Hackers leak information of 30,000 Israeli students and teachers

Hackers on Monday leaked the private information of 30,000 Israeli teachers and students and are selling the records of another three million.

The group, which goes by the moniker The Generous Thief, posted files on its Telegram channel containing first and last names, ID numbers, birth dates, home addresses, phone numbers, e-mails. emails, etc.

The data was most likely stolen from the Center for Educational Technology (CET), a non-profit organization dedicated to integrating educational innovation and advanced technologies into the Israeli education system. Its online learning platform serves tens of thousands of Israeli students every year.

On Monday, the CET said it had found “signs of a cyber incident” during its preparations for the start of the school year and was working with the National Directorate of Cyber ​​Security to change the situation.

The CET noted, however, that its e-learning systems were operating as usual.

“We are investing the necessary resources and performing all tests and actions in coordination with relevant parties. The web is rich in misinformation and fake news,” company officials said.

The students whose information was compromised are no longer part of the education system as they were all born in the 1990s or early 2000s, raising questions about the timeliness of the leaked data.

Posting in broken Hebrew, the hacker group presented themselves as a collective seeking revenge against the government for what it sees as the mistreatment of teachers.

“Enough! Finally, during this time, you have truly harmed teachers,” the band wrote. “What do they think if now we disturb them? To begin to reclaim our rights, we broke into Israel’s largest educational technology center (TEC). And it continues.

Cybersecurity firm Check Point told Ynet that it has recently seen a sharp increase in malicious attacks against Israeli targets by pro-Iranian or pro-Palestinian hackers using Telegram.

“The fact that these attacks are being reported at a high rate, at close intervals to other security events, shows that the attackers’ central goal is to create resonance around these attacks,” the company said.

“Although the information exists there, it does not necessarily match their claims, there is no doubt that there are things here that should not happen. From embarrassing information to long registrations of names, dates of birth , passwords and phone numbers – these are tools that, in the digital age, are worth a lot to hackers.”