Search This Blog

Powered by Blogger.

Blog Archive

Labels

About Me

Showing posts with label Cyberhacker. Show all posts

Hackers Infiltrated PowerSchool Network Well Before December Attack

 


It has been announced that the CrowdStrike investigation into PowerSchool's large-scale data breach that took place in December 2024 has been published. It was determined during the investigation that unauthorized access to the company's systems occurred four months prior, beginning in August and continuing in September, with the initial breach taking place in August and September. With more than 60 million students and 18,000 customers worldwide, PowerSchool is the world's leading cloud-based software provider for K-12 education. 

Among the many services PowerSchool offers are enrollment management, communication tools, attendance tracking, staff administration, learning solutions, analytics, and financial management, among others. PowerSchool disclosed in December of an unauthorized access to its customer support portal, PowerSource, which had been compromised by threat actors. It was discovered in this portal that there was a remote maintenance tool that was used by attackers to connect with customer databases. As a result of this vulnerability, sensitive information such as full name, physical address, contact information, Social Security number (SSN), medical records, and academic grades could have been accessed. 

According to CrowdStrike's investigation findings, there was an extensive amount of information about the security incident that gave further insight into the timeline and scope, emphasizing the need for enhanced cybersecurity measures to protect sensitive educational data. CrowdStrike conducted an investigation recently and it revealed that a hacker had stolen the company's support credentials several months ago to access the company's network. 

CrowdStrike's report indicates that PowerSchool's network has been accessed between August 16, 2024, and September 17, 2024 with the same compromised credentials as those used in December. By using these credentials, unauthorized access was granted to PowerSchool's PowerSource, the customer support portal which was later exploited in December to gain access to PowerSchool's network. 

According to CrowdStrike's report, PowerSource is intended to provide support technicians with the necessary privileges to access customer SIS database instances to perform maintenance purposes. CrowdStrike noted that limited data available in PowerSchool's log data prevented further analysis, but the investigation did not find sufficient evidence to conclusively link the August and September activity to the threat actor responsible for the December breach. According to the report, the December security breach could have been avoided had the compromised credentials been updated on time. 

However, it does suggest that if the credentials were updated on time, the December breach could have been avoided. Several cybersecurity measures, including frequent credential updates and enhanced monitoring, can prevent unauthorized access to sensitive data and safeguard sensitive information. PowerSchool released a report recently containing findings from CrowdStrike's investigation on February 28, 2025. This update highlights the importance of proactive cybersecurity measures. 

Using compromised credentials, the cyberattack has been carried out on the PowerSource customer support portal, according to the report. This unauthorized access has been in place since December 19, 2024, when it was notified at 19:43:14 UTC, until December 28, 2024, at 06:31:18 UTC, when it was discovered and mitigated. A cybersecurity firm called CrowdStrike has found that the attackers successfully removed sensitive data belonging to teachers and students from the compromised systems, but has not found any evidence that suggests that other databases were accessed or stolen by these attackers. 

As a result of the investigation, it was found that PowerSchool did not have malware deployed within its infrastructure, nor did the investigation indicate that privileges were escalating, lateral movement occurred, or downstream customer or school systems had been compromised. Based on CrowdStrike's dark web intelligence as of January 2, 2025, it appears that the attackers kept their promise not to publish the stolen data after receiving an extortion payment in return for not publishing it. 

The firm has not identified any instances of the information being sold or leaked online, and further analysis has shown that a breach of the PowerSource portal occurred in August and September of 2024, using the same compromised credentials, suggesting that it could have occurred even earlier than August and September of 2024. However, due to limitations in log data retention, there are insufficient evidence to confirm whether the same threat actor is behind both the earlier breaches as well as the December attack, due to limitations in log data retention. 

Specifically, the report stated that PowerSource logs for August 16, 2024, at 01:27:29 UTC, indicated that an unauthorized attack was performed by an unidentified actor using compromised support credentials on this date. In addition, CrowdStrike pointed out that the available SIS log data did not extend far enough to be able to determine whether the access resulted in the exfiltration of data from PowerSchool's SIS. 

PowerSchool has not publicly disclosed the number of schools, students, and teachers affected by the breach despite its severity, raising questions about transparency. According to the report, the breach affects 6,505 school districts across the United States, Canada, and other countries. The stolen data set contains approximately 62,488,628 student records and 9,506,624 teacher records. 

