Article Details
Scrape Timestamp (UTC): 2025-01-09 00:46:34.446
Source: https://www.theregister.com/2025/01/09/powerschool_school_data/
Original Article Text
Click to Toggle View
Database tables of student, teacher info stolen from PowerSchool in cyberattack. Class act: Biz only serves 60M people across America, no biggie. A leading education software maker has admitted its IT environment was compromised in a cyberattack, with students and teachers' personal data – including some Social Security Numbers and medical info – stolen. PowerSchool says its student information system is used by 18,000 customers across America to handle grading, attendance records, and personal information of more than 60 million K-12 students and teachers. On December 28 someone managed to get into its systems and access their contents "using a compromised credential," the biz told its clients in an email seen by Register this week. "I would love to see some more reporting on this serious security breach that occurred to one of the largest student information system vendors," one school CTO told El Reg today, adding: "PowerSchool is likely in violation of their signed data privacy agreements with school districts. There are also a few laws that deal with student privacy at the federal and state level." The executive said the software developer had taken nearly two weeks to alert customers, and that work was now underway at their school to determine the full extent of the intrusion. The unauthorized actor extracted two tables within the student information system database PowerSchool, meanwhile, told us someone was able to use that aforementioned stolen credential to copy people's private info from its information system. "We believe the unauthorized actor extracted two tables within the student information system database," a spokesperson told us. "These tables primarily include contact information with data elements such as name and address information for families and educators. "For a certain subset of the customers, these tables may also include Social Security Number, other personally identifiable information, and limited medical and grade information. Not all PowerSchool student information system customers were impacted, and we anticipate that only a subset of impacted customers will have notification obligations." Do you know about a security breach that needs to be told? Email us in confidence, or use this secure form. The supplier did say this wasn't an attack involving ransomware or exploit code, rather a straightforward network penetration. It has called in an independent security shop to carry out a full audit of its systems, and figured what happened exactly and who has been affected. "We do not anticipate the data being shared or made public, and we believe it has been deleted without any further replication or dissemination," the developer told customers. "We have also deactivated the compromised credential and restricted all access to the affected portal. Lastly, we have conducted a full password reset and further tightened password and access control for all PowerSource customer support portal accounts." PowerSchool said any adults affected would be receiving free credit monitoring, while minors would get subscriptions to an unnamed identity protection services biz "in accordance with regulatory and contractual obligations." Interestingly enough, security outfit Cyble thinks the intrusion may have been more serious and gone on much longer than has been publicly acknowledged so far. The cybersecurity vendor has been monitoring black-hat hacking forums, and says from that research it appears the break-in could have occurred as far back as June 16, 2011, and that the digital trespassing ended on January 2 of this year. Cyble's threat intelligence veep Kaustubh Medhe said it has seen evidence of "data-stealing malware designed to infiltrate systems and extract valuable information" being used against PowerSchool employees and/or its users. "Critical systems and applications such as Oracle Netsuite ERP, HR software UltiPro, Zoom, Slack, Jira, GitLab, and sensitive credentials for platforms like Microsoft login, LogMeIn, Windows AD Azure, and BeyondTrust" may have been compromised as a result, we're told. We've asked PowerSchool for a response to Cyble's findings.
Daily Brief Summary
PowerSchool, a leading education software provider, was the victim of a cyberattack which resulted in the theft of student and teacher data, including Social Security numbers and medical information.
The incident compromised personal information stored in 18,000 customer databases, impacting over 60 million K-12 students and educators across the United States.
The breach occurred on December 28, with unauthorized access gained using a compromised credential; it took nearly two weeks for PowerSchool to notify its customers.
Two specific database tables were extracted, primarily containing contact information, but for some, included sensitive data like Social Security numbers, and limited medical and grade information.
PowerSchool has engaged an independent security firm to conduct a full audit of its systems to understand the extent and specifics of the breach.
There is a belief by PowerSchool that the compromised data has not been shared or made public, and preventive actions like password resets and access restrictions have been implemented.
Affected adults are being offered free credit monitoring services, while minors will receive subscriptions to identity protection services.
Cybersecurity firm Cyble suggests the breach may have started as early as June 2011, potentially affecting more systems and credentials than initially reported.