Security News > 2020 > December > Online Learning Company K12 Paying Ransom Following Ransomware Attack

Online learning solutions provider K12 Inc., which recently announced changing its name to Stride Inc., said on Monday that it had decided to pay a ransom to cybercriminals who managed to breach its systems and deploy a piece of ransomware.
The attackers deployed a piece of ransomware and accessed information stored on some corporate back-office systems.
Stride pointed out that the attack did not disrupt its learning management system, nor any major corporate systems - it claimed accounting, payroll, procurement, enrollment and shipping systems remained operational.
"We carry insurance, including cyber insurance, which we believe to be commensurate with our size and the nature of our operations. We have already worked with our cyber insurance provider to make a payment to the ransomware attacker, as a proactive and preventive step to ensure that the information obtained by the attacker from our systems will not be released on the Internet or otherwise disclosed," Stride said on Monday.
It's currently unclear what type of ransomware was used in the attack and how much the company is paying to the cybercriminals.
News URL
Related news
- US indicts 8Base ransomware operators for Phobos encryption attacks (source)
- RA World Ransomware Attack in South Asia Links to Chinese Espionage Toolset (source)
- Chinese espionage tools deployed in RA World ransomware attack (source)
- Lee Enterprises newspaper disruptions caused by ransomware attack (source)
- Black Basta ransomware gang's internal chat logs leak online (source)
- Southern Water says Black Basta ransomware attack cost £4.5M in expenses (source)
- Qilin ransomware claims attack at Lee Enterprises, leaks stolen data (source)
- Ransomware gangs exploit Paragon Partition Manager bug in BYOVD attacks (source)
- Hackers Exploit Paragon Partition Manager Driver Vulnerability in Ransomware Attacks (source)
- Online crime-as-a-service skyrockets with 24,000 users selling attack tools (source)