellectual Property Attorney Barnes & Thornburg Indianapolis, IN
Staff Attorney

Mario Arango is passionate about helping clients understand the law and how to best protect their intellectual property endeavors – whatever they may be. To that end, he represents and advises clients in the entertainment and technology industries on issues including, but not limited to, IP, cybersecurity, privacy, and right of publicity.

Taking a client-centric approach, Mario has experience helping a variety of clients, including world-class musicians, composers, authors, directors, and documentarians, as well as large public entities, in securing and protecting trademarks,...

317-229-3149
Advertisement
Advertisement