Edtech company fined $5.1 million for poor data security practices leading to hack

Three state attorneys general announced Thursday that the educational technology company Illuminate Education will pay a $5.1 million fine and agree to make changes to its business to settle allegations that shoddy security practices led to a 2021 data breach.

The data breach exposed student names, races, coded medical conditions and whether they received special education accommodations. It impacted students in 49 states and three million in California alone.

Several security failings led to the breach, according to a press release from California Attorney General Rob Bonta.

For example, Illuminate allegedly failed to delete the login credentials of former employees, the press release said. The hacker who obtained the private data allegedly used a former Illuminate employee’s credentials to gain access to its network.

The edtech firm also allegedly failed to monitor its systems for suspicious activity and did not separately secure backup and active databases. Because the databases were not separated, the press release said, the backup databases were also compromised when the active database was breached.

Illuminate also allegedly made false statements in its privacy policy, which told users its practices “meet or exceed the requirements of applicable federal and state law.” 

The firm has agreed to bolster its access control and account management practices, do real time monitoring for suspicious activity and stop storing backup databases in the same network as active ones, the press release said.

Bonta brought the action alongside Connecticut Attorney General William Tong and New York Attorney General Letitia James.

A spokesperson for Illuminate said in a prepared statement that the company has been acquired by another edtech company, Renaissance.

“Since the acquisition, Renaissance has incorporated the Illuminate products into its cybersecurity and data protection program, which includes robust security protocols and controls used to safeguard the integrity and confidentiality of the data entrusted to us by schools, educators, and families,” the statement said.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Suzanne Smalley

Suzanne Smalley

is a reporter covering privacy, disinformation and cybersecurity policy for The Record. She was previously a cybersecurity reporter at CyberScoop and Reuters. Earlier in her career Suzanne covered the Boston Police Department for the Boston Globe and two presidential campaign cycles for Newsweek. She lives in Washington with her husband and three children.

 

Total
0
Shares
Previous Post

From Log4j to IIS, China’s Hackers Turn Legacy Bugs into Global Espionage Tools

Next Post

Samsung Mobile Flaw Exploited as Zero-Day to Deploy LANDFALL Android Spyware

Related Posts

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

The North Korean threat actors behind the Contagious Interview campaign have once again tweaked their tactics by using JSON storage services to stage malicious payloads. "The threat actors have recently resorted to utilizing JSON storage services like JSON Keeper, JSONsilo, and npoint.io to host and deliver malware from trojanized code projects, with the lure," NVISO researchers Bart Parys, Stef
Read More

North Korean Hackers Deploy 197 npm Packages to Spread Updated OtterCookie Malware

The North Korean threat actors behind the Contagious Interview campaign have continued to flood the npm registry with 197 more malicious packages since last month. According to Socket, these packages have been downloaded over 31,000 times, and are designed to deliver a variant of OtterCookie that brings together the features of BeaverTail and prior versions of OtterCookie. Some of the
Read More

LockBit, Qilin, and DragonForce Join Forces to Dominate the Ransomware Ecosystem

Three prominent ransomware groups DragonForce, LockBit, and Qilin have announced a new strategic ransomware alliance, once underscoring continued shifts in the cyber threat landscape. The coalition is seen as an attempt on the part of the financially motivated threat actors to conduct more effective ransomware attacks, ReliaQuest said in a report shared with The Hacker News. "Announced shortly
Read More