Texas School’s Suffer a Major Data Breach

  • By Dawna M. Roberts
  • Published: Oct 28, 2021
  • Last Updated: Mar 18, 2022

Some hacker gangs employ a moral code and avoid attacking certain types of businesses. One of those is schools and educational organizations. However, other gangs or individual operators do not follow any moral code, and one of them recently hit the largest school district in Texas with a major data breach.

What is Going On?

The data breach was announced last Friday, and the incident occurred on August 8th. An unknown and unauthorized individual breached the Dallas Independent School District (ISD) and accessed records for students, employees, parents, and alumni of more than 145,000 students spread across 230 schools served by 22,000 employees. It is the most significant data breach in the region and covered the past eleven years of records.

In its notice to the public, the school district noted that,

“An unauthorized third party accessed our network, downloaded data, and temporarily stored it on an encrypted cloud storage site. The data has since been removed from the site.”
“To date, our cybersecurity experts have found no evidence indicating the data was otherwise accessed, disseminated, or sold. However, we cannot be 100% sure until our ongoing investigation is complete.”

 

What Data Was Stolen?

The question on everyone’s mind is what data did the hacker steal, and could it result in identity theft or fraud? According to InfoSecurity Magazine, the data breach included “full names, addresses, phone, and social security numbers, dates of birth and employment and salary info for current and former employees and contractors.”

Additionally, “For current and former students, it includes full names, social security numbers, dates of birth, parent and guardian info and grades. According to the alert, some students’ custody status and medical conditions may also have been exposed.”

Data Breach at Texas School

Should Victims Worry About Identity Theft?

Absolutely. Anytime personal school records are exposed, they contain specific information that skilled scammers could easily use to steal identities and commit all types of fraud. Anyone caught in this data breach should take advantage of credit and identity theft monitoring services provided. They should also:

  • Keep a close eye on their credit report.
  • Watch their bank and credit card statements for suspicious activity.
  • Watch out for phishing emails and scam calls.
  • Never click links in an email or download attachments.
  • Always use super strong passwords on all accounts and never reuse them.

Did the School District Handle Things?

The school district is offering all victims a full year of free credit monitoring and ID theft recovery services. In addition, they have been working closely with law enforcement and private forensic investigators to research the attack to determine what the goal was.

The Dallas ISD said,

“We confirmed that the unauthorized third party removed the data from the encrypted cloud storage site and has informed us the data was not disseminated or sold to anyone.”

 

Although how the breach occurred has not yet been determined, the Dallas ISD’s IT department is working closely with investigators and has fixed “specific vulnerabilities that were exploited during this event.” In addition, they continue to enhance their network and further secure their systems with protections to avoid any additional attacks.

The Dallas ISD reassured victims that,

“The confidentiality, privacy, and security of information in our care is one our highest priorities. We take this matter very seriously and have invested significant resources to protect sensitive data. Despite our efforts, the district is now one of a growing number of public and private organizations experiencing cyberattacks.”

 

The school district urges anyone with questions to reach out to them via phone or email.

About the Author
IDStrong Logo

Related Articles

Instagram Vulnerability Allowed Hackers Access to Control Your Phone

Security experts Check Point Research discovered a critical vulnerability while examining Instagra ... Read More

Alien Malware Infects More than 226 Mobile Apps and Steals Bank Data

As reported on September 24, 2020, by ZDNet and ThreatPost, a new strain of malware named “A ... Read More

Universal Health Systems Hit by Ransomware Attack

Universal Health Systems (UHS), a Fortune 500 company owning more than 400 hospitals across the co ... Read More

Exchange Server Bug Exposes a Big Risk to Hackers

Months after Microsoft released a patch to fix a serious flaw in MS Exchange Server, more than 61% ... Read More

Clients’ Bank Data Exposed in Blackbaud Ransomware Attack

Blackbaud software was victim to a ransomware attack last May, and new information suggests that c ... Read More

Latest Articles

What is Single Sign-On: The Benefits and Importance of Implementing SSO

What is Single Sign-On: The Benefits and Importance of Implementing SSO

Every day, more people get online - most do it for leisure, but organizations are increasingly moving into the digital environment.

Personal vs Sensitive Personal Information (SPI): What’s the Difference

Personal vs Sensitive Personal Information (SPI): What’s the Difference

What is there to know about a person? Certainly, their name, but how about their affiliations, philosophical beliefs, or sexual orientation?

What Is An On-Path Attack and How Does It Work? 

What Is An On-Path Attack and How Does It Work? 

Suppose someone left their home, got in their car, and drove to the grocery store. Much like data packets that travel over Internet highways, the car will use various pathways to reach its destination; however, once the car gets to the store, a question remains: what happened between the generating point and the destination?

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Free Identity Exposure Scan
Instantly and Securely Check if Your Personal Information is Exposed on the Dark Web or Sold by Data Brokers
Please enter first name
Please enter last name
Please select a state
Close
Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close