Monday, February 24, 2025
HomeComputer SecurityTwo 14-year-old Boys Hacked School WiFi Network to Avoid Exam

Two 14-year-old Boys Hacked School WiFi Network to Avoid Exam

Published on

SIEM as a Service

Follow Us on Google News

Two School students at a New Jersey high school Jamming their School WiFi Network on multiple times to avoid exams.

Both students were charged with the to commit computer criminal activity after school, both of the student’s name was not released.

In this case, they used an app or a computer program to take down the entire school WiFi network to on multiple occasions to get out of taking exams, Secaucus police said.

Most of the U.S school’s curriculum is internet-based, the lack of Wi-Fi connection disrupted the students’ daily assignments. 

Officials believe that both students got a request from other students to bring down the WiFi Network.

According to report from NJ, “Students interviewed Monday afternoon believe the boys used a Wi-Fi interrupter program, or an app, to send so much traffic to the routers that the system would crash, which ultimately caused connection failures when students tried to log on, do class work or take exams on their computers.”

“One day we were supposed to be doing work on our Chromebooks, but we had no activity whatsoever to do in class because the Wi-Fi shutdown,” said a student in the 10th grade at the 634-student high school on Millridge Road. “It interrupted the whole class, unfortunately.”

“Our Wi-Fi connection was compromised over the past week,” Schools Superintendent Jennifer Montesano said Monday. “The system has been restored and is now fully operational.”

Other students said that, If you don’t want to be in a test, you’re going to have to deal with it because he wasn’t the only one who wasn’t going to take that test. It was a whole class, NJ report.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

13-year-old School Student Hacked the Teachers Account To Steal Students Data

San Diego School District Hacked – 500,000 Students and Staff Data May Have been Stolen

UK Teen Got 3 Years Jailed for Bomb Threats Against 1,700 Schools, Aircraft With 295 Passengers & DDoS Attacks

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Stablecoin Bank Hit by Cyberattack, Loses $49.5M to Hackers

The cryptocurrency sector faced one of its most significant security breaches this year as...

GhostSocks Malware Uses SOCKS5 Proxy to Evade Detection Systems

GhostSocks, a Golang-based SOCKS5 backconnect proxy malware, has emerged as a significant threat within...

LockBit Ransomware Strikes: Exploiting a Confluence Vulnerability

In a swift and highly coordinated attack, LockBit ransomware operators exploited a critical remote...

Fake ChatGPT Premium Phishing Scam Spreads to Steal User Credentials

A sophisticated phishing campaign impersonating OpenAI’s ChatGPT Premium subscription service has surged globally, targeting...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Check Point Software to Open First Asia-Pacific R&D Centre in Bengaluru, India

Check Point Software Technologies Ltd. has announced plans to establish its inaugural Asia-Pacific Research...

Threat Actors Trojanize Popular Games to Evade Security and Infect Systems

A sophisticated malware campaign was launched by cybercriminals, targeting users through trojanized versions of...

New FUD Malware Targets MacOS, Evading Antivirus and Security Tools

A new strain of Fully Undetectable (FUD) macOS malware, dubbed "Tiny FUD," has emerged,...