Friday, January 10, 2025
HomeCyber Security NewsPowerSchool Hacked - Attackers Accessed Personal Data of Students and Teachers

PowerSchool Hacked – Attackers Accessed Personal Data of Students and Teachers

Published on

Walker County Schools has reported that unauthorized access to personal data belonging to students and educators was achieved through the company’s student information system vendor, PowerSchool.

Superintendent Damon Raines informed the community about the breach following an email notification from PowerSchool, detailing the incident that occurred on December 28, 2024.

Details of the Incident

According to PowerSchool’s communication, the company detected unauthorized access to its customer support portal, known as “PowerSource.”

While the investigation revealed that no malware was present and that the breach was limited to the PowerSource portal, the compromised data pertains to families and educators within the Walker County School system.

Here is the full email from PowerSchool shared by Walker County Schools
Here is the full email from PowerSchool shared by Walker County Schools

Raines assured that the situation was not indicative of ongoing threats, emphasizing that PowerSchool has implemented stringent security measures.

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

“PowerSchool has notified law enforcement and engaged cybersecurity experts to oversee the matter,” he stated. Furthermore, the institution confirmed that no additional PowerSchool products were affected by this breach.

PowerSchool has taken decisive steps to contain the situation, including isolating the access point and deactivating the compromised credentials.

They have also performed a full password reset for all accounts accessing the PowerSource portal. Superintendent Raines expressed confidence in PowerSchool’s proactive approach, stating, “They have taken all appropriate steps to prevent further unauthorized access or misuse.”

In their notification, PowerSchool reassured stakeholders that they do not expect the compromised data to be made public or used maliciously.

According to the Local3news reports, the company plans to provide credit monitoring services to affected adults and identity protection for impacted minors, by regulatory obligations.

Support for Affected Individuals

As part of its commitment to transparency and community support, PowerSchool will offer a communications package for school officials to inform families, educators, and other stakeholders about the incident.

This package will include outreach emails, FAQ documents, and talking points to facilitate discussions within the community.

Additionally, PowerSchool has scheduled webinars with senior leaders, including their Chief Information Security Officer, to address any concerns or questions regarding the incident.

These sessions are designed to equip school administrators with the information they need to reassure their communities about the breach and the measures being taken to mitigate potential impacts.

While the breach raises valid concerns about data security in educational environments, the swift response from both PowerSchool and Walker County Schools demonstrates a commitment to safeguarding personal information.

As the situation develops, ongoing communication and support will be crucial in restoring confidence among affected families and educators.

The authorities urge all individuals to remain vigilant and utilize the resources provided by PowerSchool to secure their personal information in the aftermath of this breach.

Find this News Interesting! Follow us on Google NewsLinkedIn, and X to Get Instant Updates!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

QSC: Multi-Plugin Malware Framework Installs Backdoor on Windows

The QSC Loader service DLL named "loader.dll" leverages two distinct methods to obtain the...

Weaponized LDAP Exploit Deploys Information-Stealing Malware

Cybercriminals are exploiting the recent critical LDAP vulnerabilities (CVE-2024-49112 and CVE-2024-49113) by distributing fake...

New NonEuclid RAT Evades Antivirus and Encrypts Critical Files

A NonEuclid sophisticated C# Remote Access Trojan (RAT) designed for the.NET Framework 4.8 has...

Hackers Targeting Users Who Lodged Complaints On Government portal To Steal Credit Card Data

Fraudsters in the Middle East are exploiting a vulnerability in the government services portal....

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

QSC: Multi-Plugin Malware Framework Installs Backdoor on Windows

The QSC Loader service DLL named "loader.dll" leverages two distinct methods to obtain the...

Weaponized LDAP Exploit Deploys Information-Stealing Malware

Cybercriminals are exploiting the recent critical LDAP vulnerabilities (CVE-2024-49112 and CVE-2024-49113) by distributing fake...

New NonEuclid RAT Evades Antivirus and Encrypts Critical Files

A NonEuclid sophisticated C# Remote Access Trojan (RAT) designed for the.NET Framework 4.8 has...