A hacker has taken duty for final week’s College of Pennsylvania “We bought hacked” electronic mail incident, saying it was a much more in depth breach that uncovered information on 1.2 million donors and inside paperwork.
On Friday, College of Pennsylvania alumni and college students started receiving a number of offensive emails from Penn.edu addresses claiming the college had been hacked and information stolen.
“The College of Pennsylvania is a canine**** elitist establishment filled with woke retards. We’ve got horrible security practices and are fully unmeritocratic,” reads the e-mail despatched to Penn alumni and college students.
“We rent and admit morons as a result of we love legacies, donors, and unqualified affirmative motion admits. We love breaking federal legal guidelines like FERPA (all of your information will probably be leaked) and Supreme Courtroom rulings like SFFA.”
BleepingComputer confirmed the emails originated from join.upenn.edu, a Penn mailing checklist platform hosted on Salesforce Advertising and marketing Cloud. The college downplayed the incident, describing the messages as “fraudulent emails” that have been “clearly faux.”
Nonetheless, the menace actor behind the assault contacted BleepingComputer, claiming the intrusion was far broader and that they’d gained entry to a number of college methods.
The hacker mentioned their group “gained full entry” to an worker’s PennKey SSO account, permitting entry to Penn’s VPN, Salesforce information, Qlik analytics platform, SAP enterprise intelligence system, and SharePoint information.
They mentioned they exfiltrated information for roughly 1.2 million college students, alumni, and donors, together with names, dates of beginning, addresses, cellphone numbers, estimated web value, donation historical past, and demographic particulars similar to faith, race, and sexual orientation.
The menace actors shared screenshots and information samples with BleepingComputer and posted them on-line to show that they’d certainly accessed these methods and stolen information from Penn.
The attackers instructed BleepingComputer they breached Penn’s methods on October thirtieth and accomplished information downloads by October thirty first, when the compromised worker account was locked and entry misplaced.
After discovering their entry had been revoked, the hacker mentioned they nonetheless had entry to Salesforce Advertising and marketing Cloud and used it to ship the offensive mass electronic mail to roughly 700,000 recipients.
When requested whether or not the credentials have been stolen by way of an infostealer or phishing, the hacker declined to elaborate, saying the intrusion was easy and attributable to Penn’s security lapses.
The hacker has since printed a 1.7-GB archive containing spreadsheets, donation supplies, and different information allegedly taken from Penn’s SharePoint and Field methods.
The attacker instructed BleepingComputer they weren’t extorting the college, saying, “We do not suppose they’d pay, and we are able to extract loads of worth out of the info ourselves.”
When requested about their motivation, the hackers mentioned the assault was not political however geared toward acquiring Penn’s donor database.
“Whereas we’re not likely politically motivated, now we have no love for these nepobaby-serving establishments,” the hackers instructed BleepingComputer.
“The primary purpose was their huge, splendidly rich donor database.”
The donor database has not but been leaked, although the menace actors declare they could launch it in a month or two.
When contacted with these claims, the College of Pennsylvania instructed BleepingComputer, “We’re persevering with to research.”
What Penn donors ought to do
With a considerable amount of donor information now uncovered, Penn donors ought to keep vigilant in opposition to focused phishing or social engineering makes an attempt.
Attackers may use the stolen data to impersonate the college, solicit fraudulent donations, or acquire entry to donor credentials to breach their on-line accounts.
Recipients ought to deal with surprising messages about donations with suspicion and confirm their legitimacy instantly with Penn earlier than responding.

Whether or not you are cleansing up previous keys or setting guardrails for AI-generated code, this information helps your staff construct securely from the beginning.
Get the cheat sheet and take the guesswork out of secrets and techniques administration.



