The listings featured on this site are from companies from which this site receives compensation. This influences: Appearance, order, and manner in which these listings are presented.
Our videos have over 5 million views on Youtube! Visit our channel now »
Disclosure:
Professional Reviews

vpnMentor contains reviews that are written by our community reviewers. These take into consideration the reviewers’ independent and professional examination of the products/services.

Ownership

vpnMentor was established in 2014 as an independent site reviewing VPN services and covering privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, ZenMate, Private Internet Access, and Intego, which may be reviewed on this website.

Affiliate Commissions Advertising

vpnMentor contains reviews that follow the strict reviewing standards, including ethical standards, that we have adopted. Such standards require that each review will take into consideration the independent, honest and professional examination of the reviewer. That being said, we may earn a commission when a user completes an action using our links, at no additional cost to them. On listicle pages, we rank vendors based on a system that prioritizes the reviewer’s examination of each service, but also considers feedback received from our readers and our commercial agreements with providers.

Reviews Guidelines

The reviews published on vpnMentor are written by community reviewers that examine the products according to our strict reviewing standards. Such standards ensure that each review prioritizes the independent, professional and honest examination of the reviewer, and takes into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings we publish may also take into consideration the affiliate commissions we earn for purchases through links on our website.

Report: Educational Platform Exposes Private Data of Over 1 Million Students across North America

vpnMentor Research Team Updated on 18th July 2023 Cybersecurity and Research Lab

Led by Noam Rotem and Ran Locar, vpnMentor's research team discovered a data breach belonging to the e-Learning platform OneClass.

OneClass is a remote learning platform that provides study guides and educational assistance materials to millions of students across North America. At a time when students are forced to study from home, feeling isolated and stressed, such resources are more valuable and popular than ever.

By not securing its users' data, OneClass created a goldmine for criminal hackers, jeopardizing the privacy and security of over a million young people and their families.

Data Breach Summary

Company OneClass
Headquarters Toronto, Canada
Industry e-Learning
Size of data in gigabytes 27 GB
Suspected no. of records 8,972,251
No. of people exposed 1,000,000+
Date range/timeline Prior to 2019
Geographical scope North America
Types of data exposed PII data; educational data
Potential impact Phishing, fraud
Data storage format Elasticsearch, hosted on AWS

Company Profile

OneClass was founded in 2010 and is currently based in Toronto, Canada.

The company has built an educational platform that "allows university students to collaborate and share study resources from self-created lecture notes to study guides."

OneClass claims to have helped over 600,000 students with their academic studies, although the real number is probably much higher. We estimate it had incorrectly stored the data of over one million people, including people whose membership had been 'rejected' from the platform.

While some of the study material on OneClass is free, students' most valuable resources are only available through a paid membership.

Timeline of Discovery and Owner Reaction

Sometimes, the extent of a data breach and the owner of the data is obvious, and the issue quickly resolved. But rare are these times. Most often, we need days of investigation before understanding what's at stake or who's leaking the data.

Understanding a breach and its potential impact takes careful attention and time. We work hard to publish accurate and trustworthy reports, ensuring everybody who reads them understands their seriousness.

Some affected parties deny the facts, disregarding our research, or playing down its impact. So, we need to be thorough and make sure everything we find is correct and accurate.

In this case, once we confirmed OneClass as the owner of the database, we disclosed our findings to the company and outlined the nature of the breach.

In response, OneClass immediately secured the database but claimed that it was a test server, and any data stored within had no relation to real individuals.

However, during our investigation, we had used publicly available information to verify a small sample of records in the database. Taking the PII data from numerous records, we found the social profiles of lecturers and other users on various platforms that matched the records in OneClass's database.

Based on this, we doubt the veracity of OneClass's claim and stand by our assessment.

We once again reached out to OneClass to show further proof of our findings. However, we received no further replies from the company.

  • Date discovered: 20th May 2020
  • Date vendors contacted: 25th May 2020
  • Date of Response: 26th May 2020
  • Date of Action: 26th May 2020

Example of Entries in the Database

On its website, OneClass states that it "applies necessary physical, technological, and administrative measures to protect Personal Data at the level appropriate to its sensitivity… under the highest data security standards."

Based on our team's discovery, however, this was not the case.

The exposed database was built on an Elasticsearch framework and hosted on Amazon Web Services (AWS), but left completely unsecured.

It contained over 27 GB of data, totaling 8.9 million records, and exposed over 1 million individual OneClass users. The database contained different indices, each with different types of records related to students using the platform, those who had been rejected from joining, many university professors, and more.

These records contained different forms of Personally Identifiable Information (PII) data for every user exposed, including:

  • Full names
  • Email addresses (some masked, many viewable)
  • Schools and universities attended
  • Phone numbers
  • School/University course enrollment details
  • OneClass account details

It's also possible that some of the data belongs to minors, as OneClass includes resources for high school students and accepts users from 13 years old and above.

In the following screenshots, entries from two students provide a sample of the PII exposed in OneClass's records:

OneClass Data Leak

OneClass Data Leak Snippet

Many records also included additional information on individual students and their courses, including faculty details and access to otherwise protected textbooks and "Question and Answer" exercises.

An example can be seen below:

OneClass Data Leak Example

Data Breach Impact

Had criminal hackers gained access to this database, it would have allowed them to pursue a wide range of illegal activities.

