Incident: Teen Hacker Exposes Serious Security Flaws in School Software

Published Date: 2019-08-09

Postmortem Analysis
Timeline 1. The software failure incident involving the vulnerabilities found in Blackboard and Follett's software by Bill Demirkapi happened around July 2018 [88022].
System 1. Blackboard's Community Engagement software 2. Follett's Student Information System [88022]
Responsible Organization 1. The software failure incident was caused by serious bugs found in the software sold by tech firms Blackboard and Follett, as identified by 18-year-old hacker Bill Demirkapi [88022].
Impacted Organization 1. Students and teachers at schools using Blackboard and Follett software [88022]
Software Causes 1. The software failure incident was caused by serious bugs in the web interfaces of software sold by tech firms Blackboard and Follett, allowing a hacker to gain deep access to student data [88022]. 2. The bugs included SQL-injection and cross-site-scripting vulnerabilities in Blackboard's Community Engagement software and Follett's Student Information System [88022]. 3. In Blackboard's software, the bugs allowed access to a database containing various categories of data such as phone numbers, discipline records, bus routes, and attendance records [88022]. 4. In Follett's software, the bugs would have given a hacker access to student data like grade point average, special education status, number of suspensions, and passwords, which were stored unencrypted [88022].
Non-software Causes 1. Lack of attention to cybersecurity in education software [88022] 2. Dismissal of concerns raised by the teenage hacker by the companies [88022] 3. Lack of bug bounty programs for rewarding security researchers [88022]
Impacts 1. The software failure incident led to the exposure of serious bugs in the school software provided by tech firms Blackboard and Follett, allowing a hacker to gain deep access to student data, including grades, immunization records, cafeteria balance, schedules, passwords, and photos [88022]. 2. The vulnerabilities in the software could potentially have affected over 5,000 schools and compromised around 5 million individual records of students, teachers, and other staff members [88022]. 3. The incident highlighted the poor state of cybersecurity in education software, indicating a lack of attention to security in companies holding sensitive student information [88022]. 4. The software failure incident resulted in the suspension of the teenage hacker, Bill Demirkapi, from school for two days after he exploited a bug to send a message to thousands of parents, teachers, and students [88022]. 5. The incident also shed light on the challenges faced by security researchers like Demirkapi in getting companies to take their findings seriously and address security flaws promptly [88022].
Preventions 1. Implementing regular security audits and penetration testing to identify vulnerabilities in the software [88022]. 2. Establishing a bug bounty program to incentivize security researchers to report and help fix vulnerabilities in the software [88022]. 3. Encrypting sensitive data such as passwords to prevent unauthorized access [88022]. 4. Taking reports from security researchers, especially young individuals, seriously and promptly addressing identified issues [88022]. 5. Providing proper training and education on cybersecurity best practices to developers and employees working on the software [88022].
Fixes 1. Implementing thorough security audits and regular vulnerability assessments to identify and address potential weaknesses in the software [88022]. 2. Establishing bug bounty programs to incentivize security researchers to report and help fix vulnerabilities in the software [88022]. 3. Enhancing encryption practices to ensure sensitive data, such as passwords, are stored securely [88022]. 4. Improving communication channels for security researchers to report vulnerabilities and ensuring prompt and appropriate responses from companies [88022]. 5. Providing adequate training and resources for developers to build secure software and prevent common web vulnerabilities like SQL injection and cross-site scripting [88022].
References 1. Bill Demirkapi - The articles gather information directly from Bill Demirkapi, the 18-year-old hacker who discovered the vulnerabilities in the school software [88022].

