Skip links
Facebook
Twitter
LinkedIn

MNPS HackedMNPS Scammed: How a Hacker Duped Nashville Public Schools Out of $479,000

In a costly cybersecurity failure, Metro Nashville Public Schools (MNPS) unknowingly wired nearly half a million dollars to a cybercriminal posing as one of their contractors. The fallout? A lawsuit, finger-pointing, and a lot of expensive lessons. This is the story of how MNPS was duped and scammed—and what GeckoTech Solutions would have done to stop it.

Quick Recap: What Happened

  • MNPS had a standing contract with WEBCON, a Brentwood-based construction firm.
  • WEBCON’s Oracle iSupplier Portal account was compromised.
  • A hacker impersonated WEBCON, submitted fake invoices, and changed payment info multiple times.
  • MNPS wired $479,509 to fraudulent accounts.
  • WEBCON claims they’re still owed the money and has filed a WEBCON MNPS lawsuit.
  • MNPS denies fault, asserting WEBCON failed to secure their portal access.

MNPS Hacked: The Detailed Timeline

  • February 2021: MNPS signs a $5 million contract with WEBCON.
  • July 2024: Hacker accesses WEBCON’s account in the MNPS-mandated Oracle portal.
  • September 2024: Hacker, posing as WEBCON’s president, submits payment changes via email.
  • Wire Transfers Issued: MNPS sends $479,509 to unauthorized accounts.
  • October 2024: WEBCON realizes it hasn’t been paid. MNPS reveals documents confirming wire transfers.
  • Post-October: WEBCON vs MNPS legal dispute begins in Davidson County Circuit Court.

WEBCON vs MNPS: Who’s at Fault?

Here’s where it gets messy—and why this ended up in court.

WEBCON’s Mistakes

  • Didn’t enable Multi-Factor Authentication (MFA) for their portal.
  • Missed red flags when their invoices weren’t being paid.
  • Didn’t catch account compromise for months.

MNPS’s Mistakes

  • Changed payment info multiple times without verbal confirmation.
  • Ignored industry-standard vendor verification protocols.
  • Relied solely on email for financial operations.

This wasn’t one side’s blunder. Both dropped the ball.

WEBCON MNPS Lawsuit: What’s at Stake?

Party

Potential Financial Loss

Description

MNPS

$479,509 (already wired) + another $479,509 (if court orders repayment)

Double loss potential

WEBCON

$479,509 (unpaid) + potential contract termination

Immediate cashflow hit and long-term damage

The Hacker

~$479,509 (unrecovered)

The only party who truly “won”

Bottom line: No one really wins—except the cybercriminal.

How This Should Have Been Prevented

This wasn’t some sophisticated zero-day exploit. This was an old-school con, enabled by bad processes and poor communication.

WEBCON’s Checklist:

  • Secure portal access with MFA
  • Monitor login activity and receive alerts
  • Set up payment reconciliation alerts
  • Immediately investigate missed payments

MNPS’s Checklist:

  • Never accept banking changes via email without voice/video verification
  • Use vendor validation workflows with documented approvals
  • Limit the number of account changes per vendor per quarter
  • Train all finance personnel on red flag detection

One lunch meeting. One phone call. One fraud policy. That’s all it would’ve taken.

How GeckoTech Solutions Prevents These Attacks

At GeckoTech Solutions, we specialize in protecting businesses just like yours from these preventable, high-cost breaches.

What We Offer:

  • MFA and Portal Security Audits: We’ll lock down every login.
  • Payment Process Security Protocols: No payment method changes without verification.
  • Audit Trail Monitoring: Real-time alerts for any unusual account activity.
  • Vendor Fraud Prevention Policies: We’ll help you create a rock-solid internal approval process.
  • Cybersecurity Training: Train your team to spot and stop fraud before it happens.

Final Word: Don’t Be the Next Headline

The MNPS hack is a $479,000 reminder that even large institutions can miss the basics. Whether you’re a school district, contractor, or SMB—you cannot afford to trust email alone.

Contact GeckoTech Solutions today and make sure your business doesn’t learn the hard way.  Schedule your FREE network security assessment now.

View the Tennessean Article here.

1. Was MNPS hacked directly?

No, the hacker accessed WEBCON’s account in MNPS's required vendor portal and used that access to trick MNPS into wiring payments to fraudulent accounts.

2. Is WEBCON to blame for the breach?

Partially. WEBCON failed to secure their portal account with basic tools like MFA and didn’t notice the compromise until months later.

3. What could MNPS have done differently?

MNPS should have verified any changes to payment methods with a phone or video call and not relied solely on email.

4. Who is likely to win the lawsuit?

That’s up to the court, but both parties share blame. The hacker may never be caught, meaning both companies could end up losing big.

5. How can GeckoTech Solutions help my business avoid this?

We implement secure payment protocols, portal access controls, and vendor communication policies to prevent fraud before it starts.

The Middle Tennessee Business Owner’s Guide To I.T. Support Services And Fees

What You Should Expect To Pay For I.T. Support For Your Business

(And How To Get Exactly What You Need Without Unnecessary Extras, Hidden Fees And Bloated Contracts)

Fill Out This Form To Receive Your FREE Report