With the PII data stored in these records, they could create effective phishing emails, tricking victims into any of the following actions:

  • Providing credit card details
  • Providing access credentials for private accounts elsewhere online
  • Clicking a link that will embed malicious software on their devices, such as ransomware, malware, and spyware.

As OneClass has a paid subscription plan for premium content and resources, hackers could use this to their advantage when coercing someone into providing any financial information.

Furthermore, OneClass users are very young - including minors - and will generally be unaware of most criminal schemes and frauds online. This makes them particularly vulnerable targets. It's also likely many of them use their parent's credit cards to sign up, exposing their whole family to risk.

With so many students relying on remote learning due to Coronavirus, OneClass could be experiencing a surge in new users. Hackers could quickly create fraudulent emails using the pandemic and related uncertainty as a pretext to contact potential victims, posing as OneClass and asking them to divulge sensitive information.

Given the size of OneClass's user base and the number of people exposed in this leak, hackers would only need to successfully defraud a tiny proportion for a criminal scheme to be financially rewarding.

The impact on their victims could be devastating.

For OneClass

The most immediate impact on OneClass from this breach is the potential loss of users. If people feel the company has endangered them by not protecting their data, they may cancel memberships and leave the platform altogether.

As OneClass depends on partnership with educational institutes and lecturers, they may also experience backlash from both, for the same reasons. If partners were to sever a relationship or restrict interactions with OneClass, the company's value proposition would drop significantly.

As stated on its website, OneClass user data is subject to the United States' privacy laws. Furthermore, the company's servers are located in the US, along with most of its users. As a result, it falls within the jurisdiction of California's CCPA data privacy law and broader regulations across North America.

The company is thus required to take specific steps in response to this data breach and may face auditing or investigations from regulatory agencies. Such outcomes could take considerable time and even result in fines.

Finally, if OneClass's competitors had gotten access to this data, it would have allowed them to copy, or improve upon, the business model that has brought OneClass's success. And now that OneClass failed at keeping its customer data safe, its competitors can also take advantage of the bad publicity the brand is going to receive, and even take over their customers.

All these potential outcomes could have a severe impact on OneClass's revenue, reputation, and ability to sustain the business through significant uncertainty.

Advice from the Experts

OneClass could have easily avoided this leak if it had taken some basic security measures to protect the database. These include, but are not limited to:

  1. Securing its servers.
  2. Implementing proper access rules.
  3. Never leaving a system that doesn't require authentication open to the internet.

Any company can replicate the same steps, no matter its size.

For a more in-depth guide on how to protect your business, check out our guide to securing your website and online database from hackers.

For OneClass Users

If you're a customer of OneClass and are concerned about how this breach might impact you, contact the company directly to determine what steps it's taking to protect your data.

To learn about data vulnerabilities in general, read our complete guide to online privacy.

It shows you the many ways cybercriminals target internet users, and the steps you can take to stay safe.

How and Why We Discovered the Breach

During a substantial web mapping operation, the vpnMentor research team identified a breach within OneClass's database. Our team of investigators applies port scanning to scrutinize specific IP blocks, testing various systems for possible vulnerabilities or weak spots. Each detected weakness is subsequently analyzed for any potential data leakage.

Our team was able to access this database because it was completely unsecured and unencrypted.

OneClass was using an Elasticsearch database hosted on AWS, which is ordinarily not designed for URL use. However, we were able to access it via browser and manipulate the URL search criteria into exposing schemata from a single index at any time.

Whenever we find a data breach, we use expert techniques to verify the database owner, usually a commercial company.

As ethical hackers, we're obliged to inform a company when we discover flaws in their online security. We reached out to OneClass, not only to let them know about the vulnerability but also to suggest ways they can make their system secure.

These ethics also mean we carry a responsibility to the public. OneClass users must be aware of a data breach that exposes so much of their sensitive data.

The purpose of this web mapping project is to help make the internet safer for all users.

Introducing The Leak Box

To ensure our mission has the most significant impact possible, we’ve also built The Leak Box.

Hosted on the dark web, the Leak Box allows ethical hackers to anonymously report any data breach they find online. We then verify and report any submission deemed a legitimate threat to the public’s safety.

We never sell, store, or expose any information we encounter during our security research. This includes any information reported to us via The Leak Box.

About Us and Previous Reports

vpnMentor is the world's largest VPN review website. Our research lab is a pro bono service that strives to help the online community defend itself against cyber threats while educating organizations on protecting their users' data.

Our ethical security research team has discovered and disclosed some of the most impactful data leaks in recent years.

This has included an enormous data leak from a European e-learning platform in almost every country on the planet. We also revealed that a popular digital wallet app had exposed millions of Americans to fraud. You may also want to read our VPN Leak Report and Data Privacy Stats.

[Publication date: 17.06.2020]

About the Author

vpnMentor Research Lab is a pro bono service that strives to help the online community defend itself against cyber threats while educating organizations on protecting their users’ data.
Our ethical security research team has discovered and disclosed some of the most impactful data breaches in recent years.

Did you like this article? Rate it!
I hated it! I don't really like it It was ok Pretty good! Loved it!
out of 10 - Voted by users
Thank you for your feedback