Canadian privacy regulators say schools share blame for PowerSchool hack

Two Canadian provincial governments on Monday released investigative findings which laid significant blame for the massive PowerSchool data leak with the school systems whose students’ and teachers’ data was exposed.

The Ontario and Alberta information and privacy commissioners’ reports fault the school systems for several missteps, including not putting privacy and security related provisions in their contracts with the education software firm and failing to “effectively monitor and oversee” PowerSchool’s security guardrails, particularly in regard to multifactor authentication. 

The PowerSchool hacker breached the company’s data systems by exploiting a lack of multifactor authentication requirements, which are considered standard security protocol.

A Massachusetts college student broke into PowerSchool’s systems in December, obtaining data belonging to more than 62 million students and 9 million teachers. In Toronto alone, data belonging to students going back to 1985 was leaked, including special education and disciplinary records.

The investigative reports found other flaws in how schools dealt with PowerSchool, including the fact that they did not limit remote access to their student information systems by PowerSchool support personnel “for only as long as necessary to address specific technical issues,” according to a press release from the Ontario commissioner. 

Schools also did not have appropriate breach response plans ready to go, the press release said.

The regulators issued several recommendations including that schools:

  • Review and when necessary renegotiate agreements with PowerSchool to feature more robust privacy and security provisions
  • Put systems in place to more effectively oversee PowerSchool’s security program
  • Limit remote access to their student information systems 
  • Implement plans for better breach responses in the future
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Suzanne Smalley

Suzanne Smalley

is a reporter covering privacy, disinformation and cybersecurity policy for The Record. She was previously a cybersecurity reporter at CyberScoop and Reuters. Earlier in her career Suzanne covered the Boston Police Department for the Boston Globe and two presidential campaign cycles for Newsweek. She lives in Washington with her husband and three children.

 

Total
0
Shares
Previous Post

Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001)

Next Post

TamperedChef Malware Spreads via Fake Software Installers in Ongoing Global Campaign

Related Posts

GlassWorm Malware Discovered in Three VS Code Extensions with Thousands of Installs

Cybersecurity researchers have disclosed a new set of three extensions associated with the GlassWorm campaign, indicating continued attempts on part of threat actors to target the Visual Studio Code (VS Code) ecosystem. The extensions in question, which are still available for download, are listed below - ai-driven-dev.ai-driven-dev (3,402 downloads) adhamu.history-in-sublime-merge (4,057
Read More

Cisco Patches Zero-Day RCE Exploited by China-Linked APT in Secure Email Gateways

Cisco on Thursday released security updates for a maximum-severity security flaw impacting Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Email and Web Manager, nearly a month after the company disclosed that it had been exploited as a zero-day by a China-nexus advanced persistent threat (APT) actor codenamed UAT-9686. The vulnerability, tracked as CVE-2025-20393 (CVSS
Read More

New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper

Cybersecurity researchers have discovered a new variant of a macOS information stealer called MacSync that's delivered by means of a digitally signed, notarized Swift application masquerading as a messaging app installer to bypass Apple's Gatekeeper checks. "Unlike earlier MacSync Stealer variants that primarily rely on drag-to-terminal or ClickFix-style techniques, this sample adopts a more
Read More