School Cyberattacks Expose Gaps in Data Disclosure as PowerSchool Ransom Claim Spreads and Portland Probe Drags On
On a cold morning in January 2025, North Carolina parents opened routine-looking emails about a âglobal cybersecurity incidentâ at PowerSchool, the online system they use to check grades and attendance. The notices warned that some information may have been accessed without authorization but assured families the threat was over.
PowerSchool, the letters said, had contained the breach and ensured that any stolen data âwas not shared and has been destroyed.â
Four months later, staff in about 20 North Carolina school districts began receiving emails that suggested otherwise. On May 7, 2025, âthreat actorsâ wrote to them directly, demanding payment in Bitcoin and claiming to hold exactly the student and staff information that was supposed to have been wiped.
The incident, now part of a multistate investigation, is one of two recent school cyberattacks that show how slowly and unevenly U.S. Kâ12 systems are responding when hackers make off with sensitive data on children, families and employees.
In North Carolina, a vendorâs assurances that stolen data had been destroyed unraveled in public. In Portland, Maine, the stateâs largest district spent nearly a year investigating a ransomware attack before confirming that names, Social Security numbers and financial and medical details had likely been accessed and starting to notify 12,128 affected people.
Together, the cases illuminate a widening gap between how quickly cybercriminals move and how long it can take schools and their vendors to disclose what really happened.
A global vendor breach hits nearly 4 million in one state
The PowerSchool incident began in December 2024, when a hacker used the credentials of a contract employee to get into the companyâs systems. The platform serves districts around the world and has been North Carolinaâs statewide student information system since 2013.
By the time the company discovered the intrusion on Dec. 28, 2024, data tables containing student and staff information had been accessed. The North Carolina Department of Public Instruction, which oversees Kâ12 public schools, was notified on Jan. 7, 2025.
Initial messages from the department and local districts leaned heavily on PowerSchoolâs statements.
PowerSchool had âassured us that the compromised data has been secured and deleted,â Vanessa Wrenn, the departmentâs chief information officer, told the State Board of Education in a January briefing. She emphasized that âno actions by our schools or no actions by DPI could have prevented this incident from happening.â
The state attorney generalâs office later said the breach ultimately affected more than 62.4 million current and former students and teachers nationwide, including nearly 4 million people in North Carolina. Potentially exposed information included names, addresses, Social Security numbers for some students and many staff members, and medical and disciplinary details.
PowerSchool began notifying individuals and offering identity protection and credit monitoring. District notices repeated that the company believed the stolen data had not been shared and had been destroyed.
That assurance did not hold.
On May 7, 2025, North Carolinaâs education department and roughly 20 local districts received emails from people claiming to be in possession of PowerSchool data and demanding Bitcoin to keep it from being released.
Wrenn later said the messages âshowed some evidence of having the same data that was breached in Januaryâ and described them as extortion attempts mirroring communications previously sent to PowerSchool itself.
State Superintendent Maurice âMoâ Green told reporters that the department âhas not and certainly will not engage with these threat actors.â A 2023 state law, Section 143â800 of the North Carolina General Statutes, prohibits state agencies and local governments from paying ransomware demands or even communicating with attackers for the purpose of making a payment.
Green also publicly distanced the department from the vendorâs earlier reassurance.
âAt the time of the original incident notification in January of this year, PowerSchool did assure its customers that the compromised data would not be shared and had been destroyed,â he said. âUnfortunately, that at least at this point, is proving to be incorrect.â
The state Department of Justice would later disclose that PowerSchool had quietly paid a ransom after the December 2024 breach in exchange for promises that the stolen data would be erased. Company representatives were shown a video that appeared to depict the information being destroyed, according to accounts provided by state officials.
That did not stop extortionists â potentially the same group or others who obtained copies â from attempting to pressure schools directly months later.
North Carolina Attorney General Jeff Jackson has opened an investigation into PowerSchoolâs security practices and breach response and has demanded detailed records on the companyâs safeguards, response steps and the precise number of affected residents. He has said he will âtake additional legal action if necessary.â
The State Board of Education has since voted to end use of PowerSchool as the statewide student information system as of June 30, 2025, shifting to a new vendor, Infinite Campus, on July 1. PowerSchool remains under a limited contract for other tools such as educator evaluations and applicant tracking, under conditions that include independent security testing and review by the North Carolina National Guardâs cybersecurity unit.
