From a school system email:

PowerSchool has informed us that they have taken action with the hackers to ensure the unauthorized data was deleted without any further replication or dissemination. They do not anticipate any of the data being shared or made public and are working with cybersecurity experts and law enforcement to ensure ongoing data safety.  PowerSchool indicated they will be providing credit monitoring to affected adults and identity protection services to affected minors in accordance with regulatory obligations.

          • AmidFuror@fedia.io
            link
            fedilink
            arrow-up
            3
            ·
            1 day ago

            I made a similar comment elsewhere. Are the hackers identifying themselves such that they have a reputation that means something? If so, how do we know they are the reputable hackers and not just using the name of the reputable hackers?

            In blackmail cases, the scammers typically keep coming back for more and more money.

            • x00z@lemmy.world
              link
              fedilink
              English
              arrow-up
              4
              ·
              1 day ago

              Reputable blackhat hackers often use an online portal where they show proof.

              Lesser known ransomware gangs are definitely known to try and double dip though.

              • nandeEbisu@lemmy.world
                link
                fedilink
                English
                arrow-up
                2
                ·
                11 hours ago

                That’s why you should always check the reviews of any hacking organization before letting them hack you.

            • can@sh.itjust.works
              link
              fedilink
              English
              arrow-up
              2
              ·
              1 day ago

              I had the same thought. What’s stopping a new party from riding the clout of a “reputable” hacker?

              • Cypher@lemmy.world
                link
                fedilink
                English
                arrow-up
                1
                ·
                24 hours ago

                There is a whole ecosystem at work where hackers can trade tools, collaborate, announce successes and confirm they are behind a breach.

                The ransomware system relies on the majority of actors following through on their part of the bargain or no one would ever pay a ransom.

                There are many parallels to how the majority of real world piracy was conducted.