Tag: ransomware news 2025

  • If you have a K-12 aged student in your household, the hack on educational software PowerSchool is one you need to be aware of

    If you have a K-12 aged student in your household, the hack on educational software PowerSchool is one you need to be aware of

    As of January 24th very little has come out about the hack on the nationwide cloud-based software solution provider, PowerSchool, which provides tools to school districts in the form of staff management, attendance taking, enrollment, grade information and more.

    According to their website, this attack occurred on December 28th, 2024. They were alerted to the breach when the exportation of data began and there was no other indication prior to that such as systems being down. The company has offered to provide credit monitoring services for the students and staff whose data was leaked in the breach.

    This data includes, grade and school information, addresses and phone numbers, email addresses, social security numbers and more. 6,505 school districts data were leaked in the attack, and it’s estimated 62 million students could be affected. This not only affects students in the US but Canada as well.

    According to Bleeping Computer, PowerSchool has also paid a ransom to the attackers in a yet to be known sum to stave off the release of data. This Isn’t usually a worthwhile tactic, it’s estimated 92% of businesses that pay the ransom don’t get their data back in the end (as was the case for Apple when Apple Watch and MacBook Pro blueprints were stolen in 2021).

    There are some concrete reasons not to pay the ransom in the event your data is stolen by bad actors:

    1. No Guarantee of Data Recovery: Paying the ransom does not ensure that attackers will decrypt your data or return it. Many victims have paid and never received their files back.
    2. Encourages Future Attacks: Paying a ransom signals to attackers that their tactic works, potentially making your business and others a target for future attacks.
    3. Funds Criminal Activity: The ransom you pay could fund other illegal activities, such as drug trafficking, human trafficking, or furth er cybercrimes
    4. Reputational Damage: If it becomes public knowledge that your business paid a ransom, it could harm your reputation, as customers and partners may view it as a sign of vulnerability.
    5. Potential for Higher Demands: After paying, attackers might demand additional payments, holding you hostage repeatedly.

    If your business has been, or is currently the victim of a ransomware attack, Valley Techlogic can help. We have helped businesses remediate ongoing cyberthreats and have been able to introduce systems and cybersecurity measures that can help prevent future attacks. Even if you business has never suffered a cyber attack, why continue to risk it with attackers continuously evolving their strategies year over year?

    Investing in technology protection today ensures your business will continue to thrive tomorrow, 60% of small businesses close after a significant cyber attack. Don’t be a statistic, protect your business today.

    Looking for more to read? We suggest these other articles from our site.

    This article was powered by Valley Techlogic, leading provider of trouble free IT services for businesses in California including Merced, Fresno, Stockton & More. You can find more information at https://www.valleytechlogic.com/ or on Facebook at https://www.facebook.com/valleytechlogic/ . Follow us on X at https://x.com/valleytechlogic and LinkedIn at https://www.linkedin.com/company/valley-techlogic-inc/.

  • Are cyber attacks still being conducted the same way in 2025? Top 8 cyber attack methods explained

    Are cyber attacks still being conducted the same way in 2025? Top 8 cyber attack methods explained

    New year, new threats? Hackers have not slowed down their efforts year over year, in 2024 the average cost of a data breach rose to 9.36 million US dollars. Of course this is taking into account the massive breaches that occurred last year with one attack costing the company that was targeted $500 million dollars.

    Still, even for smaller businesses the average cost is usually somewhere between $120,000 to $150,000 – no small sum. Year over year though, the types of attacks haven’t changed even if they’ve become more effective in scale. These top 8 attack methods remain the same (with the first one leading in effectiveness by a landside):

    1. Phishing: Phishing remains the top attack vector in 2024, with 90% of attacks still starting with a phishing email. Our advice on how to spot a phishing email has also stayed the same.
    2. Ransomware comes in second and is preceded by a phishing email 40% of the time. In 2024 the largest single ransomware payment of all time was made to the “Dark Angels” ransomware group to the sum of $75 million.
    3. Denial-of-Service (DoS) attacks are not a new player to the game, but they are part of an overall strategy we’ve seen by attackers to weaponize operational technologies to cripple businesses – either for a payout or just to send a message.
    4. Man-in-the-middle attacks involving intercepting private conversations or data between one or two parties, a good example of this is an attacker setting up a fake Wi-Fi connection or intercepting unencrypted HTTP connections to gain user login information to a website.
    5. SQL Injection attacks are a difficult one for consumers to guard against as they’re conducted on the backend of a businesses website or database and involve “injecting” malicious code. If you’re a business owner, it’s crucial to work with competent developers when creating consumer facing websites (especially if you’re collecting sensitive data through them).
    6. Cross-Site Scripting Attacks are again difficult to guard against, these attacks are also extremely inconspicuous as the attacker in effect sets up a honey pot on the victim’s server or website and waits for it to collect data from the site’s users. Again, it’s crucial to work with a competent developer and IT provider when to protecting your data both internally and from being externally exploited.
    7. DNS Spoofing involves redirecting users from the site they were intending to visit to an unknown site where their data can be collected (usually login information for the site they intended to navigate to). One trick for telling if the page you’re on is secure is to look for the little lock symbol in your navigation bar, this is a sign the page you’re on is using a secure connection.
    8. Zero Day Exploits are the most difficult to protect against as they are attacks that are literally exploited the same day they’re discovered. Hackers are constantly looking for new ways to access your systems, and even if you’re a small business you’re never too small to be of use to them (even if it means leapfrogging past you to exploit your customers).

    There is never a better time than the start of the year to evaluate your technology systems for improvements, at Valley Techlogic we can provide you with a comprehensive report on our recommendations for your business as well as a tailored plan to bring your business up to date in 2025. Schedule a consultation today.

    Looking for more to read? We suggest these other articles from our site.

    This article was powered by Valley Techlogic, leading provider of trouble free IT services for businesses in California including Merced, Fresno, Stockton & More. You can find more information at https://www.valleytechlogic.com/ or on Facebook at https://www.facebook.com/valleytechlogic/ . Follow us on X at https://x.com/valleytechlogic and LinkedIn at https://www.linkedin.com/company/valley-techlogic-inc/.