We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: Holiday.com, ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.
Advertising Disclosure

vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: Holiday.com, ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

PowerSchool Breach: Schools Hit By New Extortion Attempts

PowerSchool Breach: Schools Hit By New Extortion Attempts
Hendrik Human First published on May 11, 2025 Cybersecurity Researcher

The cybergang behind a massive PowerSchool data breach is now attempting to directly extort schools and districts across the US and Canada — despite PowerSchool reportedly paying an undisclosed ransom for the deletion of the stolen data.

According to BleepingComputer, PowerSchool was given “reasonable assurances from the threat actor that the data had been deleted and that no additional copies exist." However, such claims are difficult to verify, and the renewed wave of extortion attempts is fueling concern that the stolen data remains in circulation.

In response to the reports,, PowerSchool released an official statement acknowledging that “a threat actor has reached out to multiple school district customers in an attempt to extort them using data from the previously reported December 2024 incident.” The company emphasized that this is not a new breach, as the sample data provided by the extortionists matches the records stolen last year.

Several Canadian school authorities, along with public school districts in North Carolina, have confirmed they are among the targets of this new campaign. Officials fear the blackmail effort may soon expand to other districts impacted by the breach.

Discovered on December 28, 2024, the hack was one of the largest in US history involving student data. Files contained sensitive information, including Social Security numbers, health records, disciplinary histories, and academic performance.

PowerSchool’s K-12 software supports thousands of schools and over 60 million students across North America. Alarmingly, the attackers gained access using just a single set of stolen credentials.

Worse still, investigations revealed that the unauthorized access had been active for months — dating back to at least August 2024. In some cases, the breach was so extensive that it exposed all historical records of students and teachers.

About the Author

Hendrik is a writer at vpnMentor, specializing in VPN comparisons and user guides. With 5+ years of experience as a tech and cybersecurity writer, plus a background in corporate IT, he brings a variety of perspectives to test VPN services and analyze how they address the needs of different users.

Please, comment on how to improve this article. Your feedback matters!

Leave a comment

This field must contain more than 50 characters

The field content should not exceed 1000 letters

Sorry, links are not allowed in this field!

Name should contain at least 3 letters

The field content should not exceed 80 letters

Sorry, links are not allowed in this field!

Please enter a valid email address