A Los Angeles school has paid a US$28,000 ransomware after crooks compromised its network. Cyber criminals encrypted computer services, including email systems, at the Los Angeles Community College District. The ransomware used in the attack encrypted hundreds of thousands of files on New Years Eve. This is one of the highest publicly-known ransomware demands to be paid.
The school opted to pay the ransom because it failed to backup its data belonging 1,800 staff and 20,000 students.
“Hackers recently broke into Valley College’s servers seizing file, email and messaging systems and are ransoming them for almost $30,000. The cyber attackers left the college a note on one of its servers’ X-drives, requesting the money to be paid by BitCoin.” reported the campus newspaper The Valley Star.
“You have 7 days to send us the BitCoin after 7 days we will remove your private keys and it’s impossible to recover your files,” said the ransom note that appeared on the college’s servers six days ago.”
The Los Angeles Community College District officially issued an official statement to explain the decision of paying the ransom.
“In consultation with district and college leadership, outside cybersecurity experts and law enforcement, a payment was made by the District.” states the report published by the school. “It was the assessment of our outside cybersecurity experts that making a payment would offer an extremely high probability of restoring access to the affected systems, while failure to pay would virtually guarantee that data would be lost.”
The college confirmed that the investigation is ongoing and that student data was not compromised due to the cyber attack.
“At this early stage of this complex investigation, no data breach has been identified; however, we will continue to communicate with the LAVC community and the public as the investigation proceeds.” reads the report.
Fortunately, after the payment was made by the school, crooks delivered a ‘key’ to allow the college decrypt data.
In March 2016, a ransomware infected systems at the US Hollywood Presbyterian Medical Center in Los Angeles, in that case, the hospital paid about $17,000 to the crooks for restoring patients’ files.
(Security Affairs – Ransomware, Los Angeles Community College District)
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.