Fraud Management and Cybercrime: Lessons from a Recent Ransomware Attack
On January 10, 2025, PowerSchool, a significant provider of K-12 student information systems, revealed a data breach that has raised concerns among schools, students, and parents. The California-based company reported that unauthorized actors had stolen vast amounts of student data and were holding it to ransom. PowerSchool’s platform plays a critical role in managing key school operations, including enrollment, attendance, and communications. However, the extent of the affected school districts and the students involved remains unclear.
As of February 2024, PowerSchool claimed to support over 50 million students across more than 17,000 clients globally, including a majority of the top 100 U.S. school districts. The company was acquired by Bain Capital in October for $5.6 billion, transitioning to private ownership. The stolen data reportedly includes sensitive personally identifiable information of students and teachers, such as birthdates and contact information. For some districts, this breach may extend to Social Security numbers, medical records, and academic grades.
In response to the breach, PowerSchool informed stakeholders that it had compensated the attackers with a promise from them to delete the stolen data. Remarkably, the attackers even provided a video ostensibly showing the data’s deletion. PowerSchool reassured parents and guardians through communications that they had implemented necessary measures to guard against further unauthorized access, asserting confidence that the data would not be disseminated.
Despite these claims, analysis of activity logs revealed suspicious events dating back to December 22, 2024, including exfiltration of data to an IP address traced back to a legitimate Ukrainian hosting provider. PowerSchool became aware of the breach on December 28, 2024, and subsequently enlisted a cybersecurity consulting firm to engage with the attackers.
Security experts emphasize that paying a ransom does not guarantee compliance from the attackers nor does it alleviate the risks surrounding the stolen data. Historical evidence suggests that online extortionists often fail to fulfill their promises of data destruction. For instance, the LockBit group was found to have not deleted data from victims who had paid ransoms. Despite pressing warnings from authorities not to accede to such demands, many organizations still opt for payment, perhaps as a misguided effort to mitigate the fallout of the breach.
This incident underscores the critical need for robust cybersecurity measures, particularly those that include multifactor authentication to prevent unauthorized access using compromised credentials. The U.S. Cybersecurity and Infrastructure Security Agency continues to advocate for phishing-resistant mechanisms to safeguard against similar breaches.
As companies like PowerSchool grapple with the complexities of cyber vulnerabilities, the broader lessons become clear: the importance of proactive security strategies and the futility of appeasing attackers. Adhering to best practices not only fortifies defenses but also conveys accountability in the face of cybersecurity threats.