Tuesday, March 4, 2025
HomeSecurity NewsStudents Hacked into High School System to Change Grades, Get Lunch Purchases...

Students Hacked into High School System to Change Grades, Get Lunch Purchases Refund

Published on

SIEM as a Service

Follow Us on Google News

Students hacked into Bloomfield Hills High School by exploiting a vulnerability in the system to manipulate their personal grades, attendance and lunch balance information.

They hacked into the student’s information system “MISTAR” that hosts the Student information data, Bloomfield believes that the unauthorized changes made within MISTAR impact more than 20 high school students record in some way.

Bloomfield hired a third-party forensic investigator and the investigation in progress. As a precaution measure, the school resets all Parent Portal passwords on Friday and mailed to all parents detailing the incident and how to change their password upon returning to the system.

“One of our employees who uses the system noticed something unusual upon logging in and then asked some questions and referred it to our helpdesk, and they started digging and found out what was going on,” Superintendent Robert Glass said.

According to school Superintendent, “the consequences to these young individuals are likely to be severe, Our highest priority is our students – their safety, their needs, and their overall education. That said, we also have a responsibility to you, the parents and guardians of our students.”

“Due to student privacy laws, we’re not able to disclose more information but we can assure you that we’re working within the full extent of the Student Code of Conduct and the full extent of the law.” Glass said.

Glass concluded with an apology saying he’s “embarrassed that students from our school districts thought to use their technology skills and their talents to selfishly manipulate grades and other district data for personal gains.”

Bloomfield Hills High School published a YouTube video and a popup statement on their website as a warning for other students. We take seriously our responsibility to gather and restore your information, now the student information system is safe and the vulnerability has been resolved Glass said.

Cybercrime is affecting the personal, educational and financial lives of millions of students each year, yet 66% of Indian educational institutions spend just 5 to 15% of their IT budget on securing their systems.

Last December Tenafly High School Students hacked his school computer system and changed several of his grades and his overall GPA.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Microsoft Strengthens Trust Boundary for VBS Enclaves

Microsoft has introduced a series of technical recommendations to bolster the security of Virtualization-Based...

Hackers Exploiting Business Relationships to Attack Arab Emirates Aviation Sector

A sophisticated cyber espionage campaign targeting the aviation and satellite communications sectors in the...

Microsoft Removing DES Encryption from Windows 11 24H2 and Windows Server 2025″

Microsoft has announced the removal of the Data Encryption Standard (DES) encryption algorithm from...

Researchers Unveil APT28’s Advanced HTA Trojan Obfuscation Tactics

Security researchers have uncovered sophisticated obfuscation techniques employed by APT28, a Russian-linked advanced persistent...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

49,000+ Access Management Systems Worldwide Exposed to Major Security Gaps

A recent study conducted by Dutch IT security consultancy Modat has revealed alarming vulnerabilities...

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most...

Check Point Software to Open First Asia-Pacific R&D Centre in Bengaluru, India

Check Point Software Technologies Ltd. has announced plans to establish its inaugural Asia-Pacific Research...