In light of these findings, stringent cybersecurity measures must be put in place, including timely credential management and enhanced monitoring, to protect sensitive educational data and prevent unauthorized access to it. PowerSchool has assured stakeholders that all necessary precautions have been taken to ensure that no further unauthorized access to the compromised data will take place. The company notified parents and guardians in a communication that the stolen information was not expected to be released to the public and that they could permanently delete it without duplicating or spreading it further. 

According to an in-depth analysis of PowerSchool system logs that began on December 22, 2024, unusual activity was identified by both on-premises and cloud-hosted PowerSchool customers. According to our investigations, two key data tables - Students_export.csv and Teachers_export.csv - were transferred to an IP address which was traced back to Ukraine and then were deleted. There are two IP addresses on the domain, 91.218.50.11, which belong to Virtual Systems, a legitimate hosting provider. This indicates that the attacker is likely to have either rented a service directly or exploited an existing account. 

As soon as PowerSchool discovered the breach on December 28, 2024, it promptly contacted CyberSteward, a cybersecurity incident response company, to negotiate with the attacker and resolve the problem. As the cybersecurity journalist Brian Krebs reported in an internal FAQ, PowerSchool requested assurances concerning the fate of the stolen data based on the internal FAQ. The threat actor subsequently confirmed with PowerSchool that all the data that had been exfiltrated had been erased and that no additional copies were kept of any of the data. 

Additionally, the attacker is alleged to have provided a video that shows how the process of file deletion is conducted. According to the findings, the cyber threat landscape has evolved dramatically over the past decade and there is an increasing trend for organizations to implement robust security measures to limit unauthorized access and exploitation of sensitive information. As a result of CrowdStrike's investigation, it was clear that cyber threats to schools and education institutions have become increasingly sophisticated and that action must be taken to prepare for them. 

It is important to note that the PowerSchool breach, which went undetected for months, illustrates the dangers posed by compromised credentials, as well as the potential risks posed by unauthorized access to students' and faculty's sensitive data. PowerSchool has assured that necessary precautions have been taken to prevent further misuse of the stolen data, yet this incident is considered to be a critical reminder of the vulnerabilities that exist in the digital infrastructure that handles vast amounts of information related to individual students and teachers. 

Given the tardy detection of the breach, as well as the extent of data exfiltration, it is imperative that continuous monitoring is maintained, credential updates are made promptly, and robust access control measures are implemented. To ensure that education institutions and technology providers remain secure moving forward, they must adopt advanced threat detection mechanisms, enforcing multi-factor authentication, and following rigorous incident response protocols. 

As a result of maintaining public trust and making sure that affected stakeholders are informed about data breaches, transparency remains crucial when revealing them. Despite the ever-changing tactics of cybercriminals, organizations remain vigilant and must enhance their security frameworks to mitigate the risk of a future breach and prevent it from happening again in the future. As a result of this event, all institutions that handle sensitive data should take note. It should serve as a strong reminder that cybersecurity is more than just a precaution, but one of the essential responsibilities of modern educational institutions.

India’s Escalating Crisis of Fake Institutions and Digital Fraud


 

As fraudulent activities in India continue to evolve and exploit systemic vulnerabilities to deceive unsuspecting individuals, there are counterfeit banks, legal entities that are fraudulent, and sophisticated cyber scams exploiting systemic vulnerabilities. There has been a significant increase in cases of financial fraud in the country during the first half of the current fiscal year, according to recent data from RBI, which indicates that the country's legal and financial frameworks are under the influence of an alarming trend.

It is common practice for scammers to create fake banks that operate under the guise of legitimate financial institutions and to offer attractive products and investment opportunities in exchange for their money. In the same way, sham courts and legal entities are also being set up to manipulate legal proceedings, mislead victims, and extort money from the public. Additionally, cybercriminals are employing advanced digital technologies to orchestrate scams that compromise sensitive financial and personal information as well as compromising the privacy of victims. This is highlighting critical weaknesses in regulatory oversight and enforcement mechanisms that are failing to effectively counter these frauds. 

Even though authorities are continuing to implement measures to curb these threats, it is imperative to develop more robust intervention strategies to combat the rapid growth of deceptive practices. It remains imperative that digital security frameworks are enhanced, public awareness is increased, and strict legal sanctions are implemented against offenders to reduce the impact of this growing financial and legal fraud. Although the Reserve Bank of India (RBI) has implemented significant changes in its policies regarding bank branch licensing, the process of establishing a new bank still requires multiple regulatory approvals, even after these changes have been implemented.

