PowerSchool’s Data Breach: When Cybersecurity Became the Uninvited Guest at the School Data Party

June 6, 2025

Brace yourselves! We have a lawsuit brewing against a software provider who just thought it was a good idea to invite hackers to a data party that impacted 500,000 people last year. And no, it wasn’t a fun party called “Data is Us.”

The Memphis-Shelby County Schools (MSCS) have thrown legal darts at PowerSchool, their California-based software pals, due to a rather unfortunate data breach that spiced things up in December 2024. This breach reportedly let slip private data from around 500K current and former students and 23K employees—like a kid letting loose a piñata filled with sensitive goodies! The data escapees included names, addresses, Social Security numbers, medical records, grades, and other bits and bobs that one generally prefers to keep to themselves.

So, what transpired? How did PowerSchool find itself stuck in this cybersecurity pickle?

In a plot twist worthy of any thriller, hackers slipped through PowerSchool’s defenses via PowerSource, the company’s customer support platform, and made off with the loot in a CSV file. PowerSchool had its light bulb moment about the breach on December 28, 2024, but decided to keep mum until January 7, 2025, when they finally let the affected districts in on the secret. Surprise!

In a desperate attempt to hush things up, PowerSchool played into the hands of criminals by paying a ransom, hoping they’d be as polite as a gentleman at a dinner party and just fade into the shadows. Here’s a tip folks: paying a ransom is like feeding the gremlins after midnight—things usually go south! For every story of a victim who walked away unscathed, there are countless others who find their data (and their money) spiraling into the cyber abyss.

This keystone cops routine ultimately led to the lawsuit.

PowerSchool has the honor of collecting Personally Identifiable Information (PII) on more than 60 million people globally. This particular data breach was like an open buffet, exposing names, email and physical addresses, Social Security Numbers, permanent records, passwords, and even the all-important magic bus stops! Imagine if that were your child’s information—talk about panic! What would you do if the data genie popped out of the lamp?

MSCS accused PowerSchool of negligence, breach of contract, and some fancy false advertising. The complaint claims PowerSchool dropped the ball when it came to protecting their data and failed to roll out even the basics for cybersecurity defense. Naturally, they’re now seeking compensatory, consequential, general, and nominal damages—because a few bucks could really help ease the heartburn from the breach!

Even though the lawsuit is still finding its way through the legal maze, MSCS is on a mission for accountability and compensation for this cyber calamity. PowerSchool has expressed its “oops” moment while facing the fallout and challenges posed to its users.

In the grand scheme of things, this case shines a spotlight on the vital role of third-party vendors in cybersecurity. It’s also a timely reminder that supply chain attacks are the unwelcome party crashers of our digital age. The platforms and services we adore could very well turn into weapons used against us—thanks, hackers!

Increasingly, cyber evildoers are targeting service providers to take a shortcut to multiple victims instead of tackling each business individually. Why bother breaking into one house when you can unlock the doors to the whole neighborhood?

What’s the secret ingredient that makes supply chain attacks oh-so-effective? Hackers waltz into trusted applications and services without breaking a sweat, leaving customers blissfully unaware of the threat. It’s high time we all stay alert, even while cozying up to those “trusted” services.

The best defense strategy? Demand costumes in the form of transparency from your service providers about their supply chain security—and no, not the Halloween kind! Ask the tough questions like…

  • How do you vet your vendors? Are they seen as good Cyber Citizens?
  • What incident response plans are in place? Do you have a plan for when things go awry?
  • Are there cyber insurance policies to cushion the blow from losses? Will I get a koozie with that?

Your best bet is to stick with reputable vendors who use data encryption to close Pandora’s box. By staying vigilant and nurturing a shared sense of responsibility, you can fortify your defenses against the lurking shadows of supply chain attacks.

The post How a Supply Chain Attack Triggered a Lawsuit appeared first on Cybersafe.

Need a Consultation?

    Related Posts

    You Might Also Be Interested in…

    Contact Us

    We are always available! Get in touch.

    Contact Us
    Send a Message