Brightly warns of SchoolDude data breach exposing credentials


U.S. tech company and Siemens subsidiary Brightly Software is notifying customers that their personal information and credentials were stolen by attackers who gained access to the database of its SchoolDude online platform.

SchoolDude is a cloud-based platform for managing work orders used by over 7,000 colleges, universities, and K-12 schools from school districts of up to 600,000 students.

The companies’ other SaaS solutions are being used by more than 12,000 organizations worldwide, most from the United States, Canada, the United Kingdom, and Australia.

“We at Brightly Software are writing to let you know about a recent security incident affecting an account you have on our SchoolDude application (, an online platform used by educational institutions for placing and tracking maintenance work orders,” Brightly told affected SchoolDude users.

“The incident involved an unauthorized actor obtaining certain account information from the SchoolDude user database.”

The company believes the threat actors have stolen customer account information, including names, email addresses, account passwords, phone numbers (where available), and school district names.

Brightly data breach letterBrightly data breach letter (BleepingComputer)

​Brightly also reset the passwords of all SchoolDude users, who will now have to choose a new password after clicking “Forgot Login Name or Password?” on

“Because passwords were affected in this incident, we are writing to remind you of the importance of using a strong and unique password for each online account you maintain,” the SaaS provider added.

“If you are currently using your SchoolDude password for any other online account, we recommend that you promptly change your passwords on those other accounts.”

After detecting the incident, Brightly reported the breach to the relevant law enforcement authorities and hired third-party security experts to investigate the attack.

According to a notification filed with the Office of Maine’s Attorney General, the attackers infiltrated Brightly’s systems on April 20 and were discovered on April 28.

 The same notification reveals that the data breach affected 2,964,292 SchoolDude customers and users.

In a statement shared with BleepingComputer via email, a Brightly spokesperson didn’t provide any additional details besides those provided in the letters sent to customers.

Update: Added breach date and the number of affected individuals.


  • johnlsenchak Photo johnlsenchak – 3 days ago

    Telling users to do a password reset without any type of two factor authentication NICE!

  • neumarke Photo neumarke – 3 days ago

    Does anyone know the email address from which the notifications are coming?

  • McAfee Consumer Products Removal tool Logo

    McAfee Consumer Products Removal tool

    Version: NA 431,416 Downloads

  • Malwarebytes Anti-Malware Logo

    Malwarebytes Anti-Malware

    Version: 4.5.28 4M+ Downloads

  • AdwCleaner Logo


    Version: 56M+ Downloads

  • Windows Repair (All In One) Logo

    Windows Repair (All In One)

    Version: 4.13.1 2M+ Downloads

  • Everything Desktop Search Logo

    Everything Desktop Search

    Version: 22,896 Downloads


Related posts

Chinese hackers use new custom backdoor to evade detection

Sarah Henriquez

Iranian hackers use new Moneybird ransomware to attack Israeli orgs

Sarah Henriquez

LastPass says hackers had internal access for four days

Sarah Henriquez

Leave a Comment