Saturday, July 20, 2024
EHA

Two 14-year-old Boys Hacked School WiFi Network to Avoid Exam

Two School students at a New Jersey high school Jamming their School WiFi Network on multiple times to avoid exams.

Both students were charged with the to commit computer criminal activity after school, both of the student’s name was not released.

In this case, they used an app or a computer program to take down the entire school WiFi network to on multiple occasions to get out of taking exams, Secaucus police said.

Most of the U.S school’s curriculum is internet-based, the lack of Wi-Fi connection disrupted the students’ daily assignments. 

Officials believe that both students got a request from other students to bring down the WiFi Network.

According to report from NJ, “Students interviewed Monday afternoon believe the boys used a Wi-Fi interrupter program, or an app, to send so much traffic to the routers that the system would crash, which ultimately caused connection failures when students tried to log on, do class work or take exams on their computers.”

“One day we were supposed to be doing work on our Chromebooks, but we had no activity whatsoever to do in class because the Wi-Fi shutdown,” said a student in the 10th grade at the 634-student high school on Millridge Road. “It interrupted the whole class, unfortunately.”

“Our Wi-Fi connection was compromised over the past week,” Schools Superintendent Jennifer Montesano said Monday. “The system has been restored and is now fully operational.”

Other students said that, If you don’t want to be in a test, you’re going to have to deal with it because he wasn’t the only one who wasn’t going to take that test. It was a whole class, NJ report.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

13-year-old School Student Hacked the Teachers Account To Steal Students Data

San Diego School District Hacked – 500,000 Students and Staff Data May Have been Stolen

UK Teen Got 3 Years Jailed for Bomb Threats Against 1,700 Schools, Aircraft With 295 Passengers & DDoS Attacks

Website

Latest articles

Hackers Claiming Dettol Data Breach: 453,646 users Impacted

A significant data breach has been reported by a threat actor known as 'Hana,'...

CrowdStrike Update Triggers Widespread Windows BSOD Crashes

A recent update from cybersecurity firm CrowdStrike has caused significant disruptions for Windows users,...

Operation Spincaster Disrupts Approval Phishing Technique that Drains Victim’s Wallets

Chainalysis has launched Operation Spincaster, an initiative to disrupt approval phishing scams that have...

Octo Tempest Know for Attacking VMWare ESXi Servers Added RansomHub & Qilin to Its Arsenal

Threat actors often attack VMware ESXi servers since they accommodate many virtual machines, which...

TAG-100 Actors Using Open-Source Tools To Attack Gov & Private Orgs

Hackers exploit open-source tools to execute attacks because they are readily available, well-documented, and...

macOS Users Beware Of Weaponized Meeting App From North Korean Hackers

Meeting apps are often targeted and turned into weapons by hackers as they are...

Hackers Exploiting Legitimate RMM Tools With BugSleep Malware

Since October 2023, MuddyWater, which is an Iranian threat group linked to MOIS, has...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles