From a school system email:

PowerSchool has informed us that they have taken action with the hackers to ensure the unauthorized data was deleted without any further replication or dissemination. They do not anticipate any of the data being shared or made public and are working with cybersecurity experts and law enforcement to ensure ongoing data safety.  PowerSchool indicated they will be providing credit monitoring to affected adults and identity protection services to affected minors in accordance with regulatory obligations.

    • @WIPocket
      link
      English
      1726 days ago

      They often do. If they didnt, people wouldnt pay the ransom.

      • AmidFuror
        link
        fedilink
        326 days ago

        I made a similar comment elsewhere. Are the hackers identifying themselves such that they have a reputation that means something? If so, how do we know they are the reputable hackers and not just using the name of the reputable hackers?

        In blackmail cases, the scammers typically keep coming back for more and more money.

        • @x00z
          link
          English
          625 days ago

          Reputable blackhat hackers often use an online portal where they show proof.

          Lesser known ransomware gangs are definitely known to try and double dip though.

          • @nandeEbisu
            link
            English
            425 days ago

            That’s why you should always check the reviews of any hacking organization before letting them hack you.

        • @[email protected]
          link
          fedilink
          English
          225 days ago

          I had the same thought. What’s stopping a new party from riding the clout of a “reputable” hacker?

          • @Cypher
            link
            English
            325 days ago

            There is a whole ecosystem at work where hackers can trade tools, collaborate, announce successes and confirm they are behind a breach.

            The ransomware system relies on the majority of actors following through on their part of the bargain or no one would ever pay a ransom.

            There are many parallels to how the majority of real world piracy was conducted.