LevelBlue Acquires Fortra’s Alert Logic MDR Business, Strengthening Position as Global MDR Leader. Learn More

LevelBlue Acquires Fortra’s Alert Logic MDR Business, Strengthening Position as Global MDR Leader. Learn More

Services
Cyber Advisory
Managed Cloud Security
Data Security
Managed Detection & Response
Email Security
Managed Network Infrastructure Security
Exposure Management
Security Operations Platforms
Incident Readiness & Response
SpiderLabs Threat Intelligence
Solutions
BY TOPIC
Offensive Security
Solutions to maximize your security ROI
Operational Technology
End-to-end OT security
Microsoft Security
Unlock the full power of Microsoft Security
Securing the IoT Landscape
Test, monitor and secure network objects
Why LevelBlue
About Us
Awards and Accolades
LevelBlue SpiderLabs
PGA of America Partnership
Secure What's Next
LevelBlue Security Operations Platforms
Security Colony
Partners
Microsoft
Unlock the full power of Microsoft Security
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings

LevelBlue SpiderLabs: Breaking Down the Ransomware Groups Targeting the Education Sector

Ransomware attack groups have ramped up their efforts, launching attacks on the education sector with recent incidents striking a range of targets from an Australian institution of higher learning to a school district in North Carolina.

These facilities contain a large amount of very valuable data, such as student records, intellectual property, and financial information that threat groups can leverage for financial gain. An additional reason education is targeted is that it must stay in operation. Public schools can’t just close if their systems are locked up by ransomware, a fact the attacker is well aware of, which adds extra pressure.

They essentially say, “This is a mighty nice school district you have; it would be a shame if it had to stay closed for several months. How about just paying the ransom and moving past all this unpleasantness?”

 

Gaining Access

Ransomware operators typically exploit weak authentication controls, unpatched vulnerabilities, employ social engineering tactics, and leverage compromised credentials obtained from successful infostealer infections to obtain initial access.

More or less the same playbook is used for any attack. However, LevelBlue SpiderLabs continuously tracks data published on ransomware leak portals, enabling us to provide unique insights into the operational activities and targeting patterns of specific ransomware groups’ activity in the education field.

Leak portal disclosures typically represent attacks where threat actors successfully exfiltrated sensitive data and/or encrypted critical resources that could be leveraged for extortion demands. Keep in mind, this represents only a subset of all ransomware attacks, omitting cases where organizations successfully prevented compromise and cases resolved through ransom payments prior to data publication. Therefore, the actual number of ransomware attacks targeting the education sector is likely significantly higher than the following statistics suggest.

From September to December 2025, more than 80 ransomware attacks were reported against educational institutions worldwide. Most of the activity took place in the United States, with 54 attacks publicly disclosed on ransomware leak sites. Canada ranked second with five attacks, followed by Brazil with three reported incidents.

 

The Top Three Ransomware Groups Attacking the Education Sector

Among ransomware groups responsible for these attacks, Qilin emerged as the most prolific threat actor, with 16 recorded attacks (20% of total activity), followed by INC Ransom with eight attacks and CL0P with seven attacks.

An analysis of the initial access vectors revealed that phishing was the most frequently reported method, accounting for 22% of incidents. This finding highlights the continued effectiveness of social engineering tactics and underscores the critical need for enhanced security awareness training across students, faculty, and staff.

LevelBlue SpiderLabs recommends that educational institutions place extra focus on popular social engineering techniques such as fake CAPTCHA and ClickFix.

LevelBlue delivers advanced threat protection for education institutions.

Learn More

Ransom Demand and Payment Trends

According to research published by Sophos, in 2025, median ransom demands targeting the education sector declined significantly compared to the previous year.

While the drop can be considered good news, the reality is any demand is a problem, and the business and human impact of ransomware incidents remain significant.

In lower education institutions (K-12), demands fell from $3.85 million to $1.02 million, while actual ransom payments decreased from $6.60 million to $800,000. Similarly, in higher education institutions, median demands dropped from $3.55 million to $697,000, and median payments declined from $4.41 million to $463,000. These reductions suggest changing ransomware economics or improved defensive postures within educational organizations.

 

Qilin Ransomware Group

Qilin emerged in mid-2022 as a sophisticated Ransomware-as-a-Service (RaaS) operation, quickly gaining notoriety for its targeted attacks on financial institutions. The group is known for its aggressive tactics and high-value targeting strategy, making it the most active group targeting financial services. The group’s Rust-based ransomware is highly customizable, targeting Windows, Linux, and VMware ESXi environments.

