Ransomware victim disclosure
← All victimsEastside Union School District
Claimed by Karakurt · listed 3 years ago
Status timeline
- Listed
Jun 21, 2023
- Data leaked
At a glance
- Group
- Karakurt
- Status
- Data leaked
- Country
- United States
- Sector
- Education
- Listed on leak site
- Jun 21, 2023
- Data size
- 18 GB
About the victim
AI dossier — public-source company profileEastside Union School District is a public K-12 school district located in Lancaster, California. It serves students in the Antelope Valley area, operating multiple elementary and middle schools with a mission to provide inclusive, challenging, and innovative education in a safe learning environment.
- Industry
- K-12 Public Education
- Address
- 2626 Avalon Ave, Lancaster, CA 93535, United States
- Employees
- 201-500
- Founded
- 1960
Attack summary
Severity: critical — Exfiltration of personal information from a K-12 school district constitutes regulated data exposure (FERPA-protected student records, potential minor PII at scale), and the data has been marked as published, making this a critical disclosure.Karakurt claims to have exfiltrated approximately 18 GB of data from Eastside Union School District, including accounting records and personal information, with full publication of the stolen data described as forthcoming.
Data the group says was taken
AI dossier — extracted from the leak post- Accounting records
- Personal information (PII)
- Student/staff records (implied)
What the group claims
Eastside Union School District seeks to provide an inclusive, challenging and innovative education in a safe, positive and rigorous learning environment with dynamic and responsive staff. The size of files we've taken - 18Gb. Accounting, personal information and so on. Everything will be uploaded during upcoming release.
Sources
- Victim siteeusd.org
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
