Topics

Latest

AI

Amazon

Article image

Image Credits:Michael Nagle/Bloomberg / Getty Images

Apps

Biotech & Health

clime

PowerSchool signage during the company’s initial public offering, in front of the New York Stock Exchange.

Image Credits:Michael Nagle/Bloomberg / Getty Images

Cloud Computing

Commerce Department

Crypto

enterprisingness

EVs

Fintech

Fundraising

Gadgets

Gaming

Google

Government & Policy

computer hardware

Instagram

layoff

Media & Entertainment

Meta

Microsoft

seclusion

Robotics

Security

societal

Space

inauguration

TikTok

deportation

speculation

More from TechCrunch

Events

Startup Battlefield

StrictlyVC

Podcasts

video

Partner Content

TechCrunch Brand Studio

Crunchboard

reach Us

A hacker compromised the U.S. edtech giant PowerSchool month before its “ massive ” datum breach in December , harmonize toa now - published forensic reportinto the incident conducted by U.S. cybersecurity firm CrowdStrike .

In a varsity letter sent to affected client last week , seen by TechCrunch , PowerSchool confirmed that an investigation into the incident has revealed that its web “ experienced unauthorized activity prior to December , ” which CrowdStrike date back to at least August 2024 .

PowerSchool previously say it detected unauthorized access to its system between December 19 until it discovered the compromise on December 28 , 2024 .

In its theme , CrowdStrike said that a drudge used the same compromise support credentials used in the December rift to access PowerSchool ’s meshwork between August 16 , 2024 , and September 17 , 2024 . The credentials were used to get at PowerSchool PowerSource , the same customer musical accompaniment portal compromised in the December breach to gain memory access to PowerSchool ’s schooltime information system ( SIS ) .

PowerSource “ allows a support technician with sufficient permissions to gain access to client SIS database instances for upkeep purposes , ” fit in to CrowdStrike .

CrowdStrike said it did not find “ sufficient evidence to attribute this activeness to the scourge histrion responsible for the bodily function in December 2024 , ” because PowerSchool ’s log data “ did not go back far enough . ” However , CrowdStrike ’s finding suggest that the December breach of PowerSchool breach could have been prevented if the compromised certification were transfer earlier .

When asked by TechCrunch on Monday , PowerSchool spokesperson Beth Keebler declined to say whether the company was aware of this other access to its web prior to the release of CrowdStrike ’s report .

Join us at TechCrunch Sessions: AI

Exhibit at TechCrunch Sessions: AI

Many interrogative sentence remain about the PowerSchool breach , such as the entire bit of individuals affected . PowerSchool has repeatedly decline to leave an accurate figure , thoughreportssuggest that the personal information of more than 60 million student was accessed .