What Happened
Philippine cybersecurity monitoring group Deep Web Konek (DWK) reported that a threat actor using the alias "AFish" posted a database for sale on a cybercrime forum. The database allegedly contains records from a Learning Management System (LMS) used by multiple Philippine educational institutions.
The seller offered the data for $60 USD in Monero (XMR) cryptocurrency, restricted to a single buyer. The listing also claimed to include "specialized tools and a guide for anonymity and spying" bundled with the database.
Schools Allegedly Affected
The following institutions were named in the listing:
- VHS Manila
- Colegio San Agustin (CSA)
- Philippine Christian School (PCS)
- Notre Dame University (NDU)
- Don Bosco schools
- Additional unnamed schools
Data Exposed
The alleged database contains:
- 132,037 student records — including personal email addresses, course information, student numbers, and birth dates
- 14,145 teacher records — with similar personal data
- 41 school administrator records — names and credentials
- 4 website administrator records — names and credentials
- Passwords stored without hashing — the seller specifically claimed the passwords are "non-hashed," meaning they are stored in plain text
Why This Breach Is Critical
This breach is particularly dangerous for several reasons:
- Plain-text passwords — if passwords are truly unhashed, every student and teacher account is immediately compromised. Users who reuse these passwords on other services (email, banking, social media) face cascading account takeovers
- Shared platform vulnerability — a single vulnerability in the LMS platform exposed data across multiple schools simultaneously, demonstrating the risks of shared educational technology platforms
- Birth dates plus email addresses — this combination is commonly used for identity verification, making affected students vulnerable to identity theft
- Administrator credentials — compromised admin accounts could allow further access to school systems, grade manipulation, or deployment of additional malware
How This Attack Likely Works
The breach of a shared LMS platform typically occurs through:
- SQL injection — exploiting vulnerabilities in the LMS web application to extract the entire database
- Compromised admin credentials — gaining access to the LMS admin panel through phishing or credential stuffing, then exporting all user data
- Unpatched LMS software — many schools run outdated versions of LMS platforms (Moodle, Canvas, custom systems) with known vulnerabilities
- Shared hosting vulnerabilities — if multiple schools share the same LMS instance, compromising one entry point exposes all schools' data
How to Prevent This
- 1.Never store passwords in plain text — use strong hashing algorithms like bcrypt, scrypt, or Argon2. This is the most critical finding — plain-text password storage is an emergency-level security flaw
- 2.Audit your LMS vendor's security practices — ask vendors whether they hash passwords, conduct penetration testing, and maintain SOC 2 compliance before signing contracts
- 3.Keep LMS platforms updated — apply security patches immediately. If using Moodle, Canvas, or similar platforms, subscribe to their security advisories
- 4.Implement multi-factor authentication (MFA) — even if passwords are compromised, MFA prevents unauthorized login
- 5.Use unique credentials per platform — educate students and staff to never reuse passwords across services. Recommend password managers
- 6.Isolate school data in shared platforms — if using a multi-tenant LMS, ensure proper data isolation so one school's breach does not expose all schools
- 7.Monitor dark web forums — subscribe to threat intelligence services that monitor cybercrime forums for your institution's data
Sources & References
- [1]Deep Web Konek — Philippine educational institutions' LMS allegedly breached, data for sale on dark web — threat actor 'AFish', unverified claim