Company Details
baltcityschools
8,049
23,602
6111
baltimorecityschools.org
3
BAL_6847661
Completed

Baltimore City Public Schools Company CyberSecurity Posture
baltimorecityschools.orgSince 1829, Baltimore City Public Schools prepares its nearly 75,000 students for higher education and a life-sustaining career. We proudly serve our students through 164 schools and programs. Our important work is guided by our strategic plan: Building a Generation: City Schools’ Blueprint for Success and its three focus areas: literacy, student wholeness, and staff leadership. We are Baltimore City and we believe every student can succeed. We invite you to join us in this work. Learn more about our mission and victories by following us here or by visiting baltimorecityschools.org.
Company Details
baltcityschools
8,049
23,602
6111
baltimorecityschools.org
3
BAL_6847661
Completed
Between 600 and 649

BCPS Global Score (TPRM)XXXX

Description: On February 13, 2025, Baltimore City Public Schools experienced a cybersecurity incident affecting certain IT systems. The breach involved names and unspecified data elements of individuals, with the investigation concluding on April 15, 2025. The incident was reported to the Vermont Attorney General's Office on April 29, 2025.
Description: Baltimore City Public Schools experienced a cybersecurity incident affecting certain IT systems within their network. This breach may have compromised certain documents containing information of current and former employees, volunteers, and contractors as well as a small percentage of students. It is speculated that folders, files, or records containing social security numbers, driver's license numbers, or passport numbers were stolen. Also, possibly exposed were a combination of student data, call logs, absenteeism records, or the maternity status of currently enrolled students. The breach has been linked to the Cloak ransomware operation.
Description: Baltimore City Schools suffered a **computer network breach** in February 2024, potentially compromising documents of **current, former, and prospective employees, volunteers, contractors**, and files linked to **less than 1.5% of students (~1,000 out of 75,000)**. The breach triggered an investigation with **law enforcement and external cybersecurity consultants**, leading to immediate actions like **password resets, endpoint detection software deployment, and a forensic audit**. Affected individuals are being notified via mail and offered **complimentary credit monitoring, identity-theft mitigation, and dark-web monitoring**. The district is establishing a **call center** for support and continues assessing the **scope of compromised data**, though specifics remain under review. Operational disruptions were acknowledged, but no evidence of **ransomware, financial fraud, or systemic outages** was reported. The focus remains on **notifying impacted parties** and strengthening defenses against future threats.


Baltimore City Public Schools has 110.53% more incidents than the average of same-industry companies with at least one recorded incident.
Baltimore City Public Schools has 156.41% more incidents than the average of all companies with at least one recorded incident.
Baltimore City Public Schools reported 2 incidents this year: 0 cyber attacks, 0 ransomware, 0 vulnerabilities, 2 data breaches, compared to industry peers with at least 1 incident.
BCPS cyber incidents detection timeline including parent company and subsidiaries

Since 1829, Baltimore City Public Schools prepares its nearly 75,000 students for higher education and a life-sustaining career. We proudly serve our students through 164 schools and programs. Our important work is guided by our strategic plan: Building a Generation: City Schools’ Blueprint for Success and its three focus areas: literacy, student wholeness, and staff leadership. We are Baltimore City and we believe every student can succeed. We invite you to join us in this work. Learn more about our mission and victories by following us here or by visiting baltimorecityschools.org.


Orange County Public Schools is recognized as one of the top urban school districts in the nation – the 8th largest school district in America (4th in Florida) with 210 traditional schools, approximately 206,000 students and over 24,000 employees. OCPS students enjoy equity and access to a wide v

Montgomery County Public Schools (MCPS), located in Maryland outside of Washington, D.C., is the largest school district in the state. MCPS has 209 schools and serves a diverse population of more than 160,000 students. MCPS offers competitive salaries and benefits, has a nationally recognized prof

Austin ISD is a diverse community of more than 10,000 employees, and we recognize that nothing is more essential to a great education system than innovative, talented, passionate educators. Whether you’re a recent graduate or an experienced professional seeking a new career opportunity, AISD has a

New York City Public Schools (NYCPS) is the largest public school system in the United States, serving approximately 1.1 million students across more than 1,600 schools in all five boroughs. Our schools are powered by over 75,000 teachers and thousands of paraprofessionals, school counselors, social

The mission of Charlotte-Mecklenburg Schools is to create an innovative, inclusive, student-centered environment that supports the development of independent learners. The vision of Charlotte-Mecklenburg Schools is to lead the community in educational excellence, inspiring intellectual curiosity, c

Gwinnett County Public Schools (GCPS), located in the metro Atlanta area, is the largest school system in Georgia and the 11th largest school district in the country, offering education professionals and support staff endless opportunities to SHINE. GCPS is one of the nation’s top urban school dist