Nearly a year to confirm data exposure in Portland
If North Carolinaâs PowerSchool saga highlights the risk of centralized vendors, the Portland Public Schools breach in Maine points to challenges at the district level.
On or about Feb. 2, 2025, Portlandâs network was accessed without authorization. The Maine attorney generalâs office lists the breach date as Feb. 5 and describes it as an external hacking incident.
Around May 2025, the ransomware group RansomHub posted Portland Public Schools to its data leak site, claiming to have stolen about 110 gigabytes of data and publishing samples that appeared to include identification scans, insurance documents, budgets and student health records. The district did not publicly confirm those details at the time.
Instead, it launched what officials later described as an âextensive forensic investigation and comprehensive document review.â That work continued throughout 2025.
Nearly a year after the initial intrusion, on Jan. 6, 2026, the district concluded that personal information âmay have been accessed and/or acquiredâ by the attacker.
âAs a result of the investigation, it was determined that this incident was attributable to a cybersecurity attack,â Hayley Didriksen, the districtâs senior director of data and technology, wrote in a Jan. 30 letter to affected individuals. âWe have also learned that certain employee personal information was likely accessed and/or acquired by the bad actor.â
Portland then began mailing notification letters, as required under Maine law. The filing with the attorney generalâs office reports that 12,128 people were affected, including 5,183 Maine residents and others in neighboring states.
According to that filing and descriptions of the notices, the types of information involved included full names, Social Security numbers and financial account details. Some letters also referenced medical and health insurance information, government-issued identification numbers and dates of birth.
The district offered 12 months of free credit monitoring and identity theft services through Experian but did not say in public statements whether it had paid or negotiated with RansomHub.
Maineâs data breach statute requires entities to notify the attorney general and affected residents âas expediently as possible and without unreasonable delay,â while allowing time for law enforcement investigations and measures to determine the scope of the breach. Whether the nearly yearlong gap in Portlandâs case meets that standard may ultimately be tested if litigation moves forward. At least one law firm has announced it is exploring a class-action lawsuit.
Schools as targets â and the limits of current protections
Security researchers say both incidents fit into a broader pattern of attacks on education institutions.
Ransomware groups and data thieves increasingly view school systems as attractive targets because they hold large volumes of personal information â not just on students, but also on parents, guardians and employees â while often running on limited technology budgets and aging infrastructure.
In North Carolina, Jacksonâs office reported that 2,258 organizations disclosed data breaches in 2024, impacting nearly 6.7 million residents, a record for the state. The PowerSchool incident was one of the most farâreaching because the vendorâs platform is used to manage student records statewide.
In both the PowerSchool and Portland cases, the primary remedy offered to victims has been a limited period of credit monitoring and identity theft protection, typically one to two years. Privacy advocates and some law enforcement officials have questioned whether that is adequate when the compromised data includes Social Security numbers, medical and disciplinary histories and other records that can be misused long after monitoring expires.
The main federal laws governing student privacy â the Family Educational Rights and Privacy Act and the Childrenâs Online Privacy Protection Act â focus on how schools and companies collect and share data, not how they respond when hackers steal it. Breach notification requirements and ransom policies are largely set at the state level, creating a patchwork of rules.
North Carolina has moved to tighten oversight of its education vendors, requiring annual security attestations for companies that handle protected information and involving the National Guard in reviewing major contracts. Maineâs law, like those in most states, focuses on postâincident notification rather than prescribing specific cybersecurity standards for districts.
For families and school staff, those distinctions can be hard to see. In both North Carolina and Maine, the first concrete sign that something was wrong came as a letter in the mail or a notice in an inbox, often months after the initial attack.
In North Carolina, those letters once told parents that stolen data had been âsecured and deleted.â In Portland, they informed recipients that their Social Security numbers and, in some cases, medical and financial details âmay have been accessed and/or acquiredâ by someone who broke into the districtâs systems nearly a year earlier.
In each case, the message ended the same way: a recommendation to sign up for credit monitoring and to watch accounts carefully, and an acknowledgment that school systems now operate in a world where the information they collect about students and staff can travel far beyond the classroom.