When PowerSchool announced in January that they had been the victim of a data breach in December 2024, they informed customers that they had paid the ransom and had witnessed the attackers deleting the compromised data. The explanation given in the PowerSchool-hosted webinar was that the attackers’ business model depended on victims trusting them to really delete the data in order for them to be able to viably collect ransoms from attacks in the future. Since then, we’ve all sort of been waiting for the other shoe to drop.
That shoe seems to have dropped.
Around 2pm EDT today, PowerSchool sent out notices to schools impacted by the December breach to warn them that individual school districts have begun to receive extortion demands from ShinyHunters, the same group that was responsible for the initial breach. PowerSchool does not believe this is a new breach, but that it is connected to the original December 2024 breach. So far, all the reports of this I’ve seen have come from North Carolina schools, but they have indicated that the data they’ve been shown as proof has been consistent with what was breached in December. Conjecture is that the extortion demands are being released in a rolling manner.
I’ll try to share additional information if I learn anything more, but K12SIX is actively investigating and sending notifications classified as TLP:Amber to members that are intended for internal use.
UPDATE: Databreaches.net posted a copy of the extortion message here. The site is currently down, though, so I’m posting a screenshot of the notice I grabbed earlier from Databreaches.net below at least until the site comes back up.
What actions do you need to take?
If your district was impacted by the December 2024 PowerSchool data breach, you may want to consider the following steps:
Be alert for extortion attempts
Monitor official district communication channels (email, contact forms, etc.) for any messages that appear to be extortion demands. These may be targeted and appear credible, using data from the original breach.Do not click links or open attachments
If you receive a message that appears to be an extortion attempt:Do not open links or attachments unless you are in a sandbox or other safe, isolated environment such as a malware analysis VM or a site like any.run or urlscan.io.
Immediately report the message to your cybersecurity team or managed service provider.
Notify key contacts
Alert your IT director, legal counsel, superintendent, and public information officer if your district receives a threat (or now, to let them know to be on the lookout)
If you have an incident response plan, activate it.
Contact your cyber insurance provider
Your policy may have specific instructions or limitations about responding to ransom demands, including prohibitions on negotiating or paying ransoms.Share Information
Share any threat indicators with K12SIX or your regional ISAC under appropriate TLP controls.
Credit monitoring for impacted individuals
PowerSchool continues to recommend signing up for the credit monitoring services offered in the original breach notification. If you haven’t already distributed that information to affected staff, students, or families, now is a good time.
RESOURCES:
Notification from PowerSchool, including communication template for stakeholders
Notice from North Carolina Department of Instruction
Bleeping Computer: PowerSchool hacker now extorting individual school districts