{"id":37739,"date":"2020-10-19T14:44:29","date_gmt":"2020-10-19T14:44:29","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/31675\/Hackers-Smell-Blood-As-Schools-Grapple-With-Virtual-Instruction.html"},"modified":"2020-10-19T14:44:29","modified_gmt":"2020-10-19T14:44:29","slug":"hackers-smell-blood-as-schools-grapple-with-virtual-instruction","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/hackers-smell-blood-as-schools-grapple-with-virtual-instruction\/","title":{"rendered":"Hackers Smell Blood As Schools Grapple With Virtual Instruction"},"content":{"rendered":"<div class=\"is-lead-inset\">\n<div data-layout=\"header \" data-layout-mobile class=\" media-object type-InsetMediaIllustration header scope-web|mobileapps article__inset article__inset--type-InsetMediaIllustration article__inset--header article__inset--lead \">\n<figure class=\" media-object-image enlarge-image renoImageFormat- img-header article__inset__image \" itemscope itemtype=\"http:\/\/schema.org\/ImageObject\">\n<div data-mobile-ratio=\"66.66666666666666%\" data-layout-ratio=\"66.66666666666666%\" data-subtype=\"photo\" class=\"image-container responsive-media article__inset__image__image\"> <img decoding=\"async\" srcset=\"https:\/\/images.wsj.net\/im-246183?width=140&amp;size=1.5 140w, https:\/\/images.wsj.net\/im-246183?width=540&amp;size=1.5 540w, https:\/\/images.wsj.net\/im-246183?width=620&amp;size=1.5 620w, https:\/\/images.wsj.net\/im-246183?width=700&amp;size=1.5 700w, https:\/\/images.wsj.net\/im-246183?width=860&amp;size=1.5 860w, https:\/\/images.wsj.net\/im-246183?width=1260&amp;size=1.5 1260w\" sizes=\"(max-width: 140px) 100px,\n(max-width: 540px) 500px,\n(max-width: 620px) 580px,\n(max-width: 700px) 660px,\n(max-width: 860px) 820px,\n1260px\" src=\"https:\/\/images.wsj.net\/im-246183?width=620&amp;size=1.5\" data-enlarge=\"https:\/\/images.wsj.net\/im-246183?width=1260&amp;size=1.5\" alt title=\"Goolsby Elementary School second-grader Ella Dweck (left) is tutored by College of Southern Nevada student...\"> <\/div><figcaption class=\"wsj-article-caption article__inset__image__caption\" itemprop=\"caption\">\n<h4 class=\"wsj-article-caption-content\">Goolsby Elementary School second-grader Ella Dweck (left) is tutored by College of Southern Nevada student Jordyn Leal as she takes an online class during the first week of distance learning for the Clark County School District in August. The district was recently the target of hackers.<\/h4>\n<p> <span class=\"wsj-article-credit article__inset__image__caption__credit\" itemprop=\"creator\"> <span class=\"wsj-article-credit-tag\"> Photo: <\/span> Ethan Miller\/Getty Images <\/span> <\/figcaption><\/figure>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"clearfix byline-wrap\">\n<div class=\"byline article__byline\"> By <\/p>\n<div class=\"author-container\"> <button class=\"author-button\">David Uberti<\/button><!-- --><\/p>\n<div class=\"author-dropdown\"> <button aria-label=\"Close\" class=\"mobile-modal-close\">Close<\/button> <\/p>\n<h3 class=\"mobile-modal-author-name\">David Uberti<\/h3>\n<\/p><\/div>\n<p><!-- --><\/div>\n<\/div>\n<p> <time class=\"timestamp article__timestamp flexbox__flex--1\"> Oct. 19, 2020 5:30 am ET <\/time> <\/div>\n<div class=\"article-content \">\n<p>Jeff Pelzel knew something was wrong when he arrived at his office on Sept. 14 and saw no new emails in his inbox. \u201cThat never happens,\u201d said Mr. Pelzel, the superintendent of the Newhall School District in Southern California.<\/p>\n<p>Mr. Pelzel asked his information-technology specialist whether the district\u2019s email system was down. Within minutes, he said, an assistant responded with bad news: Hackers had crippled the district\u2019s computer network.<\/p>\n<div class=\"paywall\">\n<p>The ransomware attack forced the district to reboot its networks and cancel five days of virtual instruction for roughly 6,000 elementary school students, Mr. Pelzel said. A month later, a joint investigation with an outside forensics firm continues, he said, underscoring the havoc that hackers have wreaked on some districts\u2019 networks during the coronavirus pandemic.<\/p>\n<p>\u201cWe\u2019re a little district,\u201d Mr. Pelzel said, adding that the district near Los Angeles doesn\u2019t have a cybersecurity staff dedicated to countering attackers. \u201cThis is what these people do for a living.