Cybersecurity Alert: Major Data Breach Exposes Millions of Records in Cloud Storage Misconfiguration
A significant data breach has exposed over 10 million sensitive records due to a misconfigured cloud storage bucket, security researchers at Wiz discovered on June 12, 2024. The incident involved an unsecured Amazon S3 bucket belonging to Brightly Software, a subsidiary of Siemens specializing in education and municipal management solutions.
The exposed data included personal information (PII) such as names, email addresses, phone numbers, and in some cases, student and staff records from K-12 schools and local government entities using Brightly’s SchoolDude and Cityworks platforms. Financial documents, internal communications, and system credentials were also found in the unprotected storage.
The misconfiguration stemmed from improper access controls, leaving the bucket publicly accessible without authentication. While there is no evidence of malicious exploitation, the exposure highlights persistent risks in cloud security, particularly for third-party vendors handling sensitive data. Brightly confirmed the breach after being notified by Wiz and secured the bucket within 24 hours, though the duration of the exposure remains unclear.
The incident underscores the growing threat of supply chain vulnerabilities, as organizations increasingly rely on external providers for critical infrastructure. Regulatory bodies, including state-level education and privacy agencies, are expected to review the breach’s compliance with FERPA (Family Educational Rights and Privacy Act) and other data protection laws. Siemens has not issued a public statement beyond acknowledging the remediation efforts.
Siemens TPRM report: https://www.rankiteo.com/company/lms-a-siemens-business
Brightly Software TPRM report: https://www.rankiteo.com/company/brightlysoftware
"id": "lmsbri1771280844",
"linkid": "lms-a-siemens-business, brightlysoftware",
"type": "Breach",
"date": "11/2025",
"severity": "85",
"impact": "4",
"explanation": "Attack with significant impact with customers data leaks"
{'affected_entities': [{'customers_affected': 'K-12 schools and local '
'government entities using '
'SchoolDude and Cityworks '
'platforms',
'industry': 'Education and Municipal Management '
'Solutions',
'name': 'Brightly Software',
'type': 'Subsidiary'},
{'industry': 'Industrial Manufacturing and Technology',
'name': 'Siemens',
'type': 'Parent Company'}],
'attack_vector': 'Misconfigured Cloud Storage',
'data_breach': {'data_exfiltration': 'No evidence of malicious exploitation',
'number_of_records_exposed': 'Over 10 million',
'personally_identifiable_information': ['Names',
'Email addresses',
'Phone numbers'],
'sensitivity_of_data': 'High (PII, financial documents, '
'credentials)',
'type_of_data_compromised': ['Personal Information (PII)',
'Student and staff records',
'Financial documents',
'Internal communications',
'System credentials']},
'date_detected': '2024-06-12',
'description': 'A significant data breach has exposed over 10 million '
'sensitive records due to a misconfigured cloud storage '
'bucket. The incident involved an unsecured Amazon S3 bucket '
'belonging to Brightly Software, a subsidiary of Siemens '
'specializing in education and municipal management solutions. '
'The exposed data included personal information (PII) such as '
'names, email addresses, phone numbers, and in some cases, '
'student and staff records from K-12 schools and local '
'government entities using Brightly’s SchoolDude and Cityworks '
'platforms. Financial documents, internal communications, and '
'system credentials were also found in the unprotected '
'storage.',
'impact': {'brand_reputation_impact': 'Potential reputational damage to '
'Brightly Software and Siemens',
'data_compromised': 'Over 10 million sensitive records',
'identity_theft_risk': 'High (exposure of PII)',
'legal_liabilities': 'Potential violations of FERPA and other data '
'protection laws',
'systems_affected': 'Amazon S3 bucket (Brightly Software)'},
'investigation_status': 'Ongoing (duration of exposure unclear)',
'lessons_learned': 'Highlights persistent risks in cloud security, '
'particularly for third-party vendors handling sensitive '
'data. Emphasizes the need for proper access controls and '
'supply chain vulnerability management.',
'post_incident_analysis': {'corrective_actions': 'Secured the bucket and '
'applied proper access '
'controls',
'root_causes': 'Misconfigured Amazon S3 bucket due '
'to improper access controls'},
'recommendations': 'Implement stricter access controls for cloud storage, '
'conduct regular security audits, and enhance third-party '
'vendor risk assessments.',
'references': [{'source': 'Wiz'}],
'regulatory_compliance': {'regulations_violated': ['FERPA (Family Educational '
'Rights and Privacy Act)',
'Potential state-level '
'data protection laws'],
'regulatory_notifications': 'Expected review by '
'state-level education '
'and privacy agencies'},
'response': {'communication_strategy': 'Limited public statement from '
'Siemens/Brightly',
'containment_measures': 'Bucket secured within 24 hours of '
'notification',
'remediation_measures': 'Access controls applied to the Amazon '
'S3 bucket',
'third_party_assistance': 'Wiz (security researchers)'},
'title': 'Major Data Breach Exposes Millions of Records in Cloud Storage '
'Misconfiguration',
'type': 'Data Breach',
'vulnerability_exploited': 'Improper access controls on Amazon S3 bucket'}