- Grab your joysticks! The Apex Legends porn parody is finally here 2 Years Ago
- Man pleads guilty to stealing over $100 million from Facebook, Google 2 Years Ago
- The Washington Post is under fire for a transphobic cartoon about the Mueller Report 2 Years Ago
- Congressman quotes ‘Mein Kampf’ on House floor Today 11:55 AM
- Rapper Tone Loc detained after confronting teen in Confederate flag hat Today 11:37 AM
- Sarah Sanders shares Mueller Madness bracket Today 10:19 AM
- NASA postpones all-women spacewalk over lack of suits that fit the female astronauts Today 10:17 AM
- Texas Rangers shortstop walks up to ‘Baby Shark’ Today 9:58 AM
- The best wireless gaming headsets under $100 Today 9:23 AM
- Trump demands networks blacklist these guests—including prominent Democrats Today 9:09 AM
- Bookworms! Now’s your chance to grab 3 months of Amazon Music for free Today 9:00 AM
- You can get paid $1,000 to binge-watch the first 20 Marvel movies Today 8:56 AM
- The ‘flat stomach’ meme has morphed into the ‘pregnant mom’ meme Today 8:43 AM
- Get 6 months free with this sweet Amazon Music Unlimited offer Today 8:30 AM
- Zoie Burgher tweets details about supposed threesome with FaZe Pamaj, Abigale Mandler Today 8:09 AM
Photo via LLLEV/Flickr (CC-BY)
Schoolzilla, a student data warehouse platform, reacted quickly to secure the students’ data.
More than a million American students had their information exposed this month in a data breach at a California-based company that offers data services to kindergarten through 12-grade schools.
A student data warehouse platform, Schoolzilla first acknowledged the breach on April 12 in a message on its website, informing customers: “A well-known computer security researcher was doing a targeted analysis of Schoolzilla when he uncovered a file configuration error.”
The researcher, Chris Vickery of the Kromtech Security Research Team, told the Daily Dot this week that he discovered the Schoolzilla breach in early April while scanning the web for an “all too common” misconfiguration in Amazon cloud storage devices (Amazon S3 buckets).
The storage device discovered by Vickery included a database that contains the personal information of approximately 1.3 million students in the United States, including some Social Security numbers. The researcher was unable to provide the Dot with evidence of the breach because he delete the database from his own computer shortly after realizing the leaked data pertained to minors.
“The sheer volume of private student data, including [test] scores and social security numbers for children, convinced me that it should be purged from my storage in an expedited fashion,” Vickery said.
The Daily Dot was unable to immediately confirm which U.S. schools may have been affected. However, Vickery confirmed (and praised) the swift action of Schoolzilla, which he said corrected the issue and secured the students’ information within 24 hours. “As soon as we learned of it, we immediately fixed the error and confirmed no one accessed any information, other than the researcher,” the company said.
Unfortunately, that’s an atypical response. It is a common issue that many companies respond with suspicion when reached by outside security researchers reporting vulnerabilities that expose their customers’ data. In contrast, Schoolzilla responded to his notification appropriately, Vickery said, and took immediate action to secure its data.
“This was the first situation of its kind for them and they reacted professionally,” Vickery said. “It must have been grueling for the CEO to phone each client and relay the unpleasant news, but they did it within only a few days of my report.”
In 2016, Vickery helped secure a leaky database that exposed approximately 191 million records of U.S. voters, including about 19 million disclosing religious affiliations and gun ownership. He later found and helped secure another voter database containing around 154 million records hosted on a Google server. Last April, Vickery helped secure a database located on a U.S.-based server that contained 87 million records of Mexican voters, which prompted a criminal investigation in that country.
Dell Cameron was a reporter at the Daily Dot who covered security and politics. In 2015, he revealed the existence of an American hacker on the U.S. government's terrorist watchlist. He is a co-author of the Sabu Files, an award-nominated investigation into the FBI's use of cyber-informants. He became a staff writer at Gizmodo in 2017.