3.96 million individual records breached
A new report from Comparitech reveals that while the education sector remains a significant target for ransomware, the rate of increase in attacks slowed during 2025. The study identified 251 ransomware attacks against schools, colleges, and universities worldwide, a modest 2% rise from 2024. These attacks led to the confirmed breach of nearly 4 million individual records. The United States remained the most targeted nation, suffering 130 attacks, although this represented a 9% decline for the U.S. compared to the prior year. The report underscores the persistent threat, with gangs like Medusa demanding substantial ransoms and attacks causing significant operational disruptions, including school closures.
Despite the slowing growth rate, the absolute number of attacks remains high, indicating that under-resourced educational institutions are still viewed as attractive targets by cybercriminals.
The impact of ransomware on the education sector is particularly damaging:
Educational institutions must prioritize cybersecurity despite budget constraints.
The single most effective mitigation against the impact of ransomware is maintaining tested, offline backups.
Training staff to identify phishing can prevent the initial access that leads to many ransomware attacks.
Enforcing MFA makes it harder for attackers to use stolen credentials to access networks via remote services.
Proper segmentation can contain a ransomware infection, protecting critical systems and backups from being encrypted.
For the education sector, which is often resource-constrained, investing in a robust and automated remote backup solution is the most critical defense against ransomware. As the Uvalde CISD case shows, the ability to restore from backups is the deciding factor between a manageable incident and a catastrophe. Schools and universities must ensure they have recent, immutable backups stored in a separate location, preferably in the cloud or a physically isolated site. These backups must be tested regularly to confirm data integrity and the viability of the restoration process. This strategy directly counters the primary impact of ransomware, making the ransom demand irrelevant and allowing the institution to focus on recovery and remediation.
Many ransomware attacks on school districts begin with the compromise of a single staff account via phishing. Implementing Multi-factor Authentication (MFA) across all staff and student accounts is a high-impact, cost-effective mitigation. Priority should be placed on securing email systems (like Office 365 or Google Workspace), VPN access, and any other remote access portals. By requiring a second factor for authentication, MFA prevents attackers from leveraging stolen passwords to gain initial access, effectively shutting down a major infection vector used by ransomware groups.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats