- Redditor wants to know if he’s the a**hole for ghosting pregnant partner Thursday 8:19 PM
- How to go live on TikTok Thursday 8:08 PM
- Joey Salads suggests Democrats carried out Santa Clarita mass shooting Thursday 7:31 PM
- How influencers use TikTok to make money and launch careers Thursday 7:18 PM
- How to stream Argentina vs. Brazil live Thursday 6:51 PM
- How to watch Disney+ on a smart TV Thursday 6:28 PM
- Miss Fame calls out Justin Bieber for low music video appearance pay offer Thursday 6:19 PM
- Trump Jr. ranked No. 1 on best-seller list—after the GOP gave away copies of his book Thursday 5:45 PM
- How to get Disney+ bundle if you already subscribe to Hulu and/or ESPN+ Thursday 5:19 PM
- Mo’Nique suing Netflix for race and gender discrimination Thursday 5:09 PM
- Students outraged that professors accused of sexual misconduct are still teaching Thursday 5:00 PM
- TikTok users jokingly wear big hats to sneak snacks into movie theaters Thursday 3:59 PM
- Why today’s new facially recognition bill is being called ‘woefully’ inadequate Thursday 3:15 PM
- Facebook has given more user data to the government than ever before Thursday 2:57 PM
- How to sign up for Disney Plus Thursday 2:55 PM
More than a million American students had their information exposed this month in a data breach at a California-based company that offers data services to kindergarten through 12-grade schools.
A student data warehouse platform, Schoolzilla first acknowledged the breach on April 12 in a message on its website, informing customers: “A well-known computer security researcher was doing a targeted analysis of Schoolzilla when he uncovered a file configuration error.”
The researcher, Chris Vickery of the Kromtech Security Research Team, told the Daily Dot this week that he discovered the Schoolzilla breach in early April while scanning the web for an “all too common” misconfiguration in Amazon cloud storage devices (Amazon S3 buckets).
The storage device discovered by Vickery included a database that contains the personal information of approximately 1.3 million students in the United States, including some Social Security numbers. The researcher was unable to provide the Dot with evidence of the breach because he delete the database from his own computer shortly after realizing the leaked data pertained to minors.
“The sheer volume of private student data, including [test] scores and social security numbers for children, convinced me that it should be purged from my storage in an expedited fashion,” Vickery said.
The Daily Dot was unable to immediately confirm which U.S. schools may have been affected. However, Vickery confirmed (and praised) the swift action of Schoolzilla, which he said corrected the issue and secured the students’ information within 24 hours. “As soon as we learned of it, we immediately fixed the error and confirmed no one accessed any information, other than the researcher,” the company said.
Unfortunately, that’s an atypical response. It is a common issue that many companies respond with suspicion when reached by outside security researchers reporting vulnerabilities that expose their customers’ data. In contrast, Schoolzilla responded to his notification appropriately, Vickery said, and took immediate action to secure its data.
“This was the first situation of its kind for them and they reacted professionally,” Vickery said. “It must have been grueling for the CEO to phone each client and relay the unpleasant news, but they did it within only a few days of my report.”
In 2016, Vickery helped secure a leaky database that exposed approximately 191 million records of U.S. voters, including about 19 million disclosing religious affiliations and gun ownership. He later found and helped secure another voter database containing around 154 million records hosted on a Google server. Last April, Vickery helped secure a database located on a U.S.-based server that contained 87 million records of Mexican voters, which prompted a criminal investigation in that country.
Dell Cameron was a reporter at the Daily Dot who covered security and politics. In 2015, he revealed the existence of an American hacker on the U.S. government's terrorist watchlist. He is a co-author of the Sabu Files, an award-nominated investigation into the FBI's use of cyber-informants. He became a staff writer at Gizmodo in 2017.