By conducting these rigorous checks, it can be ensured that unauthorized operations do not occur and ensure that the banking system remains intact. As a result of the discovery of a fraudulent State Bank of India (SBI) branch in Chhapora village, Chhattisgarh, in recent months, serious question marks have been raised about the efficiency of the existing oversight mechanisms in place to prevent such occurrences. 

In this elaborate scheme, the perpetrators not only deceived residents into depositing their hard-earned money into a nonexistent banking institution but also exploited the circumstances to create fake jobs. They further exacerbated the financial losses suffered by the victims by claiming the jobs were legitimate. In this case, the fact that such an operation remained undetected for such a long period highlights critical deficiencies in the monitoring and enforcement of financial regulation in this country. 

It is important to note that this is not an isolated case but rather a significant part of an increasingly widespread trend of fraudulent activities in the banking sector. It is evident from such cases that people need to be more vigilant, to have stronger regulatory enforcement, and to become more aware of financial scams to avoid becoming victims. As a means of preventing these deceptive practices and maintaining the credibility of the banking sector, financial institutions, law enforcement agencies, and regulatory bodies must work together to strengthen coordination between them. 

The Growing Threat of Cyber Fraud in India 


Cyber fraud has been on the rise for several years; scammers are employing more and more sophisticated tactics. Fraudulent call centers, primarily located in Gujarat, have been exposed for operating international scams, and operations have been dismantled in Gurugram, Noida, Mumbai and Indore. 

It has been reported that these syndicates mainly target victims living in the United States, the UK, and Canada by luring them with fake cryptocurrency investments, medical supplies, and antivirus software, and their operations have been ongoing for some time now. 

Rising Scams Targeting Indian Citizens 


Indian citizens are also falling prey to several fraudulent schemes, including Parcel Scams – A fictitious delivery notification tricks victims into paying for a package, SIM Deactivation Fraud – An impersonator of a telecom operator steals personal data while impersonating a telecom operator Job Scam – False work-from-home offers require upfront costs Electricity Disconnection Hoaxes – Fraudsters threaten power cuts to gain money from victims. 

There are many international fraud networks linked to these operations, including in Syria, Turkey, Saudi Arabia, Malaysia, and Singapore. Since India has been rapidly shifting to digital transactions, fraudsters are exploiting vulnerabilities in credit cards, UPI wallets, and online banking systems. Several seniors are at high risk of being tricked into transferring money through deceptive calls and messages as a result of fraudsters exploiting vulnerabilities in these systems. 

Fraud Expanding Beyond Finance 


As a result, scams are now extending into various sectors such as real estate, healthcare, education, and employment. In Kanpur, fraudsters made people pay up to 35 crores for bogus oxygen therapy intended to delay aging. At the same time, fake CBI documents and arrest warrants are being used to extort money. 

The Need for Stronger Regulations and Awareness 


As cyber fraud becomes more sophisticated, it warrants tighter enforcement, increased cybersecurity, and greater public awareness to curb its spread. Therefore, strengthening the coordination between law enforcement agencies, financial institutions, and regulatory bodies is crucial to combat this growing problem. 

Expanding Threat of Financial and Health-Related Fraud in India 


Fraud is not just confined to financial deception in India; it is posing increasingly serious risks to public health. Although some counterfeit drug manufacturers have been apprehended over the years, many operate undetected and without attracting much notice. An investigation of certain pharmaceutical companies found that they were willing to print any Maximum Retail Price (MRP) on bulk orders as part of a recent sting operation, which underscores the extent to which the pharmaceutical industry has been mistreated.

By setting up a therapy center called Revival World, a couple named Rajeev Kumar Dubey and Rashmi Dubey orchestrated a large-scale fraud. It was falsely claimed that by using oxygen therapy, a 60-year-old man could become a 25-year-old man, thus reversing the effects of aging. As a result of the 35 crore scam, it has become evident that people are vulnerable to a variety of health-related scams. Wolves are exploiting digital platforms just as they did before, to orchestrate financial deception both domestically and internationally, as they attempted to defraud customers. The problem with India's literacy is that even highly educated people from the United States, Britain, and Canada have been victims of these scams, despite its literacy challenges.