\u201d <\/p>\n<p>Many K-12 schools that recently returned to virtual instruction handed out devices to students and teachers while trying to prevent computer networks from crumpling under a surge in use. Now, as this unique school year unfolds, attackers are circling. <\/p>\n<div data-layout=\"wrap \" data-layout-mobile class=\" media-object type-InsetDynamic wrap scope-web|mobileapps article__inset article__inset--type-InsetDynamic article__inset--wrap \">\n<div class=\"dynamic-inset-container article__inset__dynamic\"> <\/div>\n<\/p><\/div>\n<p>They have ranged from students, such as a Miami high-schooler recently arrested for allegedly overloading his district\u2019s systems with a denial-of-service attack, to professional hackers demanding money. The increase in data breaches, ransomware and phishing attacks is disrupting classes from New York to California for as long as a week at a time as schools\u2019 overburdened tech staffs, many without dedicated cyber experts, try to keep up. <\/p>\n<p>After the Las Vegas-area Clark County School District, a 320,000-student system, didn\u2019t pay ransom to hackers, they <a href=\"https:\/\/www.wsj.com\/articles\/hacker-releases-information-on-las-vegas-area-students-after-officials-dont-pay-ransom-11601297930\" target=\"_blank\" class=\"icon none\" rel=\"noopener noreferrer\">dumped the Social Security numbers of district employees online<\/a> last month. After a similar attack in September on Fairfax County Public Schools in Virginia, a local teachers union is still seeking answers about which of its members\u2019 data was compromised, according to an Oct. 10 email from the union to district officials viewed by WSJ Pro Cybersecurity.<\/p>\n<p>At least 289 districts across the U.S. have suffered cyber incidents such as hacks this year, according to Doug Levin, who runs Arlington, Va.-based consulting firm EdTech Strategies LLC. <\/p>\n<p>The number of publicly reported attacks jumped in August and September following a lull during the early months of the coronavirus pandemic, Mr. Levin said. <\/p>\n<p>\u201cThe start of this school year has come in like a lion,\u201d he said, noting that many districts don\u2019t report cyber incidents. \u201cIt is far, far worse than what is actually displayed.\u201d<\/p>\n<p>For some students like Danny Rubin, a senior at Yorktown High School north of Manhattan in New York\u2019s Hudson Valley, the threat of a cyberattack is a depressing addition to a school year marked by health fears, at-home gym classes and remote college visits. <\/p>\n<p>\u201cThis is what it\u2019s come to: The world ended and people are now hacking into schools,\u201d said Mr. Rubin, whose school temporarily shifted from a hybrid learning model to all-remote lessons after its district shared news of a cyberattack on Oct. 12.<\/p>\n<div data-layout=\"wrap \" data-layout-mobile class=\" media-object type-InsetDynamic wrap scope-web|mobileapps article__inset article__inset--type-InsetDynamic article__inset--wrap \">\n<div class=\"dynamic-inset-container article__inset__dynamic\"> <\/div>\n<\/p><\/div>\n<p>The ransomware attack encrypted data on the Yorktown Central School District\u2019s networks, forcing officials to restore servers from backups and go room-to-room to reimage devices, Superintendent Ron Hattar said in an email to parents Thursday viewed by WSJ Pro Cybersecurity. The superintendent\u2019s office didn\u2019t respond to requests for comment. <\/p>\n<p>While large districts have bolstered security in recent years as instruction has become more digital, many smaller districts don\u2019t have chief information security officers like companies do to police their networks, said Richard Cocchiara, a former CISO for the New York City Department of Education who now works at a risk-management startup. <\/p>\n<p>\u201cThey barely have a technical department,\u201d said Mr. Cocchiara, who oversaw more than 100 employees across data and security teams for the 1.1 million-student department. <\/p>\n<p>While schools can access information about threats through the Multi-State Information Sharing &amp; Analysis Center, an intelligence-sharing group, efforts to bridge security gaps are often ad hoc. <\/p>\n<p>April Mardock, for example, watches over Seattle Public Schools\u2019 networks by day as the district\u2019s IT operations and cybersecurity manager. By night, she swaps best practices in a 153-member Slack channel for a grass-roots group called OpsecEdu, as well as in a forum on the messaging service Discord of about three dozen K-12 cyber pros across the Pacific Northwest. <\/p>\n<p>The Seattle district\u2019s IT team is relatively robust with its 18 engineers, including the equivalent of two