Yazılar

Massachusetts Student to Plead Guilty in PowerSchool Data Breach Affecting Millions

A 19-year-old college student from Massachusetts has agreed to plead guilty to hacking education software provider PowerSchool, in a breach that compromised data on tens of millions of students and teachers. The breach led to ransom demands targeting both the company and individual school districts.

Matthew Lane, a student at Assumption University in Worcester, is accused of stealing sensitive data by gaining unauthorized access to PowerSchool’s systems using login credentials belonging to a contractor. Prosecutors say he then transferred the stolen data to a server hosted in Ukraine in December 2024.

Shortly afterward, PowerSchool received a $2.85 million bitcoin ransom demand threatening to expose names, addresses, Social Security numbers, and other personal details of more than 60 million students and 10 million teachers unless the company complied. PowerSchool disclosed the breach in January 2025 and admitted to paying a ransom to prevent the data from being leaked.

Lane’s case is significant as it is the first time a suspect has been publicly linked to the breach, which impacted PowerSchool — a platform used by over 18,000 schools across North America. U.S. Attorney Leah Foley condemned Lane’s actions, saying they “instilled fear in parents that their kids’ information had been leaked into the hands of criminals – all to put a notch in his hacking belt.”

Court documents reveal that Lane also conspired in a previous cyber extortion scheme involving a telecommunications company, demanding a $200,000 ransom. He now faces charges of cyber extortion, aggravated identity theft, and unauthorized access to protected computers, carrying a mandatory minimum sentence of two years in prison.

Lane’s attorney did not comment on the plea deal, and PowerSchool has not disclosed further details beyond confirming ongoing extortion attempts aimed at multiple school districts affected by the breach.

Rogue Communication Devices Found in Chinese Solar Inverters Spark Global Security Alarm

U.S. energy officials are reevaluating the national security risks posed by Chinese-made power inverters after uncovering unexplained communication components inside devices used in critical infrastructure across the U.S., according to multiple sources with knowledge of the matter.

These undocumented modules, such as cellular radios, were discovered in inverters and batteries produced by Chinese manufacturers, raising concerns that firewalls could be bypassed, allowing remote manipulation or shutdowns of energy systems — with potentially catastrophic consequences for power grids.

That effectively means there is a built-in way to physically destroy the grid,” one expert warned.

What Are Inverters and Why This Matters

Inverters are vital for connecting solar panels, batteries, heat pumps, and EV chargers to the power grid. Most are produced in China and designed to allow remote updates, but are expected to be firewalled from foreign access. The recent discovery, however, suggests that some Chinese models include hidden communications hardware, not disclosed in product documentation.

Implications for National Security and Grid Stability

  • Disruption risk: Experts warn that coordinated manipulation of these devices could trigger blackouts, grid damage, or widespread energy instability.

  • Huawei, the world’s leading inverter manufacturer, left the U.S. market in 2019 but dominates globally, especially in Europe.

  • Over 200 GW of European solar power is linked to Chinese inverters, equivalent to more than 200 nuclear plants.

If you remotely control a large enough number of home solar inverters… that could have catastrophic implications,” said Uri Sadot of SolarEdge.

Government and Industry Response

  • The U.S. Department of Energy (DOE) acknowledged the challenge of ensuring manufacturers disclose full functionality. It is working to enhance transparency via Software Bill of Materials (SBOM) policies and contractual safeguards.

  • The U.S. Senate is considering the Decoupling from Foreign Adversarial Battery Dependence Act, targeting Chinese firms like CATL, BYD, Envision Energy, and others from 2027 onward.

  • Utilities such as Florida Power & Light are already seeking to reduce their reliance on Chinese inverter components.

  • Lithuania, Estonia, and Britain have also begun reassessing or restricting the use of Chinese inverters, with NATO warning that China’s influence over infrastructure is a growing threat.

The CCP stops at nothing to target our sensitive infrastructure,” said U.S. Representative August Pfluger.

Recent Incidents and Commercial Fallout

  • In November 2024, some inverters were reportedly disabled remotely from China, triggering internal industry disputes and heightened U.S. government scrutiny.

  • A commercial conflict between Sol-Ark and Deye ensued, with Sol-Ark confirming it had no control over affected devices not bearing its brand.

  • Chinese firms Huawei, Deye, and others declined to comment.

As the solar and renewable energy sector expands, experts are calling for urgent reforms to ensure hardware used in critical infrastructure is trusted, secure, and transparentechoing the regulatory efforts already in place in sectors like telecom and semiconductors.

Star Health Hacker Claims Responsibility for Death Threats and Bullet Packages Sent to Executives

The hacker known as xenZen”, who last year leaked sensitive data from Star Health and Allied Insurance CompanyIndia’s largest health insurer—has claimed responsibility for sending death threats and bullet cartridges to the company’s top executives, according to a March 31 email obtained by Reuters.

In a chilling escalation, xenZen said the threats were a direct reprisal for the insurer’s alleged denial of medical claims to customers. The packages, reportedly sent in February to Star Health’s headquarters in Chennai, Tamil Nadu, were addressed to CEO Anand Roy and CFO Nilesh Kambli. Inside, a note warned:

next one will go in ur and ur peoples head. tik tik tik.”

Reuters reviewed photographs included in the hacker’s email that appear to show the threatening packages. While the news agency has not independently verified the hacker’s identity or the full accuracy of the information provided, three Indian police sources confirmed that a criminal investigation is underway. According to one source, a man in the neighboring state of Telangana has been arrested for allegedly facilitating the delivery of the packages.

Star Health declined to comment in detail, citing an “ongoing, highly sensitive criminal investigation.” CFO Kambli directed inquiries to the company’s PR team, and CEO Roy did not respond to calls for comment.

The case adds to growing concerns over executive security in the healthcare industry, especially after the murder of UnitedHealthcare CEO Brian Thompson in December — an incident that reportedly inspired xenZen’s threats.

Last year, the hacker leaked what they claimed was 7.24 terabytes of personal data related to over 31 million customers, including medical reports and insurance details. Star Health confirmed the data breach, which followed a ransom demand of $68,000. The company has since launched legal action against xenZen and Telegram, which was used to distribute the stolen data via chatbots. Those bots have since been removed.

In the latest email, xenZen claimed the threats followed requests from disgruntled customers who alleged their valid claims had been denied despite having coverage. Star Health has not responded to these specific allegations.

As the case unfolds, the incident raises urgent questions about data security, corporate accountability, and the physical safety of executives in an era where cyberattacks increasingly blur into real-world consequences.