PowerSchool

PowerSchool

In December 2024, PowerSchool suffered a **ransomware-driven data breach** via its **PowerSource customer support portal**, which lacked multifactor authentication. Threat actors exfiltrated a dataset containing **student and staff names, contact details, Social Security numbers, medical notes, and limited passwords** from its **Student Information System**, impacting **60+ million students and 18,000 educational customers** across North America and Canada.PowerSchool **paid an undisclosed ransom** to prevent public exposure, but the actors later **extorted four school districts** using the same stolen data, contradicting PowerSchool’s earlier claim that the data was destroyed. The breach triggered **class-action lawsuits**, regulatory scrutiny, and **free credit monitoring for victims**. The FBI is investigating, while North Carolina’s education department refused to engage with attackers, citing legal prohibitions. The incident highlights failures in **access controls** and **ransomware response**, with ongoing risks of **identity theft, fraud, and reputational damage** for schools and families.

Source: https://www.cybersecuritydive.com/news/powerschool-data-breach-school-extortion-attempts/747801/

TPRM report: https://www.rankiteo.com/company/powerschool-group-llc

"id": "pow14104514112725",
"linkid": "powerschool-group-llc",
"type": "Ransomware",
"date": "12/2024",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization’s existence"
{'affected_entities': [{'customers_affected': '60,000,000+ (students) + 18,000 '
                                              '(schools/districts)',
                        'industry': 'Education Technology',
                        'location': 'Global (HQ: Folsom, California, USA)',
                        'name': 'PowerSchool',
                        'size': 'Serves 60M+ students, 18K+ educational '
                                'customers',
                        'type': 'EdTech Software Provider'},
                       {'industry': 'Public Education',
                        'location': 'North Carolina, USA',
                        'name': 'North Carolina Department of Public '
                                'Instruction (NCDPI)',
                        'type': 'State Education Agency'},
                       {'industry': 'Education',
                        'location': 'Toronto, Canada',
                        'name': 'Toronto School District (unspecified)',
                        'type': 'School District'},
                       {'industry': 'Education',
                        'location': ['North America (specific locations '
                                     'undisclosed)'],
                        'name': 'Three additional unnamed school districts',
                        'type': 'School Districts'}],
 'attack_vector': ['Unauthorized access via PowerSource customer support '
                   'portal',
                   'Lack of multifactor authentication (MFA)'],
 'customer_advisories': ['Free credit monitoring/identity protection offered',
                         'Direct support to contacted schools'],
 'data_breach': {'data_exfiltration': 'Confirmed',
                 'personally_identifiable_information': ['Names',
                                                         'Contact details',
                                                         'SSNs (limited)',
                                                         'Medical notes'],
                 'sensitivity_of_data': 'High (SSNs, medical notes, passwords)',
                 'type_of_data_compromised': ['Personally Identifiable '
                                              'Information (PII)',
                                              'Protected Health Information '
                                              '(PHI)',
                                              'Credentials']},
 'date_detected': '2024-12-28',
 'date_publicly_disclosed': '2025-01-00',
 'description': "Threat actors breached PowerSchool's Student Information "
                'System in December 2024, stealing teacher and student data '
                '(including names, contact info, SSNs, medical notes, and '
                'passwords). The company paid a ransom, but threat actors '
                'later used the same dataset to extort four school districts '
                'across North America. The breach impacted ~60M students and '
                '18K educational customers. PowerSchool lacked MFA on its '
                'PowerSource support portal, the initial attack vector. The '
                'FBI is investigating, and class-action lawsuits have been '
                'filed.',
 'impact': {'brand_reputation_impact': 'Severe (public criticism, lawsuits, '
                                       'loss of trust)',
            'customer_complaints': ['Public pushback', 'Class-action lawsuits'],
            'data_compromised': ['Student/teacher names',
                                 'Contact information',
                                 'Social Security numbers (limited)',
                                 'Medical notes',
                                 'Passwords (limited)'],
            'identity_theft_risk': 'High (SSNs and personal data exposed)',
            'legal_liabilities': ['Class-action lawsuits',
                                  'Potential regulatory fines'],
            'operational_impact': ['Extortion threats to 4 school districts',
                                   'Ongoing FBI investigation',
                                   'Class-action lawsuits'],
            'systems_affected': ['PowerSchool Student Information System',
                                 'PowerSource customer support portal']},
 'initial_access_broker': {'data_sold_on_dark_web': 'Unconfirmed (but used for '
                                                    'extortion)',
                           'entry_point': 'PowerSource customer support portal '
                                          '(lack of MFA)',
                           'high_value_targets': ['Student/teacher PII',
                                                  'SSNs',
                                                  'Medical records']},
 'investigation_status': 'Ongoing (FBI-led)',
 'lessons_learned': ['Criticality of MFA for sensitive portals',
                     'Risks of paying ransoms (data not guaranteed to be '
                     'deleted)',
                     'Need for transparent communication with stakeholders'],
 'motivation': ['Financial gain (ransom payment)',
                'Data extortion from schools'],
 'post_incident_analysis': {'corrective_actions': ['MFA implementation '
                                                   '(presumed)',
                                                   'Credit monitoring for '
                                                   'victims',
                                                   'Collaboration with law '
                                                   'enforcement'],
                            'root_causes': ['Absence of MFA on critical portal',
                                            'Inadequate access controls',
                                            'Over-reliance on threat actor '
                                            'assurances post-ransom']},
 'ransomware': {'data_exfiltration': 'Confirmed (December 2024 breach)',
                'ransom_demanded': ['Initial ransom paid by PowerSchool '
                                    '(amount undisclosed)',
                                    'Subsequent extortion demands to 4 school '
                                    'districts (amounts undisclosed)'],
                'ransom_paid': 'Yes (by PowerSchool; schools refused per NC '
                               'law)'},
 'recommendations': ['Implement MFA universally',
                     'Avoid ransom payments (per FBI guidance)',
                     'Enhance third-party vendor security audits',
                     'Proactive credit monitoring for victims'],
 'references': [{'source': 'K-12 Dive'},
                {'source': 'PowerSchool Public Statement (May 2025)'},
                {'source': 'North Carolina Department of Public Instruction '
                           '(NCDPI) Statement'}],
 'regulatory_compliance': {'legal_actions': ['Class-action lawsuits',
                                             'Potential violations of North '
                                             'Carolina law (if schools paid '
                                             'ransom)'],
                           'regulatory_notifications': ['FBI notified',
                                                        'Affected '
                                                        'schools/districts '
                                                        'notified']},
 'response': {'communication_strategy': ['Public statements (January 2025, May '
                                         '2025)',
                                         'Direct outreach to affected schools'],
              'incident_response_plan_activated': 'Yes',
              'law_enforcement_notified': 'Yes (FBI investigation ongoing)',
              'remediation_measures': ['Free credit monitoring/identity '
                                       'protection for victims',
                                       'Collaboration with affected schools'],
              'third_party_assistance': ['Law enforcement (FBI)',
                                         'Credit monitoring/identity '
                                         'protection providers']},
 'stakeholder_advisories': ['PowerSchool urged schools not to engage with '
                            'threat actors',
                            'NCDPI prohibited ransom payments under state law'],
 'title': 'PowerSchool Student Information System Data Breach and Extortion '
          'Attempts',
 'type': ['Data Breach', 'Ransomware', 'Extortion'],
 'vulnerability_exploited': 'Absence of MFA on PowerSource portal'}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.