DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Missouri Teachers’ Social Security numbers at risk on state agency’s website; state’s response is to shoot the messenger?

Posted on October 14, 2021 by Dissent

Josh Renaud reports:

The Social Security numbers of school teachers, administrators and counselors across Missouri were vulnerable to public exposure due to flaws on a website maintained by the state’s Department of Elementary and Secondary Education.

The Post-Dispatch discovered the vulnerability in a web application that allowed the public to search teacher certifications and credentials

Read more on St. Louis Post-Dispatch.

Now at this point, you’re probably asking the usual questions like “How many were potentially at risk?” “How long had this been a problem?” and “Is there any evidence that the data were accessed or downloaded for possible misuse?”  But while those are all reasonable questions, my question is ‘Why is the administration engaging in “Shoot the Messenger?’ and calling the reporter a “hacker?”

According to the Post-Dispatch’s report, in both a press release on the state’s site and a letter to educators, the state blamed the Post-Dispatch for discovering the vulnerability and referred to the reporter as a hacker.


Through a multi-step process, a hacker took the records of at least three educators, decoded the HTML source code, and viewed the social security number (SSN) of those specific educators.


The letter to educators replaced “hacker” with “individual.”

Sam Clancy of KSDK in Missouri seems to have picked up the state’s claims and KSDK headlines a story: “Hacker gets SSN, other information of 3 Missouri teachers in data breach.”

KSDK probably had no idea they were accusing another journalist of being a hacker.

But kudos to the St. Louis Post-Dispatch team that found the problem, confirmed it, and then responsibly disclosed it to the state.  I’m going to let their external counsel, attorney Joseph Martineau of Lewis Rice, have the last word here, although I note that Martineau seems to only use “hacker” in a criminal sense, whereas many hackers are whitehats and administrators:

“The reporter did the responsible thing by reporting his findings to DESE so that the state could act to prevent disclosure and misuse,” Martineau said in a written statement. “A hacker is someone who subverts computer security with malicious or criminal intent. Here, there was no breach of any firewall or security and certainly no malicious intent.

“For DESE to deflect its failures by referring to this as ‘hacking’ is unfounded. Thankfully, these failures were discovered.”

DESE:  we’ll just wait over here for you to apologize for attempting to deflect blame to the reporter who discovered your security problem and who worked with their team to responsibly disclose it to you.

Update: The state seems to be doubling down on accusing the reporter and the press of illegal conduct. You can watch the Governor’s press conference/statement on YouTube.

Category: Commentaries and AnalysesEducation SectorExposureGovernment SectorU.S.

Post navigation

← Update: Missouri Delta Medical Center acknowledges ransomware incident
Acer India hacked — again? →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • International cybercrime tackled: Amsterdam police and FBI dismantle proxy service Anyproxy
  • Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency
  • N.W.T.’s medical record system under the microscope after 2 reported cases of snooping
  • Department of Justice says Berkeley Research Group data breach may have exposed information on diocesan sex abuse survivors
  • Masimo Manufacturing Facilities Hit by Cyberattack
  • Education giant Pearson hit by cyberattack exposing customer data
  • Star Health hacker claims sending bullets, threats to top executives: Reports
  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported
  • Georgia hospital defeats data-tracking lawsuit
  • 60K BTC Wallets Tied to LockBit Ransomware Gang Leaked

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • FTC dismisses privacy concerns in Google breakup
  • ARC sells airline ticket records to ICE and others
  • Clothing Retailer, Todd Snyder, Inc., Settles CPPA Allegations Regarding California Consumer Privacy Act Violations
  • US Customs and Border Protection Plans to Photograph Everyone Exiting the US by Car
  • Google agrees to pay Texas $1.4 billion data privacy settlement
  • The App Store Freedom Act Compromises User Privacy To Punish Big Tech
  • Florida bill requiring encryption backdoors for social media accounts has failed

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.