Tuesday, December 3, 2024
HomeComputer SecurityTwo 14-year-old Boys Hacked School WiFi Network to Avoid Exam

Two 14-year-old Boys Hacked School WiFi Network to Avoid Exam

Published on

SIEM as a Service

Two School students at a New Jersey high school Jamming their School WiFi Network on multiple times to avoid exams.

Both students were charged with the to commit computer criminal activity after school, both of the student’s name was not released.

In this case, they used an app or a computer program to take down the entire school WiFi network to on multiple occasions to get out of taking exams, Secaucus police said.

- Advertisement - SIEM as a Service

Most of the U.S school’s curriculum is internet-based, the lack of Wi-Fi connection disrupted the students’ daily assignments. 

Officials believe that both students got a request from other students to bring down the WiFi Network.

According to report from NJ, “Students interviewed Monday afternoon believe the boys used a Wi-Fi interrupter program, or an app, to send so much traffic to the routers that the system would crash, which ultimately caused connection failures when students tried to log on, do class work or take exams on their computers.”

“One day we were supposed to be doing work on our Chromebooks, but we had no activity whatsoever to do in class because the Wi-Fi shutdown,” said a student in the 10th grade at the 634-student high school on Millridge Road. “It interrupted the whole class, unfortunately.”

“Our Wi-Fi connection was compromised over the past week,” Schools Superintendent Jennifer Montesano said Monday. “The system has been restored and is now fully operational.”

Other students said that, If you don’t want to be in a test, you’re going to have to deal with it because he wasn’t the only one who wasn’t going to take that test. It was a whole class, NJ report.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

13-year-old School Student Hacked the Teachers Account To Steal Students Data

San Diego School District Hacked – 500,000 Students and Staff Data May Have been Stolen

UK Teen Got 3 Years Jailed for Bomb Threats Against 1,700 Schools, Aircraft With 295 Passengers & DDoS Attacks

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

PEFT-As-An-Attack, Jailbreaking Language Models For Malicious Prompts

Federated Parameter-Efficient Fine-Tuning (FedPEFT) is a technique that combines parameter-efficient fine-tuning (PEFT) with federated...

Hackers Cloning Websites, Exploiting RCE Flaws To Gain Access To Shopping Platforms

Cybercriminals are leveraging AI-powered phishing attacks, website cloning tools, and RCE exploits to target...

Hackers Exploited Windows Event Logs Tool log Manipulation, And Data Exfiltration

wevtutil.exe, a Windows Event Log management tool, can be abused for LOLBAS attacks. By...

Threat Actors Allegedly Claims Breach of EazyDiner Reservation Platform

Reports have emerged of a potential data breach involving EazyDiner, a leading restaurant reservation...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Poison Ivy APT Launches Continuous Cyber Attack on Defense, Gov, Tech & Edu Sectors

Researchers uncovered the resurgence of APT-C-01, also known as the Poison Ivy group, an...

Hackers Can Secretly Access ThinkPad Webcams by Disabling LED Indicator Light

In a presentation at the POC 2024 conference, cybersecurity expert Andrey Konovalov revealed a...

“Bootkitty” – A First Ever UEFI Bootkit Attack Linux Systems

Cybersecurity researchers have uncovered the first-ever UEFI bootkit designed to target Linux systems.This...