Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

The Unyielding Resurgence of Ransomware Attacks: A Growing Concern for Education Institutions



A recent high-profile ransomware attack has highlighted the ongoing concern for education institutions in terms of cybersecurity. PowerSchool's breach serves as a stark reminder of the need for proactive measures to protect against these types of attacks.

  • The PowerSchool educational software company was breached in December 2024, resulting in the theft of sensitive student and teacher data.
  • A total of 62.4 million students and 9.5 million teachers across 6,505 school districts in the US, Canada, and other countries were affected by the breach.
  • PowerSchool paid a ransom to prevent the public release of the stolen data, but it appears that this payment may not have been enough to secure their promise.
  • The same hackers who breached PowerSchool's systems made contact with multiple school districts, individually extorting them using the previously stolen data.
  • Security experts and ransomware negotiators are skeptical of PowerSchool's decision to pay a ransom, citing concerns about the effectiveness of this approach in securing data deletion.
  • The incident highlights the need for education institutions to take proactive measures to protect themselves against ransomware and data extortion attacks.



  • PowerSchool, a prominent educational software company, has found itself at the center of yet another high-profile ransomware attack. The recent breach, which occurred in December 2024, saw the company's databases compromised, leading to the theft of sensitive student and teacher data.

    The breach was initially detected on December 28, 2024, but it appears that the company had knowledge of the incident as early as August and September 2024. Using compromised credentials, threat actors gained access to the PowerSource customer support portal, which allowed them to connect to and download the school district's PowerSchool databases.

    These databases contained a vast array of sensitive information, including students' and faculty's full names, physical addresses, phone numbers, passwords, parent information, contact details, Social Security numbers, medical data, and grades. The breach was said to have affected 62.4 million students and 9.5 million teachers across 6,505 school districts in the United States, Canada, and other countries.

    In response to the breach, PowerSchool paid a ransom to prevent the public release of the stolen data. However, it appears that this payment may not have been enough to secure the company's promise. Recently, the same hackers who breached PowerSchool's systems made contact with multiple school districts, individually extorting them using the previously stolen data.

    "PowerSchool is aware that a threat actor has reached out to multiple school district customers in an attempt to extort them using data from the previously reported December 2024 incident," PowerSchool stated in a recent press release. "We do not believe this is a new incident. Regardless, we have reported this matter to law enforcement both in the United States and Canada and are working closely with the affected customers to support them."

    The company acknowledged that it had made the decision to pay the ransom demand in order to protect its customers. However, this move has been met with skepticism by security experts and ransomware negotiators.

    "Any organization facing a ransomware or data extortion attack has a very difficult and considered decision to make during a cyber incident of this nature," PowerSchool stated. "In the days following our discovery of the December 2024 incident, we made the decision to pay a ransom because we believed it to be in the best interest of our customers and the students and communities we serve."

    The company also acknowledged that the decision to pay the ransom was not taken lightly. "It was a difficult decision, and one which our leadership team did not make lightly," PowerSchool stated. "But we thought it was the best option for preventing the data from being made public, and we felt it was our duty to take that action."

    However, this move has raised concerns among security experts, who point out that there is no way to verify that data is deleted as promised after a ransom payment. Unlike a decryption key, which companies can confirm works, there is no way to adequately verify that data is deleted.

    This was recently seen in UnitedHealth's Change Healthcare ransomware attack, in which the company paid a ransom to the BlackCat ransomware gang to receive a decryptor and not leak data. However, after BlackCat pulled an exit scam, the affiliate behind the attack said they still had the data and extorted UnitedHealth once again.

    The recent resurgence of ransomware attacks highlights the ongoing concern for education institutions in terms of cybersecurity. The breach of PowerSchool's systems is just the latest in a string of high-profile incidents that have seen companies pay large sums of money to prevent the release of sensitive data.

    As security experts and policymakers continue to grapple with the complexities of ransomware and data extortion, one thing is clear: education institutions must take proactive measures to protect themselves against these types of attacks. This includes implementing robust cybersecurity measures, conducting regular security audits, and staying up-to-date on the latest threat intelligence.

    Ultimately, the decision to pay a ransom may seem like an easy way out for companies facing a cyber attack. However, this approach has proven to be short-sighted and ultimately costly in the long run. As PowerSchool's recent experience demonstrates, paying a ransom does not guarantee that data will be deleted or that the threat actor will keep their promise.

    In conclusion, the resurgence of ransomware attacks highlights the ongoing concern for education institutions in terms of cybersecurity. The breach of PowerSchool's systems serves as a stark reminder of the need for proactive measures to protect against these types of attacks. By staying vigilant and taking a proactive approach to cybersecurity, education institutions can minimize their risk of being targeted by ransomware and data extortion attacks.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/The-Unyielding-Resurgence-of-Ransomware-Attacks-A-Growing-Concern-for-Education-Institutions-ehn.shtml

  • https://www.bleepingcomputer.com/news/security/powerschool-hacker-now-extorting-individual-school-districts/

  • https://www.bleepingcomputer.com/news/security/powerschool-hack-exposes-student-teacher-data-from-k-12-districts/

  • https://www.yahoo.com/news/powerschool-says-hacker-deleted-student-105403410.html


  • Published: Wed May 7 13:35:38 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us