who focus on cybersecurity full time, but expanding the district\u2019s networks to cover 53,000 student devices\u2014up from roughly 6,000 before the pandemic\u2014has left the team scrambling, Ms. Mardock said. <\/p>\n<p>\u201cThe opponent is fighting with cluster bombs and we are fighting with muskets and slingshots,\u201d Ms. Mardock said of K-12 cybersecurity generally. <\/p>\n<p>Virtual mischief also expands the workload. At the Beaverton School District, which serves more than 41,000 students in the Portland, Ore., area, Information Security Architect Nathan McNulty said he has been tasked with investigating some students\u2019 bad behavior online such as name-calling in private chats. Previously handled by teachers or principals\u2019 offices, the disciplinary work takes Mr. McNulty, the district\u2019s lone security specialist, away from scanning networks for vulnerabilities and from patching software.<\/p>\n<p>Mr. McNulty, who sits within the broader IT department, said building out a larger cybersecurity team could be difficult given budget constraints. \u201cTo pay for my position, we have one less teacher,\u201d he said. <\/p>\n<p>Some lawmakers in Washington appear to have noticed. Reps. Doris Matsui (D., Calif.) and Jim Langevin (D., R.I.) on Friday introduced a bill to shore up K-12 cybersecurity by tracking incidents at the federal level and creating a $400 million grant program for schools.<\/p>\n<p>At the Newhall School District, a four-person tech team is still working to restore certain data as teachers settle back into virtual classes. \u201cThis is a marathon,\u201d said Mr. Pelzel, declining to discuss any potential demands by the attackers. \u201cWho would have thought that we would be wanting to return to \u2018normal\u2019\u2014\u2018normal\u2019 being online learning?\u201d<\/p>\n<p><strong>Write to <\/strong>David Uberti at <a href=\"mailto:david.uberti@wsj.com\" target=\"_blank\" class=\"icon \" rel=\"noopener noreferrer\">david.uberti@wsj.com <\/a><\/p>\n<\/p><\/div>\n<p>Copyright \u00a92020 Dow Jones &amp; Company, Inc. All Rights Reserved. 87990cbe856818d5eddac44c7b1cdeb8<\/p>\n<\/p><\/div>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/31675\/Hackers-Smell-Blood-As-Schools-Grapple-With-Virtual-Instruction.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":37740,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[140],"class_list":["post-37739","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehacker"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hackers Smell Blood As Schools Grapple With Virtual Instruction 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/hackers-smell-blood-as-schools-grapple-with-virtual-instruction\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers Smell Blood As Schools Grapple With Virtual Instruction 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/hackers-smell-blood-as-schools-grapple-with-virtual-instruction\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-19T14:44:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/hackers-smell-blood-as-schools-grapple-with-virtual-instruction.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"620\" \/>\n\t<meta property=\"og:image:height\" content=\"481\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-smell-blood-as-schools-grapple-with-virtual-instruction\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-smell-blood-as-schools-grapple-with-virtual-instruction\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Hackers Smell Blood As Schools Grapple With Virtual Instruction\",\"datePublished\":\"2020-10-19T14:44:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-smell-blood-as-schools-grapple-with-virtual-instruction\\\/\"},\"wordCount\":1101,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-smell-blood-as-schools-grapple-with-virtual-instruction\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/hackers-smell-blood-as-schools-grapple-with-virtual-instruction.jpg\",\"keywords\":[\"headline,hacker\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-smell-blood-as-schools-grapple-with-virtual-instruction\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-smell-blood-as-schools-grapple-with-virtual-instruction\\\/\",\"name\":\"Hackers Smell Blood As Schools Grapple With Virtual Instruction 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-smell-blood-as-schools-grapple-with-virtual-instruction\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-smell-blood-as-schools-grapple-with-virtual-instruction\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/hackers-smell-blood-as-schools-grapple-with-virtual-instruction.jpg\",\"datePublished\":\"2020-10-19T14:44:29+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-smell-blood-as-schools-grapple-with-virtual-instruction\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-smell-blood-as-schools-grapple-with-virtual-instruction\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-smell-blood-as-schools-grapple-with-virtual-instruction\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/hackers-smell-blood-as-schools-grapple-with-virtual-instruction.