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization, multiple_organization (a) The software failure incident related to one_organization: The incident involving serious bugs in school software, specifically in software sold by Blackboard and Follett, was discovered by 18-year-old Bill Demirkapi. He found vulnerabilities that allowed deep access to student data, including student grades, immunization records, cafeteria balance, schedules, passwords, and photos. The vulnerabilities were present in Blackboard's Community Engagement software and Follett's Student Information System. Demirkapi reported the bugs to the companies, and they eventually fixed the issues [88022]. (b) The software failure incident related to multiple_organization: The software failure incident involving vulnerabilities in school software sold by Blackboard and Follett highlights the broader issue of cybersecurity in education software. Bill Demirkapi's findings revealed common web bugs like SQL-injection and cross-site-scripting vulnerabilities in these widely used software systems. The incident underscores the poor state of cybersecurity in education software and the lack of attention to such vulnerabilities across multiple organizations that provide software solutions for schools [88022].
Phase (Design/Operation) design, operation (a) The software failure incident in the articles can be attributed to the design phase. The incident involved serious bugs found in the web interfaces of software sold by tech firms Blackboard and Follett, which were used by schools. These bugs allowed a hacker, in this case, a high school student, to gain deep access to student data, including sensitive information like student grades, immunization records, cafeteria balance, schedules, passwords, and photos [88022]. (b) Additionally, the software failure incident can also be linked to the operation phase. The high school student hacker, Bill Demirkapi, exploited flaws in the operation of the software systems by finding bugs that would give him access to student data like grade point average, special education status, number of suspensions, and passwords. In the case of Follett's software, passwords were stored unencrypted, making them fully readable. Demirkapi's actions highlighted vulnerabilities in the operation of the software systems, indicating a failure in ensuring secure operation and misuse of the systems [88022].
Boundary (Internal/External) within_system (a) within_system: The software failure incident reported in the articles is primarily within the system. The failure was due to serious bugs found in the web interfaces of software sold by tech firms Blackboard and Follett, which were used by schools. These bugs allowed a teenage hacker, Bill Demirkapi, to gain deep access to student data, including sensitive information like student grades, immunization records, cafeteria balances, schedules, passwords, and photos [88022]. (b) outside_system: There is no specific information in the articles indicating that the software failure incident was primarily due to contributing factors originating from outside the system.
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident in this case was primarily due to non-human actions, specifically vulnerabilities in the software itself that were exploited by a teenage hacker named Bill Demirkapi. Demirkapi discovered serious bugs in the web interfaces of software sold by Blackboard and Follett, which allowed him to gain deep access to student data, including sensitive information like grades, immunization records, passwords, and more [88022]. (b) However, human actions also played a role in this software failure incident. After discovering the vulnerabilities, Demirkapi struggled to get the companies to take him seriously when he tried to report the issues. He faced challenges in getting Blackboard and Follett to acknowledge and address the security flaws he had identified, leading him to resort to more disruptive actions like sending messages to thousands of users to get their attention. Eventually, with the help of his school district's director of technology and Carnegie Mellon's CERT Coordination Center, the companies began to listen and work towards fixing the vulnerabilities [88022].
Dimension (Hardware/Software) software (a) The articles do not provide information about the software failure incident occurring due to contributing factors originating in hardware. (b) The software failure incident reported in the articles is related to vulnerabilities in the school software systems developed by tech firms Blackboard and Follett. The vulnerabilities discovered by the high school hacker, Bill Demirkapi, were due to serious bugs in the software that allowed unauthorized access to student data. These bugs included SQL-injection and cross-site-scripting vulnerabilities in Blackboard's Community Engagement software and Follett's Student Information System. Additionally, the software flaw in Follett's system allowed access to student data like grade point average, special education status, number of suspensions, and passwords stored in unencrypted form [88022].
Objective (Malicious/Non-malicious) malicious (a) The software failure incident reported in the articles is malicious in nature. The incident involved a high school hacker, Bill Demirkapi, who discovered serious bugs in the school software provided by tech firms Blackboard and Follett. These bugs would allow a hacker to gain deep access to student data, including sensitive information such as student grades, immunization records, cafeteria balances, schedules, passwords, and photos [88022]. Demirkapi found vulnerabilities like SQL-injection and cross-site-scripting in the software, which ultimately allowed access to a database containing various categories of data, indicating a deliberate attempt to exploit weaknesses in the system for unauthorized access [88022]. Additionally, Demirkapi's actions were driven by a combination of teenage boredom and a desire to learn more about cybersecurity and web-based hacking. He engaged in activities like exploiting flaws in a college admission software to change his admission status, demonstrating a deliberate intent to manipulate the system [88022].
