Ransomware and other cyberattacks on K-12 schools have increased, especially as districts lean further into technology use for teaching and learning, and as cybercriminals get more sophisticated.
Since the 2022-23 school year began, a handful of school districts have been hit with cyberattacks. Most recently, the nation鈥檚 second-largest school district, Los Angeles Unified, was targeted by a ransomware attack over the Labor Day weekend.
In a ransomware attack, cybercriminals break into a district or school鈥檚 network and take data and encrypt it, preventing the district from accessing the data. Attackers will decrypt and return the data if the district or its insurance company pays a ransom. Attackers typically threaten to release student and employee data to the public if they aren鈥檛 paid.
Guidance from the FBI and the Cybersecurity and Infrastructure Security Agency discourages paying the ransom because it doesn鈥檛 guarantee that the data will be decrypted or that the systems will no longer be compromised. Paying the cyber criminals also encourages hackers to target more victims.
[If a lot of sensitive information has been stolen,] it becomes a much different risk calculation for superintendents and for school boards.
Every district has its own unique risk calculations
Despite the guidance from the two federal agencies, the question of whether or not to pay ransom does not always have a simple answer.
鈥淚 would be hesitant to judge any school district harshly for whatever decisions they make鈥攚hether to pay or not to pay鈥攁fter they鈥檝e become a victim,鈥 particularly in cases where districts have been locked out of all their systems and large amounts of data have been stolen, said Doug Levin, the national director of the K12 Security Information Exchange, a nonprofit focused on helping K-12 schools prevent cyberattacks.
If a lot of sensitive information has been stolen, 鈥渋t becomes a much different risk calculation for superintendents and for school boards,鈥 Levin said.
District officials have to weigh the risks of paying an extortion demand against the potential to restore operations and keep sensitive information from being publicly disclosed, Levin added.
Don Ringelestein, the chief technology officer for Maine Township High School District 207 in Illinois and a board member for the Consortium for School Networking, agreed that the decision to pay or not to pay a ransom 鈥渄epends on each district鈥檚 situation.鈥
Ringelestein said his district, so far, has not been the victim of a successful ransomware attack.
The first thing district leaders should find out is what data the hackers are holding for ransom, said Ringelestein. If it鈥檚 something that isn鈥檛 sensitive or critical, it鈥檚 most likely not worth paying the ransom.
If the hackers have infiltrated the student information system, the finance system, or other critical systems, then the next thing district leaders need to figure out is whether they have 鈥渋mmutable backups,鈥 Ringelestein said. An immutable backup means the stored data is fixed, unchangeable, and can鈥檛 be deleted. If there are immutable backups, then the district would just need to restore the data and 鈥渒eep a very close eye鈥 on the system to ensure the hackers aren鈥檛 still in the systems.
If the district doesn鈥檛 have those backups, then district officials, along with their cybersecurity insurance company and/or law enforcement, might need to negotiate to get the data and the affected systems restored.
鈥淚n some cases, you might have to [pay the ransom], but then you better make sure you put controls in place [so] that the same actor doesn鈥檛 come back and do it again,鈥 Ringelestein said.
In the Los Angeles schools case, the hackers leaked the data they had on Oct. 1 after Superintendent Alberto Carvalho said he wouldn鈥檛 negotiate with or pay ransom to the cybercriminals. After analyzing the leaked data, the district found there was 鈥渘o evidence of widespread impact as far as truly sensitive, confidential information,鈥 Carvalho said in an Oct. 3 press briefing.
The school district鈥檚 technicians were able to stop the attack while it was in progress, which limited the damage to the district鈥檚 systems and data, Carvalho said.
Most districts have insufficient cybersecurity resources
Not all school districts have the cybersecurity resources that Los Angeles Unified does, though.
In recent years, a few districts, such as in Iowa and in Texas, have had to pay ransom fees in order to get their data and systems back because they didn鈥檛 stop the attack in time or because rebuilding their systems would be more expensive. There isn鈥檛 any concrete data on how many districts have paid ransom because they usually don鈥檛 disclose that information, according to Levin.
鈥淢ost districts don鈥檛 have somebody who鈥檚 in charge of cybersecurity, or they do but it鈥檚 another duty as assigned,鈥 Ringelestein said.
鈥淭he job market works against us in education. It鈥檚 hard for us to get that kind of talent,鈥 he added. 鈥淚f a chief information security officer can make $250,000 in the private sector, nobody in education is going to pay that.鈥
One solution for the staffing issue could be neighboring districts sharing a chief information security officer or hiring a managed service provider to be in charge of a security operations center, Ringelestein said.
鈥淕iven our funding situation, given our ability to hire and our staffing situation, I think that鈥檚 the way to go,鈥 he said.
Even though cybersecurity is a top priority for state ed-tech leaders, it is one of the top three unmet technology needs, according to a State Educational Technology Directors Association report. Only 8 percent of respondents to a survey said their state provides 鈥渁mple鈥 funding for cybersecurity risk mitigation efforts; 40 percent said their state allocates 鈥渧ery little鈥 funding.
鈥淭he best advice for school districts is to avoid being a victim of ransomware in the first place,鈥 Levin said.
Some ways to stop cyberattacks include:
- Doing a risk assessment to figure out where your vulnerabilities are;
- Having a cybersecurity plan that the district practices regularly;
- Training employees and students on common tactics hackers use;
- Backing up data regularly and making sure it鈥檚 separate from the main network;
- and putting in place multifactor authentication systems.