The Peel District School Board serves more than 156,000 students in kindergarten to grade 12. Operating more than 257 schools in the municipalities of Brampton, Caledon and Mississauga, the Peel board is the largest employer in Peel. At the Peel board, we inspire success, confidence and hope in ea

The Toronto District School Board (TDSB) is the largest and one of the most diverse school boards in Canada, and recognized by Forbes and Statista as one of Canada's Best Employers for Diversity for 2023. We serve more than 239,000 students in 582 schools throughout Toronto, and more than 100,000 li

Prince George's County Public Schools (PGCPS), one of the nation's 25 largest school districts, has 200 schools and centers, more than 133,000 students and 22,000 employees. The school system serves a diverse student population from urban, suburban and rural communities located in the Washington, DC
.png)
Manassas City Public Schools will reopen Wednesday on a two-hour delay after closing Monday due to a cybersecurity incident.
Manassas City Public Schools will be closed Monday due to a cybersecurity incident affecting the Virginia school system over the weekend.
Manassas City Public Schools (MCPS) will be closed on Monday, Nov. 10, due to a cybersecurity incident, MCPS Superintendent Dr. Kevin Newman...
The latest videos from DC News Now | DC, Virginia, Maryland News, Weather, Traffic, Sports Live.
BALTIMORE — The Maryland Department of Legislative Services found Somerset County Public Schools had deficiencies in its procurement...
Baltimore City Public Schools' board of commissioners wants to know what the public is looking for in its next CEO.
Maryland Transit Authority officials are investigating a "cybersecurity incident" involving unauthorized access to certain systems.
The Anti-Defamation League has asked the Trump administration to open a civil-rights investigation into the Baltimore City Public Schools,...
Across industries, Indian organizations saw 3,278 weekly attacks on average, significantly higher than the global average of 1,934

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Baltimore City Public Schools is http://www.baltimorecityschools.org.
According to Rankiteo, Baltimore City Public Schools’s AI-generated cybersecurity score is 628, reflecting their Poor security posture.
According to Rankiteo, Baltimore City Public Schools currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Baltimore City Public Schools is not certified under SOC 2 Type 1.
According to Rankiteo, Baltimore City Public Schools does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Baltimore City Public Schools is not listed as GDPR compliant.
According to Rankiteo, Baltimore City Public Schools does not currently maintain PCI DSS compliance.
According to Rankiteo, Baltimore City Public Schools is not compliant with HIPAA regulations.
According to Rankiteo,Baltimore City Public Schools is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Baltimore City Public Schools operates primarily in the Primary and Secondary Education industry.
Baltimore City Public Schools employs approximately 8,049 people worldwide.
Baltimore City Public Schools presently has no subsidiaries across any sectors.
Baltimore City Public Schools’s official LinkedIn profile has approximately 23,602 followers.
Baltimore City Public Schools is classified under the NAICS code 6111, which corresponds to Elementary and Secondary Schools.
No, Baltimore City Public Schools does not have a profile on Crunchbase.
Yes, Baltimore City Public Schools maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/baltcityschools.
As of December 20, 2025, Rankiteo reports that Baltimore City Public Schools has experienced 3 cybersecurity incidents.
Baltimore City Public Schools has an estimated 7,974 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with external cybersecurity consultants, and and containment measures with password resets for all users, and remediation measures with installation of endpoint detection and response software, and recovery measures with forensic audit, recovery measures with ongoing procedure assessments, and communication strategy with u.s. mail notifications to affected individuals, communication strategy with website and social media updates, communication strategy with staff notifications, communication strategy with call center for support, and enhanced monitoring with credit monitoring, enhanced monitoring with dark-web monitoring for affected individuals..
Title: Baltimore City Public Schools Cyber Incident
Description: Baltimore City Public Schools experienced a cybersecurity incident affecting certain IT systems within their network. This breach may have compromised certain documents containing information of current and former employees, volunteers, and contractors as well as a small percentage of students. It is speculated that folders, files, or records containing social security numbers, driver's license numbers, or passport numbers were stolen. Also, possibly exposed were a combination of student data, call logs, absenteeism records, or the maternity status of currently enrolled students. The breach has been linked to the Cloak ransomware operation.
Type: Ransomware
Threat Actor: Cloak ransomware operation
Title: Baltimore City Public Schools Cybersecurity Incident
Description: A cybersecurity incident affecting certain IT systems, involving names and unspecified data elements of individuals.
Date Detected: 2025-02-13
Date Publicly Disclosed: 2025-04-29
Date Resolved: 2025-04-15
Type: Data Breach
Title: Baltimore City Schools Data Breach (February 2024)
Description: Baltimore City Schools suffered a computer network breach in February 2024, potentially compromising documents belonging to current, former, and prospective employees, volunteers, contractors, and fewer than 1.5% of students (~1,000 out of 75,000). The district conducted an investigation with law enforcement and external cybersecurity consultants, implemented password resets, and installed endpoint detection and response software. Affected individuals are being notified via U.S. Mail and offered credit monitoring and identity-theft mitigation services.
Date Detected: 2024-02-01
Date Publicly Disclosed: 2024-04-22
Type: data breach
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Social security numbers, Driver's license numbers, Passport numbers, Student data, Call logs, Absenteeism records, Maternity status
Systems Affected: Certain IT systems within their network

