• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

fundsforNGOs - United States

Grants and Resources for Sustainability

  • Subscribe for Free
  • Premium Support
  • Premium Sign up
  • Premium Sign in
  • Latest News
  • Funds for US Organizations
    • Nonprofits
    • Community Foundations
    • Faith-based Organizations
    • Tribal Organizations
    • Institutions
      • Hospitals
      • Schools
      • Universities
  • Funds for US Businesses
    • Startups
    • Small Businesses
    • Large Business
  • Funds for US Individuals
    • Artists
    • College Students
    • School Students
    • Entrepreneurs
    • Persons with Disabilities
    • Researchers
    • Veterans
    • House Owners
    • Tenants
  • US Thematic Areas
    • US States
  • Contact
    • About us
    • Submit Your Grant
You are here: Home / News / Ransomware Gang Targets Easterseals, A Nonprofit for Disabled Individuals

Ransomware Gang Targets Easterseals, A Nonprofit for Disabled Individuals

Dated: October 24, 2024

A notorious ransomware gang has targeted Easterseals, a prominent nonprofit organization dedicated to supporting disabled individuals. The Rhysida group has demanded a staggering $1.3 million from the organization, which serves over 1.5 million people across the United States.

Key Takeaways

  • Rhysida ransomware group demands 20 bitcoin from Easterseals by October 30.
  • The cyberattack compromised personal information of nearly 15,000 individuals.
  • Easterseals is implementing enhanced security measures following the breach.

Overview of Easterseals

Easterseals is one of the oldest disability-focused organizations in the U.S., providing essential services to disabled children, seniors, military veterans, and others in need. The organization prides itself on allocating over 80% of its fundraising directly to care for the disabled, making this attack particularly devastating.

Details of the Cyberattack

The cyberattack occurred on April 1, leading to a significant disruption in the organization’s network functionality. Although Easterseals did not initially disclose the involvement of the Rhysida group, the hackers claimed responsibility for the breach this week.

Upon discovering the incident, Easterseals took immediate action by disconnecting all network access and engaging a specialized cybersecurity firm to conduct a thorough forensic investigation. This investigation revealed that unauthorized actors accessed sensitive files, including personal information of individuals associated with the organization.

Impact on Individuals

The breach has affected 14,855 individuals, with hackers accessing:

  • Full names
  • Addresses
  • Driver’s license numbers
  • Social Security numbers
  • Medical and health information
  • Passport details

In response to the breach, Easterseals is offering 12 months of identity protection services to the affected individuals. The organization is also enhancing its security protocols by implementing endpoint security software, utilizing cloud-based servers, and adopting credential hardening tools such as multifactor authentication.

Ransom Demand and Previous Attacks

The Rhysida ransomware group has posted Easterseals on its leak site, demanding a ransom of 20 bitcoin by October 30. This group has a history of targeting healthcare organizations, having previously attacked notable institutions such as The Ann & Robert H. Lurie Children’s Hospital of Chicago and various hospitals operated by Prospect Medical Holdings.

In addition to these attacks, Rhysida has also targeted the World Council of Churches and systems used by the Port of Seattle and the city of Columbus, Ohio, showcasing a troubling trend of cybercriminals exploiting vulnerable organizations.

Conclusion

The attack on Easterseals highlights the growing threat of ransomware attacks on nonprofits, particularly those serving vulnerable populations. As organizations like Easterseals work to recover from such incidents, the need for robust cybersecurity measures has never been more critical. The ongoing situation serves as a stark reminder of the importance of safeguarding sensitive information in an increasingly digital world.

Sources

  • Ransomware gang stoops to new low, targets prominent nonprofit for disabled people, The Record from Recorded Future News.
Subscribe

Primary Sidebar

Call for Applications for Community Grants

Women’s Giving of Frederick County Grants – Maryland

Guy I. Bromley Trust Fund (Missouri and Kansas)

City of Wichita Falls Arts and Culture Grants (Texas)

Specialty Crop Block Grant Program 2026 (Utah)

Submit Applications for Park and Play Grants 2026 (Maryland)

Ann Katherine Spear Humanitarian Foundation Grant (Georgia)

Dennis Schuman Charitable Foundation Fund

Louis H. Shaman Charitable Foundation Program (Maryland)

Benjamin H. Smyser Foundation Fund (Indiana)

The Louis K. Snipes Foundation for Animal Care Grant (Texas)

K.D. and M.L. Steadley Memorial Trust Grant (Missouri)

Historic Preservation Grant Program 2026 (Iowa)

Fund for Carbon County 2026 – Pennsylvania

Submit Applications for Rural Community Grant Fund (North Dakota)

Submit Applications for Benefit Fund (Virginia)

2026 Community Finance Initiative Fund

Belmont County Enrichment Fund 2026 (Ohio)

Anne Arundel County Community Support Grant 2027 (Maryland)

2026 Community Impact Grants Program (Ohio)

Welcoming Communities Grants Program – Pennsylvania

Call for Applications for George William Groh Trust Grant

Diamonds in the Rough Grants Program 2026 (Oregon)

2026 Historic Cemeteries Grants Program – Oregon

Preserving Oregon Grant Program 2026

Funds for NGOs
Funds for Companies
Funds for Media
Funds for Individuals
Sample Proposals

Contact us
Submit a Grant
Advertise, Guest Posting & Backlinks
Fight Fraud against NGOs
About us

Terms of Use
Third-Party Links & Ads
Disclaimers
Copyright Policy
General
Privacy Policy

About us

  • Sign up to be a Member
  • Contact
  • Subscribe
  • Submit Your Grant
  • Privacy Policy
  • Cookie Policy
  • Disclaimer
  • Terms of Service

©FUNDSFORNGOS LLC.   fundsforngos.org, fundsforngos.ai, and fundsforngospremium.com domains and their subdomains are the property of FUNDSFORNGOS, LLC 1018, 1060 Broadway, Albany, New York, NY 12204, United States.   Unless otherwise specified, this website is not affiliated with the abovementioned organizations. The material provided here is solely for informational purposes and without any warranty. Visitors are advised to use it at their discretion. Read the full disclaimer here. Privacy Policy. Cookie Policy.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}