A significant attack happened in early September 2025. The Qilin group targeted Mecklenburg County Public Schools (MCPS) in southern Virginia. The attackers claimed to have stolen 305 GB of sensitive data, including financial records, grant documents, budgets, and children’s medical files, significantly disrupting school operations.

Initial Access Vectors

T1566: Phishing - Advanced social engineering campaigns targeting financial sector employees

T1190: Exploit Public-Facing Application - Exploiting vulnerabilities in internet-facing systems

T1078: Valid Accounts - Compromised credentials from previous breaches

T1133: External Remote Services - RDP and VPN exploitation

T1195: Supply Chain Compromise - Targeting third-party financial service providers

CVEs Involved

CVE-2023-4966 - Citrix NetScaler ADC and Gateway Vulnerability 'Citrix Bleed'

CVE-2023-27350 - PaperCut MF/NG Improper Access Control Vulnerability

CVE-2023-0669 - GoAnywhere MFT Remote code injection via admin panel

CVE-2021-22986 - BIG-IP F5 iControl Server-Side Request Forgery / RCE

CVE-2021-44228 - Apache Log4j2 Remote Code Execution Vulnerability

CVE-2019-0708 - Microsoft Remote Desktop Services RCE Vulnerability

External Intelligence: DarkTrace | THN | SoCRadar

 

INC Ransom Group

INC Ransom, which emerged in July 2023, operates a sophisticated double-extortion scheme while deceptively positioning itself as a "security improvement service." The group employs psychological manipulation, claiming that ransom payment would help victims to save their reputation and improve security posture - a tactic designed to rationalize payment and reduce resistance. The group exfiltrates sensitive data before encryption and maintains a leak site used to threaten victims.

Initial Access Vectors

• T1566: Phishing - Advanced social engineering campaigns targeting financial sector employees

• T1190: Exploit Public-Facing Application - Exploiting vulnerabilities in internet-facing systems

• T1078: Valid Accounts - Compromised credentials from previous breaches

• T1133: External Remote Services - RDP and VPN exploitation

CVEs Involved

CVE-2023-48788 - Fortinet FortiClient EMS SQL Injection Vulnerability

CVE-2023-3519 - Citrix NetScaler Application Delivery Controller Vulnerability

 

CL0P Ransomware

The CL0P ransomware group exhibited exceptional operational activity throughout early 2025, establishing itself as the most prolific threat actor based on leak site disclosures. CL0P dominated the threat landscape with 413 public victim posts during Q1 2025, driven primarily by the exploitation of two zero-day vulnerabilities: CVE-2024-50623 and CVE-2024-55956, affecting Cleo managed file transfer (MFT) solutions.

The impact of this campaign was particularly severe in February 2025, with 389 victim organizations publicly disclosed, representing an extraordinary 1,400% increase compared to the 26 victims recorded in February 2024. CL0P’s tactical approach emphasizes mass data exfiltration over traditional encryption-based ransomware, enabling rapid compromise of multiple organizations through a single vulnerability exploitation campaign.

CL0P’s historical track record demonstrates significant impact to affected organizations, most notably through the 2023 MOVEit Transfer vulnerability exploitation campaign (CVE-2023-34362), which generated an estimated $75–100 million in ransom revenue while affecting data belonging to over 95 million individuals across hundreds of compromised organizations worldwide.

Initial Access Vectors

• T1566: Phishing - Advanced social engineering campaigns targeting financial sector employees

• T1190: Exploit Public-Facing Application - Exploiting vulnerabilities in internet-facing systems

• T1078: Valid Accounts - Compromised credentials from previous breaches

CVEs Involved

CVE-2024-50623 - Cleo Unrestricted File Upload Vulnerability

CVE-2024-55956 - Cleo Remote Code Execution Vulnerability

CVE-2023-0669 - GoAnywhere MFT Remote Code Injection

CVE-2023-34362 - MOVEit Transfer SQL Injection Remote Code Execution

Ransomware activity against the education sector shows no signs of slowing, driven by valuable data stores, operational pressure, and persistent weaknesses in authentication and user awareness.

While median ransom demands have declined, the frequency and impact of attacks from data theft to prolonged disruption remain severe.

However, by understanding how groups like Qilin, INC Ransom, and CL0P operate, and by prioritizing phishing resistance, timely patching, and visibility into emerging threat actor behavior, educational institutions can take meaningful steps to reduce risk and strengthen their resilience against an increasingly aggressive threat landscape.

ABOUT LEVELBLUE

LevelBlue is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.

Latest Intelligence

Discover how our specialists can tailor a security program to fit the needs of
your organization.

Request a Demo