Back to Breach Tracker
Database Leak
CriticalUnconfirmed

Multiple Philippine Schools (LMS Platform Breach)

A threat actor using the alias 'AFish' posted a database for sale containing 132,037 student records, 14,145 teacher records, and administrator credentials from a shared LMS platform used by multiple Philippine schools including Colegio San Agustin, Notre Dame University, and Don Bosco schools.

August 1, 2025Nationwide, National146,000+ records affected

Key Facts

Date of Incident
August 1, 2025
Date Discovered
August 1, 2025
Records Affected
146,000+
Data Types Exposed
Personal email addressesCourse informationStudent numbersBirth datesPasswords (unhashed)Administrator names
Response / Action Taken

No institutions have issued public statements regarding the claim. Breach remains unconfirmed.

What Happened

Philippine cybersecurity monitoring group Deep Web Konek (DWK) reported that a threat actor using the alias "AFish" posted a database for sale on a cybercrime forum. The database allegedly contains records from a Learning Management System (LMS) used by multiple Philippine educational institutions.

The seller offered the data for $60 USD in Monero (XMR) cryptocurrency, restricted to a single buyer. The listing also claimed to include "specialized tools and a guide for anonymity and spying" bundled with the database.

Schools Allegedly Affected

The following institutions were named in the listing:

  • VHS Manila
  • Colegio San Agustin (CSA)
  • Philippine Christian School (PCS)
  • Notre Dame University (NDU)
  • Don Bosco schools
  • Additional unnamed schools

Data Exposed

The alleged database contains:

  • 132,037 student records — including personal email addresses, course information, student numbers, and birth dates
  • 14,145 teacher records — with similar personal data
  • 41 school administrator records — names and credentials
  • 4 website administrator records — names and credentials
  • Passwords stored without hashing — the seller specifically claimed the passwords are "non-hashed," meaning they are stored in plain text

Why This Breach Is Critical

This breach is particularly dangerous for several reasons:

  • Plain-text passwords — if passwords are truly unhashed, every student and teacher account is immediately compromised. Users who reuse these passwords on other services (email, banking, social media) face cascading account takeovers
  • Shared platform vulnerability — a single vulnerability in the LMS platform exposed data across multiple schools simultaneously, demonstrating the risks of shared educational technology platforms
  • Birth dates plus email addresses — this combination is commonly used for identity verification, making affected students vulnerable to identity theft
  • Administrator credentials — compromised admin accounts could allow further access to school systems, grade manipulation, or deployment of additional malware

How This Attack Likely Works

The breach of a shared LMS platform typically occurs through:

  • SQL injection — exploiting vulnerabilities in the LMS web application to extract the entire database
  • Compromised admin credentials — gaining access to the LMS admin panel through phishing or credential stuffing, then exporting all user data
  • Unpatched LMS software — many schools run outdated versions of LMS platforms (Moodle, Canvas, custom systems) with known vulnerabilities
  • Shared hosting vulnerabilities — if multiple schools share the same LMS instance, compromising one entry point exposes all schools' data

How to Prevent This

  1. 1.Never store passwords in plain text — use strong hashing algorithms like bcrypt, scrypt, or Argon2. This is the most critical finding — plain-text password storage is an emergency-level security flaw
  2. 2.Audit your LMS vendor's security practices — ask vendors whether they hash passwords, conduct penetration testing, and maintain SOC 2 compliance before signing contracts
  3. 3.Keep LMS platforms updated — apply security patches immediately. If using Moodle, Canvas, or similar platforms, subscribe to their security advisories
  4. 4.Implement multi-factor authentication (MFA) — even if passwords are compromised, MFA prevents unauthorized login
  5. 5.Use unique credentials per platform — educate students and staff to never reuse passwords across services. Recommend password managers
  6. 6.Isolate school data in shared platforms — if using a multi-tenant LMS, ensure proper data isolation so one school's breach does not expose all schools
  7. 7.Monitor dark web forums — subscribe to threat intelligence services that monitor cybercrime forums for your institution's data

Sources & References

  1. [1]
    Deep Web Konek Philippine educational institutions' LMS allegedly breached, data for sale on dark web — threat actor 'AFish', unverified claim
LMSmultiple schoolsColegio San AgustinNotre Dame UniversityDon Boscoplain-text passwordsDeep Web Konek