Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Error’d: Pickup Sticklers

      September 27, 2025

      From Prompt To Partner: Designing Your Custom AI Assistant

      September 27, 2025

      Microsoft unveils reimagined Marketplace for cloud solutions, AI apps, and more

      September 27, 2025

      Design Dialects: Breaking the Rules, Not the System

      September 27, 2025

      Building personal apps with open source and AI

      September 12, 2025

      What Can We Actually Do With corner-shape?

      September 12, 2025

      Craft, Clarity, and Care: The Story and Work of Mengchu Yao

      September 12, 2025

      Cailabs secures €57M to accelerate growth and industrial scale-up

      September 12, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The first browser with JavaScript landed 30 years ago

      September 27, 2025
      Recent

      The first browser with JavaScript landed 30 years ago

      September 27, 2025

      Four Different Meanings of “Template” a WordPress Pro Should Know

      September 27, 2025

      Adding Functionality with functions.php, a Heart of WordPress Theme Development

      September 27, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured
      Recent
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Toronto School Board Hit with Extortion Demand After PowerSchool Data Breach

    Toronto School Board Hit with Extortion Demand After PowerSchool Data Breach

    May 9, 2025

    PowerSchool Data Breach

    The Toronto District School Board (TDSB) has informed parents and staff of a renewed cyber threat following a major data breach involving education technology giant PowerSchool. The extortion attempt, made public on Wednesday, comes weeks after PowerSchool claimed to have contained the initial December 2024 ransomware attack by paying off the hacker.

    Despite that payment, the hacker has reemerged — this time demanding a ransom from school districts, including TDSB, using data obtained from the original data breach.

    The Initial PowerSchool Data Breach

    In late December 2024, between the 22nd and 28th, PowerSchool—an education technology company whose software is used by more than 6,500 school districts and institutions across North America—was compromised in a ransomware attack. The breach affected numerous schools, including Ontario’s largest school board, the TDSB.

    PowerSchool notified its clients, including TDSB, of the incident on January 7, 2025. At the time, the company took swift action, including paying a ransom to the threat actor. In return, the hacker provided a video purportedly showing the deletion of the stolen data, leading PowerSchool to believe the threat had been neutralized.

    The Second Extortion Attempt

    However, that belief has now been challenged. On Wednesday, TDSB Director of Education Clayton La Touche sent a letter to parents, guardians, and staff, confirming that the board had received a new extortion message earlier in the week. The threat actor claimed to possess sensitive data obtained during the December breach and demanded another ransom.

    We wanted to share an important update about a cyber incident experienced by the Toronto District School Board (TDSB) involving PowerSchool—the application used by TDSB and many school boards across North America to store a range of student information and a limited amount of school-based staff information,” La Touche wrote.

    According to a source familiar with the investigation, TDSB is not the only organization being re-targeted. At least four school boards have reportedly received similar extortion messages. While PowerSchool has not confirmed the exact number of affected customers, the company did release a statement acknowledging the resurgence of threats and promising to support impacted clients.

    TDSB’s Response

    In response to the latest development, TDSB activated its cybersecurity response plan. The board has emphasized that it is working closely with PowerSchool to conduct a thorough investigation into the nature of the threat and determine the extent of the potential data compromise.

    “At this point in time, we are still assessing the exact information that may have been accessed or exported from the application,” TDSB said. “PowerSchool has informed us that it has received confirmation that the data accessed by an unauthorized user has been deleted and that no copies of this data were posted online.”

    Despite these assurances, the renewed extortion attempt has cast doubt on whether the data was ever truly deleted. The board has notified the Information and Privacy Commissioner of Ontario and assured stakeholders that any confirmed exposure of personal information will be disclosed promptly.

    TDSB acknowledged the concern this news may cause within the community. “Please know that we are doing everything possible to learn more from PowerSchool about what occurred and will share that information with you,” the letter read.

    PowerSchool’s Position

    PowerSchool responded to the situation with a public statement reiterating that it does not believe this is a new breach. According to the company, the data samples provided in the latest extortion attempts match those stolen in December, suggesting the current threat is a continuation of the original incident.

    The company has reported the matter to law enforcement agencies in both the United States and Canada and has alerted all customers using its Student Information System (SIS) of the development.

    “We sincerely regret these developments – it pains us that our customers are being threatened and re-victimized by bad actors,” PowerSchool stated.

    The company also acknowledged the difficult decision it faced in paying the initial ransom. “We believed it to be in the best interest of our customers and the students and communities we serve. It was a difficult decision, and one which our leadership team did not make lightly,” the statement read.

    Despite receiving a video showing the deletion of the data, PowerSchool admitted there was always a risk that the attacker would not honor the agreement. “As is always the case with these situations, there was a risk that the bad actors would not delete the data they stole, despite assurances and evidence that were provided to us,” the company said.

    Support Measures for Affected Communities

    As part of its mitigation strategy, PowerSchool has made credit monitoring and identity protection services available for a two-year period to all students and faculty of its SIS customers, regardless of whether their individual data was affected.

    These support services are meant to help school communities manage the fallout from potential data exposure, including the risk of identity theft or fraud. PowerSchool said it remains committed to transparency and is working diligently to regain the trust of its customers.

    Broader Implications for the Education Sector

    As investigations continue, TDSB and other affected school boards will need to evaluate their security measures, vendor relationships, and incident response strategies. Meanwhile, PowerSchool will be under pressure to improve its security posture and reassure stakeholders that it can prevent similar incidents in the future.

    For now, parents, students, and staff are left in a state of uncertainty, awaiting clarity on whether their personal data has been exposed and how the situation will be resolved.

    TDSB has pledged to keep its community informed as more information becomes available. “We will continue to update the community as more information becomes available,” La Touche affirmed in the letter to stakeholders.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleTheMoon Malware Targets Aging Routers, FBI Issues Alert
    Next Article Track Metrics Effortlessly with Laravel’s Context Increment and Decrement Methods

    Related Posts

    Development

    Master Session Hijacking: Cookies, Regeneration, Expiration

    September 27, 2025
    Development

    PHP Password Hashing: Bcrypt, Argon2, and Best Practices

    September 27, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Cloudflare stops new world’s largest DDoS attack over Labor Day weekend

    News & Updates

    Nation Group Hit by 200 Million Cyberattacks Amid Thai-Cambodian Tensions

    Development

    Evaluating Enterprise-Grade AI Assistants: A Benchmark for Complex, Voice-Driven Workflows

    Machine Learning

    The Rise of No-Code AI: How Expert AI Development Services Are Leading the Charge⚡

    Web Development

    Highlights

    Patch Tuesday, June 2025 Edition

    June 10, 2025

    Patch Tuesday, June 2025 Edition

    Microsoft today released security updates to fix at least 67 vulnerabilities in its Windows operating systems and software. Redmond warns that one of the flaws is already under active attack, and that …
    Read more

    Published Date:
    Jun 11, 2025 (53 minutes ago)

    Vulnerabilities has been mentioned in this article.

    CVE-2025-33073

    CVE-2025-33053

    CVE-2025-5419

    CVE-2025-4664

    DualDistill and Agentic-R1: How AI Combines Natural Language and Tool Use for Superior Math Problem Solving

    July 25, 2025

    How Breaches Start: Breaking Down 5 Real Vulns

    May 7, 2025

    Junior developers aren’t obsolete: Here’s how to thrive in the age of AI

    August 7, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.