The College of Pennsylvania has confirmed {that a} hacker breached quite a few inside programs associated to the college’s growth and alumni actions and stole information in a cyberattack.
In a brand new assertion, Penn confirmed BleepingComputer’s reporting that the hackers breached its programs utilizing compromised credentials, stating they have been stolen in a social engineering assault.
“On October 31, Penn found {that a} choose group of data programs associated to Penn’s growth and alumni actions had been compromised,” reads a brand new Penn assertion.
“Penn employs a strong data security program; nonetheless, entry to those programs occurred as a result of a complicated id impersonation generally often called social engineering.”
“Penn’s workers quickly locked down the programs and prevented additional unauthorized entry; nonetheless, not earlier than an offensive and fraudulent e mail was despatched to our neighborhood and knowledge was taken by the attacker. Penn remains to be investigating the character of the knowledge that was obtained throughout this time.”
The College of Pennsylvania says it has notified the FBI of the breach and is working with CrowdStrike to research the security incident.
As first reported by BleepingComputer, the menace actor breached Penn’s programs on October 30 utilizing an worker’s PennKey SSO account that offered entry to the college’s Salesforce occasion, Qlik analytics platform, SAP enterprise intelligence system, and SharePoint recordsdata.
Utilizing this entry, the menace actors stole 1.71 GB of inside paperwork from the college’s SharePoint and Field storage platforms, together with spreadsheets, paperwork, monetary data, and alumni advertising and marketing supplies.
The hackers additionally informed BleepingComputer that they stole Penn’s Salesforce donor advertising and marketing database, containing 1.2 million information with all kinds of donor data.
A pattern of this information contains 158 distinct fields, which include the next delicate data:
- Personally Identifiable Info (PII): full identify, birthdate, gender, residence and mailing addresses, cellphone numbers, and e mail addresses.
- Monetary and donor information: present histories, wealth scores, and lifelong dedication quantities.
- Employment and affiliation particulars: employer, job title, and educational affiliations.
After discovering their entry had been revoked, the hacker mentioned they nonetheless had entry to Penn’s Salesforce Advertising Cloud account and used it to ship an offensive mass e mail to 700,000 recipients.
In a put up on a hacking discussion board, the attackers say they don’t seem to be at the moment leaking the information information however might achieve this in a month or two.
Whereas the hackers claimed the assault wasn’t politically motivated and mentioned their purpose was Penn’s “huge, splendidly rich donor database,” each their emails and a put up on a hacking discussion board have been laced with sharp criticism of the college’s alleged DEI practices, admissions insurance policies, and “love of nepobabies.”
The College of Pennsylvania says it’s taking steps to extend security on its programs, together with worker coaching on social engineering assaults and enhanced monitoring and security measures.
After the investigation is full, Penn says it’ll notify these affected by the data breach.
The college can be warning Penn college students and alumni to be cautious of suspicious calls or emails that might be phishing makes an attempt or social engineering assaults.

As MCP (Mannequin Context Protocol) turns into the usual for connecting LLMs to instruments and information, security groups are transferring quick to maintain these new providers protected.
This free cheat sheet outlines 7 finest practices you can begin utilizing as we speak.



