Ransomware Hits Baltimore County Schools Thanksgiving Eve

Baltimore County Public School students returned to class via remote instruction, while the district continued dealing with a ransomware attack that struck the day before Thanksgiving. Students lost two full days of instruction after the malware hit the district's website, email and learning system and forced school offices to close early on Wednesday. The district serves 115,000 students.

According to local reporting, school officials learned about the malware on Wednesday morning, after it was discovered late Tuesday night. On Nov. 25, the district used its social media channels to confirm the security event. "We were the victim of a Ransomeware [sic] attack that caused systemic interruption to network information systems," officials stated on Twitter. "Our BCPS technology team is working to address the situation & we will continue to provide updates as available. For now, please don't use BCPS device."

The school system announced that district-issued Chromebooks and Google accounts were safe to use, but Windows-based devices weren't. By Monday, the district had provided a website page listing "steps to perform a confidence check" on Windows computing devices. Users with infected machines--both students and staff--were told to hand in their school devices and get replacements. The school also provided a link to a video showing how to restore users' OneDrives to a previous state from a week earlier.

Just days before the attack was discovered, the state had issued a financial audit finding that the computer network for the school system failed to safeguard sensitive personal information and posed other serious risks. As the audit stated, "Significant risks existed within BCPS' computer network. For example, monitoring of security activities over critical systems was not sufficient and its computer network was not properly secured. In this regard, publicly accessible servers were located in the BCPS internal network rather than being isolated in a separate protected network zone to minimize security risks." The audit found that 26 "publicly accessible" servers were located within the internal network and that "network resources were not secured against improper access from students using wireless connections and high school computer labs."

However, a cybersecurity expert reported that the school system had been aware since February of security problems in its internal network and firewall configurations. "I personally informed the school system of an exposed domain controller running SMB v1 in May 2019, which was one of dozens of servers that appeared to be running that vulnerable version of the Windows network file sharing protocol," said Sean Gallagher, senior threat researcher at Sophos, in a statement. "A county spokesperson said that he would pass the information along to the IT department, but I never heard back from them."

A teacher whose own machine was infected told a local reporter that people who infect school systems with ransomware during COVID "should really have their own level of hell devoted to them."

Gallagher suggested that K-12 school systems were especially vulnerable currently to ransomware "because of budget and talent constraints to their IT operations." As the security expert noted, "The stress of having to support remote learning for students and faculty since March has not made things any easier, and has dramatically increased the attack surface of most schools' networks. It will require thoughtful restructuring of how districts' networks are configured to prevent further attacks such as these, and a defense-in-depth approach that includes every device students and teachers connect to the network with."

District officials haven't stated whether they intend to pay the ransom. However, they have been in contact with local and federal law enforcement, as well as the state's emergency management agency, for help with the criminal investigation.

About the Author

Dian Schaffhauser is a former senior contributing editor for 1105 Media's education publications THE Journal, Campus Technology and Spaces4Learning.

Featured

  • close-up of a video game controller

    Verizon Launches Free Scholastic High School Esports League

    Through its Verizon Innovative Learning HQ suite of free learning content and resources, Verizon has launched its first-ever scholastic high school esports league. The league opened for registration on Aug. 8 and will run from Sept. 23 to Dec. 13.

  • illustration of a VPN network with interconnected nodes and lines forming a minimalist network structure

    Report Finds Increasing Number of Vulnerabilities in OpenVPN

    OpenVPN, an open source virtual private network (VPN) system integrated into millions of routers, firmware, PCs, mobile devices and other smart devices, is leaving users open to a growing list of threats, according to a recent report from Microsoft.

  • AI-inspired background pattern with geometric shapes and fine lines in muted blue and gray on a dark background

    IBM Introduces Granite 3.0 Family of Advanced AI Models

    IBM unveiled its most advanced family of AI models to date, Granite 3.0, at its annual TechXchange event. The new models were developed to provide a combination of performance, flexibility, and autonomy that outperforms or matches similarly sized models from leading providers on a range of benchmarks.

  • Abstract illustration of a human news reporter interviewing an AI with a microphone

    AI on AI in Education: A Dialogue

    Scholars are doing lots of asking and predicting about the risks and rewards of generative artificial intelligence in school, but has anyone asked the all-knowing chatbots?