3.9 million student and staff records spilled in 2025 education ransomware alone—a 27% jump that Q1 2026 refused to let fade.
U.S. public sector cyber threats didn’t just simmer; they boiled over, from nation-state spies in Congress to ransomware ghosts haunting state welfare systems. And here’s the kicker: this isn’t random chaos. It’s architectural—attackers exploiting the same brittle seams in government tech that’ve plagued us since the dial-up days.
Salt Typhoon’s Congressional Sneak-In: How Deep Did They Go?
Picture this: January 9, 2026. SC Media drops the bomb—China’s Salt Typhoon, fresh off telecom carrier hacks, now owns emails of U.S. House Committee staffers eyeballing China’s foreign policy. National security oversight? Compromised. Foreign affairs deliberations? Likely overheard.
FBI brass admitted in February it’s “still very much ongoing.” Ongoing. That’s not a breach; that’s occupation.
“Salt Typhoon’s operations are confirmed ‘still very much ongoing’ per FBI leadership as recently as February 2026.”
AT&T and Verizon? They stonewalled report releases, per a senator’s reveal. Transparency? Ha—more like telecoms shielding their flanks while Congress bleeds intel.
But why Congress, why now? Salt Typhoon pairs this with UAT-7290’s edge device exploits on telcos. It’s a visibility play: scoop policy chatter, map decision trees, feed it back to Beijing. Long-term? A counterintelligence gut-punch, echoing Stuxnet’s blowback but inverted—espionage, not sabotage.
My take: this mirrors the Soviet mole hunts of the Cold War, but digitized. Back then, it took years to root out traitors; today, it’s persistent access via unpatched Cisco routers. Trump’s incoming doctrine? It greenlights private-sector counter-hacks. Bold—but risky. Could spark a cyber Wild West where firms like CrowdStrike go rogue-offensive.
Why Education Can’t Shake Ransomware’s Grip
251 global education ransomware hits in 2025. U.S. took 130—half the world’s pain. Average breach cost? $3.80 million. And 59% saw full data exfil before encryption. Brutal math.
Q1 2026? No fresh apocalypse, but the hangover lingers. Aging servers, shoestring IT budgets, patchwork security—schools are piñatas for LockBit wannabes now wielding AI scouts.
Here’s the why: fragmented districts mean no unified defense. One school’s Active Directory flaw becomes everybody’s headache. Attackers automate with gen-AI phishing kits, probing thousands overnight. It’s not skill; it’s scale.
Unique angle—they’re not just encrypting; they’re doxxing. Leaked SSNs, health records, donor lists. Kids’ futures auctioned on BreachForums. Public sector leaders tout “resilience,” but it’s PR spin. Real fix? Mandate zero-trust architectures, but good luck herding 13,000 districts.
Short para: Stabilizing attack counts? Cold comfort.
Deeper dive: 2025’s wave hit higher-ed hardest, but K-12’s next. Under-resourced admins clicking phishing links during back-to-school chaos. Prediction: Q2 spikes unless feds enforce the June 2025 EO’s nation-state shields downward.
State Governments: Misconfigs and Exposed Welfare Data
January 3, Illinois DHS. Misconfig exposes PII for benefits recipients—names, addresses, income data. January 21, Minnesota DHS. Internal access gone wild, same sensitive spill.
Not sexy nation-state op. Just sloppiness. But in aggregate? Death by a thousand misconfigs.
These aren’t isolated; they’re systemic. State systems run on legacy SAP, unpatched Windows, exposed S3 buckets. Attackers? Opportunistic, sure—but state-aligned crews fish here too.
Trump’s Cyber Strategy: Deterrence or Escalation?
March 6, 2026. “President Trump’s Cyber Strategy for America” drops with an EO on cybercrime. Key shifts: private offensive ops get leeway. Ransomware, state criminals, nation-states named enemies. Public-private mashups mandatory.
It’s acknowledgment—we’re in cyberwar, not drill. Builds on 2025’s EO.
But critique: greater private latitude? Sounds empowering—Palantir hacking back at Salt Typhoon. Reality? Unintended blowback. Firms chase bounties, hit wrong targets, ignite PRC retaliation on critical infra.
Historical parallel: Reagan’s SDI spooked Soviets into collapse. Trump’s play? Cyber SDI—offense as shield. Bold prediction: by 2027, we’ll see first private-sector attributions naming China publicly, forcing diplomatic firestorms.
Public sector CISOs: align now. Ditch siloed tools for fed-private intel shares. Hunt anomalies in comms logs—Salt Typhoon’s calling card.
Wider why: policy catches reality. Hostile environment automated via AI, targeted via OSINT. Breaches compound—telecom sightlines plus email dumps equal policy previews.
Actionable? Prioritize edge hardening, AI-driven anomaly hunts, cross-sector tabletop sims mimicking Salt Typhoon persistence.
🧬 Related Insights
- Read more: Feds Smash Four IoT Botnets That Powered DDoS Attacks Big Enough to Black Out the DoD
- Read more: Adobe Acrobat Zero-Day Lurks for Months, Hits Russian Energy Targets
Frequently Asked Questions
What is Salt Typhoon and why target Congress?
Salt Typhoon’s a PRC-linked group hitting US telcos and now House emails on China policy. Goal: persistent intel on deliberations—think digital wiretaps for geopolitics.
Are ransomware attacks on US schools getting worse in 2026?
Counts stabilized post-2025 peak (130 US hits), but exposures linger at millions of records. Legacy vulns and AI tools keep ‘em juicy targets.
What does Trump’s Cyber Strategy mean for state governments?
Greenlights aggressive defense, private partnerships, ransomware crackdowns. States get fed muscle—but must plug misconfigs fast or face blame.