Intent (Poor/Accidental Decisions) accidental_decisions (a) The intent of the software failure incident was not due to poor decisions but rather due to accidental decisions made by the high school hacker, Bill Demirkapi. He found serious bugs in the school software by poking around the web interfaces of Blackboard and Follett, which led to vulnerabilities in student data access. Demirkapi's actions were motivated by teenage boredom and a passion for learning about cybersecurity and web-based hacking, rather than any deliberate poor decisions on his part [88022].
Capability (Incompetence/Accidental) development_incompetence, accidental (a) The software failure incident in this case can be attributed to development incompetence. The incident involved serious bugs found in the software used by schools, including Blackboard and Follett, which allowed a high school hacker to gain deep access to student data. The vulnerabilities discovered by the hacker, Bill Demirkapi, included SQL-injection and cross-site-scripting vulnerabilities, as well as unencrypted storage of passwords in Follett's software. Despite the hacker's efforts to report the bugs to the companies, he faced challenges in getting them to take him seriously initially, indicating a lack of attention to cybersecurity in the development process [88022]. (b) The software failure incident can also be considered accidental to some extent. The high school hacker, Bill Demirkapi, initially started exploring the vulnerabilities out of teenage boredom and a desire to learn more about cybersecurity and web-based hacking. His actions, although unauthorized, were driven by curiosity rather than malicious intent. Additionally, the hacker mentioned that he struggled to get the companies to take him seriously when he tried to report the bugs, leading to unintended consequences such as sending a message to thousands of users due to a bug he found in Follett's software, which got him suspended from school for two days [88022].
Duration temporary (a) The software failure incident in the articles can be categorized as temporary. The vulnerabilities found by the teenage hacker, Bill Demirkapi, in the Blackboard and Follett software were reported to the companies, and both companies acknowledged the bugs and fixed them by July of 2018 [88022]. This indicates that the failure was temporary and was resolved once the companies addressed the security flaws.
Behaviour other (a) crash: The incident reported in the article does not involve a crash where the system loses state and does not perform any of its intended functions. Instead, it focuses on vulnerabilities found in school software that could allow a hacker to gain deep access to student data [88022]. (b) omission: The incident does not involve a failure due to the system omitting to perform its intended functions at an instance(s). It primarily revolves around the discovery of serious bugs in software used by schools that could potentially compromise student data [88022]. (c) timing: The incident is not related to a failure due to the system performing its intended functions correctly but too late or too early. It is centered around security vulnerabilities found in the school software that could lead to unauthorized access to sensitive information [88022]. (d) value: The software failure incident does not involve a failure due to the system performing its intended functions incorrectly. Instead, it highlights the discovery of bugs in the software that could allow unauthorized access to student data [88022]. (e) byzantine: The incident does not exhibit a byzantine behavior where the system behaves erroneously with inconsistent responses and interactions. It primarily focuses on the security vulnerabilities found in the school software, highlighting the potential risks associated with unauthorized access to student information [88022]. (f) other: The behavior of the software failure incident can be categorized as a security vulnerability exploit. The incident involves a high school student discovering serious bugs in software used by schools, which could potentially lead to unauthorized access to sensitive student data. The student's findings shed light on the inadequate cybersecurity measures in education software and the potential risks associated with such vulnerabilities [88022].

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence property, theoretical_consequence (d) property: People's material goods, money, or data was impacted due to the software failure In the software failure incident reported in Article 88022, the consequence of the vulnerability found in the school software by the teenage hacker Bill Demirkapi was related to the potential compromise of sensitive data. Demirkapi discovered serious bugs in software used by schools, including Blackboard and Follett, which could allow a hacker to gain deep access to student data. In Blackboard's case, the vulnerabilities exposed 5 million vulnerable records for students and teachers, including student grades, immunization records, cafeteria balance, schedules, cryptographically hashed passwords, and photos. Similarly, in Follett's software, bugs were found that could have given a hacker access to student data like grade point average, special education status, number of suspensions, and passwords, which were stored unencrypted [88022]. This indicates that people's data and privacy were impacted by the software failure incident.
Domain knowledge The software failure incident reported in the articles is related to the education industry. The incident involved vulnerabilities in school software systems used by students, teachers, and staff, allowing unauthorized access to sensitive student data such as grades, immunization records, cafeteria balances, schedules, and passwords [Article 88022]. The specific software systems affected were Blackboard's Community Engagement software and Follett's Student Information System. The incident highlighted the poor state of cybersecurity in education software and the lack of attention to protecting student data.

Sources

Back to List