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/hackers-smell-blood-as-schools-grapple-with-virtual-instruction.jpg\",\"width\":620,\"height\":481},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-smell-blood-as-schools-grapple-with-virtual-instruction\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehacker\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Hackers Smell Blood As Schools Grapple With Virtual Instruction\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers Smell Blood As Schools Grapple With Virtual Instruction 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/hackers-smell-blood-as-schools-grapple-with-virtual-instruction\/","og_locale":"en_US","og_type":"article","og_title":"Hackers Smell Blood As Schools Grapple With Virtual Instruction 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/hackers-smell-blood-as-schools-grapple-with-virtual-instruction\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-10-19T14:44:29+00:00","og_image":[{"width":620,"height":481,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/hackers-smell-blood-as-schools-grapple-with-virtual-instruction.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/hackers-smell-blood-as-schools-grapple-with-virtual-instruction\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-smell-blood-as-schools-grapple-with-virtual-instruction\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Hackers Smell Blood As Schools Grapple With Virtual Instruction","datePublished":"2020-10-19T14:44:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-smell-blood-as-schools-grapple-with-virtual-instruction\/"},"wordCount":1101,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-smell-blood-as-schools-grapple-with-virtual-instruction\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/hackers-smell-blood-as-schools-grapple-with-virtual-instruction.jpg","keywords":["headline,hacker"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/hackers-smell-blood-as-schools-grapple-with-virtual-instruction\/","url":"https:\/\/www.threatshub.org\/blog\/hackers-smell-blood-as-schools-grapple-with-virtual-instruction\/","name":"Hackers Smell Blood As Schools Grapple With Virtual Instruction 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-smell-blood-as-schools-grapple-with-virtual-instruction\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-smell-blood-as-schools-grapple-with-virtual-instruction\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/hackers-smell-blood-as-schools-grapple-with-virtual-instruction.jpg","datePublished":"2020-10-19T14:44:29+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-smell-blood-as-schools-grapple-with-virtual-instruction\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/hackers-smell-blood-as-schools-grapple-with-virtual-instruction\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/hackers-smell-blood-as-schools-grapple-with-virtual-instruction\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/hackers-smell-blood-as-schools-grapple-with-virtual-instruction.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/hackers-smell-blood-as-schools-grapple-with-virtual-instruction.jpg","width":620,"height":481},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/hackers-smell-blood-as-schools-grapple-with-virtual-instruction\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehacker\/"},{"@type":"ListItem","position":3,"name":"Hackers Smell Blood As Schools Grapple With Virtual Instruction"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/37739","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=37739"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/37739\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/37740"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=37739"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=37739"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=37739"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}