Threat Landscape
Education holds the most sensitive data of the most vulnerable users — and operates with the smallest cybersecurity budgets of any sector.
The education and research threat landscape is defined by a structural mismatch between the sensitivity of the data held and the resources available to protect it. K-12 school districts hold student-record data — full name, date of birth, social security number, parent contact information, medical and Individualised Education Programme details, disciplinary records, free-and-reduced-lunch eligibility, sometimes psychiatric and protective-services notes — that is in many respects more sensitive than financial-services data, because it concerns minors who cannot defend their own credit or identity for years to come. Universities additionally hold research data, intellectual property, and grant-funded work product that has commercial and national-security value. The cybersecurity budgets of school districts and most universities are a fraction of those in finance, healthcare, or defence.
The December 2024 PowerSchool incident is the canonical recent illustration. PowerSchool — the cloud-based Student Information System provider for over 18,000 school organisations across 90 countries, supporting more than 60 million students — was compromised through its PowerSource customer-support portal between December 19 and 28, 2024, by a 19-year-old US national who used compromised credentials to access the "export data manager" customer-support tool and exfiltrate the "Students" and "Teachers" database tables. The attacker extorted PowerSchool for USD 2.85 million; PowerSchool paid the ransom and was provided with a video purporting to show data deletion. In May 2025, the same data resurfaced as separate threat actors began extorting individual school districts directly. [01]
A leaked credit-card record can be cancelled within hours. A leaked student-record set including the full SSN of a child cannot be cancelled. The child will become an adult carrying a permanently compromised identity into every credit application, every employment background check, every healthcare interaction, every government-services touchpoint of their adult life.
The 2024 incident calendar is comprehensive: the September 2024 Granite School District (Utah) ransomware attack affected 450,000 current and former student records; the 2023 Minneapolis Public Schools Medusa-ransomware attack exposed 300,000 student files including sexual-assault, psychiatric-hospitalisation, and abusive-parent records when the district refused to pay the USD 1 million ransom; the October 2023 Otsego Public Schools breach exposed names, SSNs, driver's license numbers, and payment information; the December 2021 Illuminate Education breach exposed millions of student records. The American higher-education incident pattern follows similar lines, with the 2024 University of Pennsylvania breach (1+ million records claimed) and persistent targeting of research-grant-funded data by PRC-aligned APT campaigns. [02]
The international research-sector dimension is consequential. PRC-affiliated APT groups have systematically targeted Western university research output for at least two decades, with focus on dual-use technologies, emerging materials, biosciences, and AI/ML research. The targeting parallels defence-industrial-base targeting in everything except the lower defensive posture of the academic targets.