
The December 2024 cyberattack against PowerSchool, a major K-12 education technology provider, has taken a dangerous new turn. The hacker responsible for the breach is now directly extorting individual school districts, threatening to release stolen student and teacher data unless ransom payments are made1. This development contradicts PowerSchool’s earlier claims that the stolen data had been deleted after the company paid an initial ransom demand2.
Breach Timeline and Technical Details
The initial breach occurred in December 2024 when attackers gained access to PowerSchool’s systems through compromised credentials to PowerSource, the company’s customer support portal. A CrowdStrike audit revealed the breach stemmed from a single employee account that lacked multi-factor authentication (MFA)3. The attackers exfiltrated sensitive data including names, addresses, Social Security numbers, medical records, grades, and disciplinary records affecting approximately 62 million students and 9.5 million teachers across 6,505 U.S. and Canadian districts1.
In May 2025, the situation escalated when the hacker began contacting school districts directly with ransom demands. For example, North Carolina districts were reportedly asked for 25 Bitcoin2. PowerSchool acknowledged these extortion attempts but maintained that the data being threatened matched what was stolen in the December breach, suggesting no new intrusion had occurred4.
Security Failures and Response
The breach highlights several critical security failures. Despite being a signatory to the Student Privacy Pledge, PowerSchool failed to implement MFA universally across its systems3. The company’s response included offering two years of free credit monitoring to affected individuals and admitting that paying the initial ransom was a “difficult decision” with no guarantee of data deletion5.
Over 200 school districts in Indiana and others nationwide, including San Diego and Lenox, have been notifying affected families6. The breach has prompted immediate security recommendations for schools using PowerSchool:
- Disable remote maintenance in PowerSchool consoles
- Reset all passwords and enforce MFA for all accounts
- Conduct penetration tests and partner with cybersecurity consultants
- Communicate transparently with stakeholders about risks and protections
Legal and Regulatory Consequences
The breach has led to significant legal and regulatory fallout. Brooks Kushman filed a class-action lawsuit against PowerSchool for allegedly failing to protect nearly 60 million students’ data7. The company’s compliance with the Student Privacy Pledge is under review by the Future of Privacy Forum8.
This incident follows a pattern seen in other major breaches, such as the UnitedHealth Change Healthcare case, where paying ransoms failed to prevent secondary extortion attempts1. The PowerSchool breach underscores the vulnerabilities in third-party vendor systems and the need for stricter cybersecurity mandates in education technology.
Conclusion
The PowerSchool breach and subsequent extortion attempts against school districts demonstrate the evolving tactics of cybercriminals targeting educational institutions. The incident serves as a stark reminder of the importance of basic security measures like MFA and the risks associated with paying ransoms. As legal actions progress and regulatory scrutiny intensifies, this case may set new precedents for data protection requirements in the education sector.
Schools and educational technology providers must prioritize proactive cybersecurity measures, including regular audits, penetration testing, and clear communication with all stakeholders about data protection practices and potential risks.
References
- “PowerSchool hacker now extorting individual school districts,” BleepingComputer, May 2025.
- “PowerSchool paid a hacker’s extortion demand, but now school district clients are being extorted anyway,” DataBreaches.net, May 7, 2025.
- “PowerSchool hack: Data breach puts student, school, teacher data at risk,” NBC News, May 2025.
- “PowerSchool says hacker deleted student, teacher records obtained in breach,” WSOC TV, May 2025.
- “PowerSchool data breach exposes millions of student, teacher records,” Cybersecurity Dive, May 2025.
- “200 Indiana districts affected by PowerSchool cyberattack,” WFYI, May 2025.
- “PowerSchool Data Breach,” Brooks Kushman, May 2025.
- Student Privacy Pledge, Future of Privacy Forum, accessed May 2025.