In the past, Gujarat-based call centers have been implicated in schemes involving fake medical supplies, counterfeit antivirus software and cryptocurrency investments, as well as international fraud operations. Gujarat-based call centers have been notorious for running international fraud operations. In recent years, similar operations have been uncovered in Gurugram, Noida, Mumbai, and Indore, but it is unclear the extent to which such activities are being carried out throughout the country. Financial crime in India has increased significantly in recent years.

A recent report from the Reserve Bank of India (RBI) on the Trends and Progress of Indian Banking indicates that 18,461 cases of bank fraud have been reported in the first half of the current fiscal year, resulting in a total loss of money that is eightfold greater than what is reported previously. To combat the rapidly growing landscape of financial crime, there is an urgent need for increased regulatory oversight, stricter enforcement measures, and a greater degree of public awareness. 

Strengthening Regulatory Measures to Curb Financial Fraud


There is an increasing ease with which fraud is being perpetrated in India today, a national concern that requires immediate attention. Addressing the growing issues that have resulted in the fraud epidemic in India requires understanding its magnitude and the wide-reaching implications of the issue. 

India is at risk of becoming a global hotspot for financial fraud unless comprehensive regulatory reforms and stricter enforcement mechanisms occur. Several steps can help mitigate this threat, including strengthening legal frameworks, improving oversight of financial institutions, and utilizing advanced technology to detect fraudulent activities. 

For the economy to remain safe and the public to have trust in the financial system to be restored, regulatory agencies, financial institutions, and law enforcement agencies must work together as a team.

Smart Meter Privacy Under Scrutiny as Warnings Reach Millions in UK

 


According to a campaign group that has criticized government net zero policies, smart meters may become the next step in "snooping" on household energy consumption. Ministers are discussing the possibility of sharing household energy usage with third parties who can assist customers in finding cheaper energy deals and lower carbon tariffs from competitors. 

The European watchdog responsible for protecting personal data has been concerned that high-tech monitors that track households' energy use are likely to pose a major privacy concern. A recent report released by the European Data Protection Supervisor (EDPS) states that smart meters, which must be installed in every home in the UK by the year 2021, will be used not only to monitor energy consumption but also to track a great deal more data. 

According to the EDPS, "while the widespread rollout of smart meters will bring some substantial benefits, it will also provide us with the opportunity to collect huge amounts of personal information." Smart meters have been claimed to be a means of spying on homes by net zero campaigners. A privacy dispute has broken out in response to government proposals that will allow energy companies to harvest household smart meter data to promote net zero energy. 

In the UK, the Telegraph newspaper reports that the government is consulting on the idea of letting consumers share their energy usage with third parties who can direct them to lower-cost deals and lower carbon tariffs from competing suppliers. The Telegraph quoted Neil Record, the former economist for the Bank of England and currently chairman of Net Zero Watch, as saying that smart meters could potentially have serious privacy implications, which he expressed concerns to the paper. 

According to him, energy companies collect a large amount of consumer information, which is why he advised the public to remain vigilant about the increasing number of external entities getting access to household information. Further, Record explained that, once these measures are authorized, the public would be able to view detailed details of the activities of households in real-time. 

The record even stated that the public might not fully comprehend the extent to which the data is being shared and the possible consequences of this access. Nick Hunn, founder of the wireless technology consulting firm WiFore, also commented on the matter, highlighting the original intent behind the smart meter rollout, He noted that the initiative was designed to enable consumers to access their energy usage data, thereby empowering them to make informed decisions regarding energy consumption and associated costs. Getting to net zero targets will be impossible without smart meters. 

They allow energy companies to get real-time data on how much energy they are using and can be used to manage demand as needed. Using smart meters, for instance, households will be rewarded for cutting energy use during peak hours, thereby reducing the need for the construction of new gas-fired power plants. Energy firms can also offer free electricity to households when wind energy is in abundance. Using smart meters as a means of controlling household energy usage, the Government has ambitions to install them in three-quarters of all households by the end of 2025, at the cost of £13.5 billion. 

A recent study by WiFore, which is a wireless technology consulting firm, revealed that approximately four million devices are broken in homes. According to Nick Hunn, who is the founder of the firm: "This is essentially what was intended at the beginning of the rollout of smart meters: that consumers would be able to see what energy data was affecting them so that they could make rational decisions about how much they were spending and how much they were using."