Carly Page@TechCrunch
//
The Pennsylvania State Education Association (PSEA), the largest public-sector union in Pennsylvania, has announced a significant data breach affecting over 500,000 members. The breach, which occurred in July 2024, resulted in attackers stealing sensitive personal information. PSEA is now notifying the impacted individuals about the incident and the potential risks.
The stolen data includes highly sensitive information, such as government-issued identification documents, Social Security numbers, passport numbers, medical information, and financial data like card numbers with PINs and expiration dates. Member account numbers, PINs, passwords, and security codes were also accessed. PSEA took steps to ensure, to the best of its ability and knowledge, that the stolen data was deleted. Recommended read:
References :
Aman Mishra@gbhackers.com
//
Google, in collaboration with its Mandiant Threat Intelligence team, has issued a warning about a surge in phishing campaigns targeting higher education institutions in the United States. These campaigns, observed since August 2024, have exploited the academic calendar and institutional trust to deceive students, faculty, and staff. The attacks have been linked to a broader campaign dating back to at least October 2022, targeting thousands of users monthly.
The phishing attacks are strategically timed to coincide with key academic events such as the start of the school year and financial aid deadlines. Attackers have tricked victims into revealing sensitive credentials and financial information by leveraging these high-pressure periods. The campaigns employ various tactics, including hosting malicious Google Forms on compromised university domains and cloning university login portals to carry out payment redirection attacks. Google is addressing security concerns surrounding SMS 2FA codes by replacing Gmail’s SMS authentication with QR codes in the coming months. Recommended read:
References :
@securityonline.info
//
A new malware campaign is underway, distributing the Lumma Stealer information stealer via weaponized PDF documents. This campaign specifically targets educational institutions, exploiting compromised infrastructure to deliver malicious LNK files disguised as legitimate PDFs. These files, when executed, initiate a multi-stage infection process designed to steal sensitive data, including passwords, browser information, and cryptocurrency wallet details.
The attackers lure users into downloading these malicious files by disguising them as innocuous documents, such as school fee structures. Once executed, the LNK files trigger PowerShell commands that download and run obfuscated JavaScript code, ultimately deploying the Lumma Stealer payload. The malware employs advanced evasion techniques, including obfuscated JavaScript and encrypted payloads, to avoid detection. This campaign highlights the urgent need for robust cybersecurity measures within educational institutions and other sectors. Lumma Stealer targets various industries beyond education, including finance, healthcare, technology, and media. The use of compromised educational infrastructure as a distribution channel underscores the vulnerabilities in organizational cybersecurity frameworks. Recommended read:
References :
@www.bleepingcomputer.com
//
PowerSchool, a major education software provider, has begun notifying individuals affected by a massive data breach that occurred in late December 2024. The company, which serves over 60 million students, confirmed the breach resulted from a cyberattack where a stolen account credential was used to access their customer support portal. This allowed attackers to exfiltrate significant amounts of sensitive student and teacher data across the U.S. and Canada. The company is currently working to determine the exact number of affected individuals, but reports suggest tens of millions of students and teachers may have been impacted.
The data breach at PowerSchool is considered one of the largest to hit the education sector recently. While the company has started legally required regulatory notifications and filed a data breach notification with Maine's attorney general, they have not released an official total count of affected individuals, citing an ongoing data review process. It is also known that the compromised account lacked multi-factor authentication, raising questions about PowerSchool’s security measures. Investigations are underway, involving CrowdStrike, to fully determine the scope and details of the breach, which is expected to provide additional information. Recommended read:
References :
@www.bleepingcomputer.com
//
PowerSchool, a major education software provider, has suffered a significant data breach, with hackers claiming to have stolen the personal information of 62.4 million students and 9.5 million teachers. The breach occurred after attackers gained access to the company's PowerSource customer support portal using compromised credentials. This access allowed them to download sensitive data from school districts in the US and Canada, including names, contact information, dates of birth, medical information, and in some cases, Social Security numbers, impacting potentially millions of individuals. The Toronto District School Board, the largest in Canada, was heavily affected, with over 1.48 million student records and 90,000 teacher records exfiltrated.
PowerSchool has reportedly engaged with CyberSteward to negotiate with the hackers and prevent the public release of the stolen data, with one affected school district suggesting that PowerSchool paid a ransom. While PowerSchool is working with CrowdStrike to produce a forensic report on the incident, it has also stated that no Social Security Numbers had been breached. The company has committed to offering free identity protection services to all those affected, although the release of a full forensic report, initially planned for January 17, has been delayed. The breach highlights serious vulnerabilities in the security of educational institutions and the need for stronger protective measures. Recommended read:
References :
|