Tuesday, March 4, 2025
HomeCyber AttackSchoolDude Hacked - Over 3 million Users Records Exposed

SchoolDude Hacked – Over 3 million Users Records Exposed

Published on

SIEM as a Service

Follow Us on Google News

The Office of the Main Attorney General of Maine reported that there was a data breach in one of the Brightly-owned Software on 20th April 2023, which was discovered 8 days later.

Brightly Inc is a Software company founded in 1999 by Siemens. It is one of the leading global Software-as-a-service (SaaS) platforms that provides management solutions to education, government, healthcare, manufacturing, and many others.

According to reports, the SchoolDude application was hacked, and nearly 3 million records were exposed.

SchoolDude was an online platform used by Educational institutions to maintain their work records. It was built and developed by Brightly Software Inc, 

Threat actors have extracted sensitive customer information like Name, Address, Account Password, Phone number, and School District Name.

Brightly has notified all affected users regarding this security incident and requested them to change their passwords before logging in to the applications.

Brightly Inc.’s email stated, “As part of our remediation efforts, please note that we have reset the passwords for all SchoolDude user accounts. Therefore, You will need to change your password to continue using the application.

In addition to this, Brightly also mentioned that they had informed the authorities regarding this data breach and have also been working with Industry-leading security experts to investigate this issue. 

With growing threats to data, it is important to implement security measures and educate all users about phishing campaigns.

The email sent by Brightly also mentioned its users to be vigilant towards phishing campaigns and requested their users not to respond to suspicious emails.

It also informed the users to reset their passwords on other applications if they have used the same password for all of them.

Investigation into this incident is still going on and Brightly said they are committed to addressing any user concerns.

Struggling to Apply The Security Patch in Your System? – 
Try All-in-One Patch Manager Plus

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

BigAnt Server 0-Day Vulnerability Lets Attackers Run Malicious Code Remotely

A critical vulnerability in BigAntSoft's enterprise chat server software has exposed ~50 internet-facing systems...

Bubba AI, Inc. is Launching Comp AI to Help 100,000 Startups Get SOC 2 Compliant by 2032.

With the growing importance of security compliance for startups, more companies are seeking to...

IBM Storage Virtualize Flaws Allow Remote Code Execution

Two critical security flaws in IBM Storage Virtualize products could enable attackers to bypass...

Progress WhatsUp Gold Path Traversal Vulnerability Exposes Systems to Remote code Execution

A newly disclosed path traversal vulnerability (CVE-2024-4885) in Progress Software’s WhatsUp Gold network monitoring...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

BigAnt Server 0-Day Vulnerability Lets Attackers Run Malicious Code Remotely

A critical vulnerability in BigAntSoft's enterprise chat server software has exposed ~50 internet-facing systems...

IBM Storage Virtualize Flaws Allow Remote Code Execution

Two critical security flaws in IBM Storage Virtualize products could enable attackers to bypass...

Progress WhatsUp Gold Path Traversal Vulnerability Exposes Systems to Remote code Execution

A newly disclosed path traversal vulnerability (CVE-2024-4885) in Progress Software’s WhatsUp Gold network monitoring...