Severity
critical
Records
71,500,000
Vector
Credential Compromise — support portal without MFA
Organization
PowerSchool
Incident Date
2024-12-19

Executive summary

PowerSchool, the largest provider of K-12 education software in the United States, suffered a catastrophic data breach in December 2024 that exposed personal information of approximately 62 million students and 9.5 million educators across thousands of school districts worldwide. The breach—the largest involving children’s data in U.S. history—occurred because a support portal account lacked multi-factor authentication.

Incident overview

AttributeDetails
Victim organizationPowerSchool
IndustryEducation technology
Discovery dateDecember 28, 2024
Attack durationDecember 19-28, 2024 (9 days)
Students affected~62 million
Educators affected~9.5 million
Total affected~71.5 million
Attack vectorCompromised credential (no MFA)
Ransom demanded$2.85 million (Bitcoin)
Ransom paidYes
AttackerMatthew D. Lane, 19, Massachusetts

Timeline

DateEvent
December 19, 2024Attacker gains access via compromised credential
December 19-28, 2024Data exfiltration over 9-day period
December 28, 2024PowerSchool discovers breach
January 2025PowerSchool begins notifying school districts
January 2025Ransom of $2.85 million paid in Bitcoin
March 2025Attacker sends video claiming data deletion
May 7, 2025Extortion emails sent to Canadian and NC schools
May 20, 2025DOJ announces charges against Matthew D. Lane
May 2025Lane agrees to guilty plea, 9+ year sentence

Attack methodology

Initial access

FactorDetails
Entry pointPowerSource customer support portal
Credential typeMaintenance account
MFA statusNot enabled
DetectionFailed for 9 days

PowerSchool executives admitted during internal meetings that the compromised account did not have multi-factor authentication enabled, a basic security control that could have prevented the breach.

Data exfiltration

PhaseActivity
AccessAttacker logged into PowerSource portal
EnumerationDiscovered access to customer databases
ExportDownloaded student and educator records
DurationUndetected for 9 days

Data exposed

Student information

Data typeExposure
Full namesConfirmed
AddressesConfirmed
Social Security numbersSome districts
Dates of birthConfirmed
Grades and academic recordsConfirmed
Medical/health recordsSome districts
Disciplinary recordsSome districts
Historical dataUp to 20+ years

Educator information

Data typeExposure
Full namesConfirmed
AddressesConfirmed
Social Security numbersSome districts
Employment recordsConfirmed
Salary informationSome districts

Scope of impact

Geographic reach

RegionStatus
United StatesPrimary impact
CanadaConfirmed affected
Other countriesPowerSchool operates in 90+ countries

Affected entities

Entity typeApproximate count
School districtsThousands
Individual schoolsTens of thousands
Students62 million
Educators9.5 million

PowerSchool serves over 60 million students across more than 18,000 customers in over 90 countries.

Ransom and extortion

Initial ransom

AttributeDetails
Demand$2.85 million
CurrencyBitcoin
PaymentMade by PowerSchool
Proof providedVideo showing “data deletion”

Continued extortion

Despite the ransom payment, extortion continued:

DateEvent
May 7, 2025Extortion emails to Canadian schools
May 7, 2025Extortion emails to North Carolina schools
OngoingSamples of stolen data included in threats

This demonstrates the fundamental risk of ransom payments: there is no guarantee criminals will honor agreements.

Attacker profile

Matthew D. Lane

AttributeDetails
Age19 years old
LocationWorcester, Massachusetts
AffiliationStudent at Assumption University
ChargesObtaining information from protected computer, aggravated identity theft
PleaGuilty
Minimum sentence9 years, 4 months

Security failures

Critical gaps

FailureImpact
No MFA on support portalEnabled initial access
Insufficient monitoring9-day dwell time
Excessive data accessSupport account could access customer data
Historical data retentionDecades of records exposed

Industry criticism

Canadian privacy commissioners (Ontario and Alberta) issued coordinated findings stating that school boards must shoulder part of the blame:

FindingDetails
Data minimization failureSchools retained excessive historical data
Vendor oversight gapsInsufficient security requirements
Access control weaknessesBroad data access not limited

Response and remediation

PowerSchool actions

ActionDetails
Identity protection2 years free for affected individuals
Credit monitoring2 years free for affected individuals
Security improvementsMFA implementation accelerated
NotificationsOngoing to school districts

School district actions

ActionRecommendation
Parent notificationRequired by many state laws
Credit freezesRecommended for minors
Identity monitoringEncouraged for all affected

Long-term implications

For affected children

RiskDuration
Identity theftLifelong (SSNs don’t change)
Synthetic identity fraudYears to decades
Targeted scamsOngoing
College application fraudUntil adulthood

Children’s data is particularly valuable to criminals because:

  • Credit histories are blank (easier to establish fraudulent accounts)
  • Fraud may go undetected for years
  • SSNs remain valid throughout lifetime

For education sector

ImplicationImpact
Vendor security requirementsWill increase
Data minimizationGreater emphasis
MFA mandatesLikely universal
Insurance costsRising

Recommendations

For parents of affected students

PriorityAction
CriticalFreeze child’s credit at all three bureaus
CriticalEnroll in offered identity protection
HighMonitor for signs of identity misuse
HighKeep documentation of breach notification
OngoingCheck credit annually when child turns 16

For school districts

PriorityAction
CriticalAudit vendor security practices
CriticalRequire MFA for all vendor access
HighImplement data minimization policies
HighLimit historical data retention
MediumReview vendor contracts for security requirements

For education technology vendors

PriorityAction
CriticalMandate MFA on all access points
CriticalImplement least-privilege access
HighDeploy behavioral monitoring
HighReduce data retention periods
MediumSegment customer data environments

Context

The PowerSchool breach represents a watershed moment for education data security. The compromise of 62 million students’ personal information—including Social Security numbers, medical records, and academic histories—creates risks that will persist for decades as these children grow into adulthood.

The breach’s root cause—a support account without multi-factor authentication—is both preventable and inexcusable in 2024. MFA has been a baseline security recommendation for over a decade, yet PowerSchool failed to implement it on a portal with access to millions of sensitive records.

The ransom payment and subsequent continued extortion illustrate why security experts and law enforcement advise against paying ransoms. PowerSchool paid $2.85 million for a video purportedly showing data deletion, yet months later, attackers continued threatening schools with the same stolen data.

For parents, the key action is freezing children’s credit at all three major bureaus. This is free and prevents criminals from opening accounts in a child’s name. Given that the stolen data includes Social Security numbers, this protective measure may need to remain in place for years.

The education sector must fundamentally reassess its approach to student data. Schools and vendors have accumulated decades of sensitive information with insufficient security controls. This breach should catalyze industry-wide reforms including mandatory MFA, data minimization, and rigorous vendor security requirements.