Data Compromised: Names, Unspecified data elements
Systems Affected: IT systems

Data Compromised: Employee records, Volunteer records, Contractor records, Student files (<1.5%)
Systems Affected: computer network
Operational Impact: password resetsendpoint detection software installationforensic audit
Brand Reputation Impact: potential reputational harm due to breach disclosure
Identity Theft Risk: ['potential risk for affected individuals (credit monitoring offered)']
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Social Security Numbers, Driver'S License Numbers, Passport Numbers, Student Data, Call Logs, Absenteeism Records, Maternity Status, , Names, Unspecified Data Elements, , Employee Documents, Volunteer Documents, Contractor Documents, Student-Related Files and .

Entity Name: Baltimore City Public Schools
Entity Type: Educational Institution
Industry: Education
Location: Baltimore, Maryland

Entity Name: Baltimore City Public Schools
Entity Type: Educational Institution
Industry: Education
Location: Baltimore, MD

Entity Name: Baltimore City Schools
Entity Type: public school district
Industry: education
Location: Baltimore, Maryland, USA
Size: ~75,000 students + employees/contractors
Customers Affected: ~1,000 students (<1.5%) + unspecified number of employees/volunteers/contractors

Incident Response Plan Activated: True
Third Party Assistance: External Cybersecurity Consultants.
Containment Measures: password resets for all users
Remediation Measures: installation of endpoint detection and response software
Recovery Measures: forensic auditongoing procedure assessments
Communication Strategy: U.S. Mail notifications to affected individualswebsite and social media updatesstaff notificationscall center for support
Enhanced Monitoring: credit monitoringdark-web monitoring for affected individuals
Third-Party Assistance: The company involves third-party assistance in incident response through external cybersecurity consultants, .

Type of Data Compromised: Social security numbers, Driver's license numbers, Passport numbers, Student data, Call logs, Absenteeism records, Maternity status
Sensitivity of Data: High
Personally Identifiable Information: Social Security numbersDriver's license numbersPassport numbers

Type of Data Compromised: Names, Unspecified data elements

Type of Data Compromised: Employee documents, Volunteer documents, Contractor documents, Student-related files
Number of Records Exposed: ~1,000 student records + unspecified number of employee/contractor/volunteer records
Sensitivity of Data: personally identifiable information (PII) likely included
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: installation of endpoint detection and response software, .
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by password resets for all users and .

Ransomware Strain: Cloak
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through forensic audit, ongoing procedure assessments, .

Regulatory Notifications: Vermont Attorney General's Office

Recommendations: continue assessing procedures to defend against evolving cybersecurity threats, coordinate with law enforcement and external expertscontinue assessing procedures to defend against evolving cybersecurity threats, coordinate with law enforcement and external experts

Source: Vermont Attorney General's Office
Date Accessed: 2025-04-29

Source: Baltimore City Schools Board of School Commissioners Meeting (CEO Comments)
Date Accessed: 2024-04-22
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Vermont Attorney General's OfficeDate Accessed: 2025-04-29, and Source: Baltimore City Schools Board of School Commissioners Meeting (CEO Comments)Date Accessed: 2024-04-22.

Investigation Status: Concluded

Investigation Status: ongoing (forensic audit in progress, precise data elements still being determined)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through U.S. Mail Notifications To Affected Individuals, Website And Social Media Updates, Staff Notifications and Call Center For Support.

Stakeholder Advisories: Notifications To Affected Individuals Via U.S. Mail, General Information Posted On Website And Social Channels, Staff Notifications.
Customer Advisories: credit monitoring and identity-theft mitigation services offeredcall center established for enrollment support
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Notifications To Affected Individuals Via U.S. Mail, General Information Posted On Website And Social Channels, Staff Notifications, Credit Monitoring And Identity-Theft Mitigation Services Offered, Call Center Established For Enrollment Support and .

Corrective Actions: Password Resets, Endpoint Detection And Response Software Installation, Forensic Audit, Ongoing Procedure Assessments,
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as External Cybersecurity Consultants, , Credit Monitoring, Dark-Web Monitoring For Affected Individuals, .
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Password Resets, Endpoint Detection And Response Software Installation, Forensic Audit, Ongoing Procedure Assessments, .
Last Attacking Group: The attacking group in the last incident was an Cloak ransomware operation.
Most Recent Incident Detected: The most recent incident detected was on 2025-02-13.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2024-04-22.
Most Recent Incident Resolved: The most recent incident resolved was on 2025-04-15.
Most Significant Data Compromised: The most significant data compromised in an incident were Social Security numbers, Driver's license numbers, Passport numbers, Student data, Call logs, Absenteeism records, Maternity status, , names, unspecified data elements, , employee records, volunteer records, contractor records, student files (<1.5%) and .
Most Significant System Affected: The most significant system affected in an incident was computer network.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was external cybersecurity consultants, .
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was password resets for all users.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Social Security numbers, contractor records, Passport numbers, Maternity status, Absenteeism records, volunteer records, student files (<1.5%), Call logs, employee records, Student data, unspecified data elements, names and Driver's license numbers.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 1.0K.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was continue assessing procedures to defend against evolving cybersecurity threats and coordinate with law enforcement and external experts.
Most Recent Source: The most recent source of information about an incident are Vermont Attorney General's Office and Baltimore City Schools Board of School Commissioners Meeting (CEO Comments).
Current Status of Most Recent Investigation: The current status of the most recent investigation is Concluded.
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was notifications to affected individuals via U.S. Mail, general information posted on website and social channels, staff notifications, .
Most Recent Customer Advisory: The most recent customer advisory issued was an credit monitoring and identity-theft mitigation services offeredcall center established for enrollment support.
.png)
n8n is an open source workflow automation platform. Versions starting with 0.211.0 and prior to 1.120.4, 1.121.1, and 1.122.0 contain a critical Remote Code Execution (RCE) vulnerability in their workflow expression evaluation system. Under certain conditions, expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficiently isolated from the underlying runtime. An authenticated attacker could abuse this behavior to execute arbitrary code with the privileges of the n8n process. Successful exploitation may lead to full compromise of the affected instance, including unauthorized access to sensitive data, modification of workflows, and execution of system-level operations. This issue has been fixed in versions 1.120.4, 1.121.1, and 1.122.0. Users are strongly advised to upgrade to a patched version, which introduces additional safeguards to restrict expression evaluation. If upgrading is not immediately possible, administrators should consider the following temporary mitigations: Limit workflow creation and editing permissions to fully trusted users only; and/or deploy n8n in a hardened environment with restricted operating system privileges and network access to reduce the impact of potential exploitation. These workarounds do not fully eliminate the risk and should only be used as short-term measures.
FastAPI Users allows users to quickly add a registration and authentication system to their FastAPI project. Prior to version 15.0.2, the OAuth login state tokens are completely stateless and carry no per-request entropy or any data that could link them to the session that initiated the OAuth flow. `generate_state_token()` is always called with an empty `state_data` dict, so the resulting JWT only contains the fixed audience claim plus an expiration timestamp. On callback, the library merely checks that the JWT verifies under `state_secret` and is unexpired; there is no attempt to match the state value to the browser that initiated the OAuth request, no correlation cookie, and no server-side cache. Any attacker can hit `/authorize`, capture the server-generated state, finish the upstream OAuth flow with their own provider account, and then trick a victim into loading `.../callback?code=<attacker_code>&state=<attacker_state>`. Because the state JWT is valid for any client for \~1 hour, the victim’s browser will complete the flow. This leads to login CSRF. Depending on the app’s logic, the login CSRF can lead to an account takeover of the victim account or to the victim user getting logged in to the attacker's account. Version 15.0.2 contains a patch for the issue.
FileZilla Client 3.63.1 contains a DLL hijacking vulnerability that allows attackers to execute malicious code by placing a crafted TextShaping.dll in the application directory. Attackers can generate a reverse shell payload using msfvenom and replace the missing DLL to achieve remote code execution when the application launches.
LDAP Tool Box Self Service Password 1.5.2 contains a password reset vulnerability that allows attackers to manipulate HTTP Host headers during token generation. Attackers can craft malicious password reset requests that generate tokens sent to a controlled server, enabling potential account takeover by intercepting and using stolen reset tokens.
Kimai 1.30.10 contains a SameSite cookie vulnerability that allows attackers to steal user session cookies through malicious exploitation. Attackers can trick victims into executing a crafted PHP script that captures and writes session cookie information to a file, enabling potential session hijacking.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.