DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

University of North Carolina servers hacked; 3,500 employees’ data accessed

Posted on January 7, 2013 by Dissent

It seems that the University of North Carolina has had yet another data breach. And although the breach was discovered in May, it took about 7 months for those affected to be notified. Jane Stancill reports:

Some 3,500 people had their personal information exposed when hackers hit two servers of the UNC Lineberger Comprehensive Cancer Center.

The attack was discovered by UNC-Chapel Hill’s information technology employees in May, yet potential victims were not informed until last week when they received letters from center director Dr. Shelley Earp.

Earp apologized for the breach, which compromised personal data, including Social Security numbers and passport numbers, for employees, contractors and visiting lecturers at the center.

Patient files were not stored on the two hacked servers, but there were “a small number of files that contained data from fewer than 15 people who were subjects in research studies.”

Read more on The Chapel Hill News.

UNC has had a number of breaches over the years:

  • In 2007, a UNC-Charlotte student employee was accused of stealing files containing the personal financial aid information of 148 students;
  • In 2008, UNC School of the Arts revealed that in 2006, a student e-mail server was compromised and a file with 2,700 students’ names and Social Security numbers wound up on a machine connected to a P2P network;
  • Also in 2008, UNC-Greensboro disclosed that a virus exposed 275 names, Social Security numbers, and bank account information;
  • In 2009, UNC-Chapel Hill disclosed that 180,000 research participants in a mammography study had their on a server accessed by a hacker. The university demoted the researcher, Bonnie Yankaskas, who successfully appealed the demotion;
  • In 2010, UNC-Greensboro disclosed that 240 records of clients at its Psychology Clinic were on a spreadsheet exposed via malware;
  • Also in 2010, UNC-Greensboro disclosed that 2,300 records of clients at its Speech and Hearing Clinic were exposed by malware;
  • In 2011, UNC-Chapell Hill disclosed that 31 confidential student records were stolen from the student judicial system office. This was the only reported breach involving paper records;
  • In 2012, UNC-Charlotte reported that a configuration error exposed 350,000 SSN and financial data on the Internet; and
  • In 2012, UNC-Charlotte reported that files containing PII had been stored in a manner that left them open to the Internet; unauthorized users could have accessed the files in question during the period of 1997 to February 2012.
Category: Breach IncidentsEducation Sector

Post navigation

← It's 10 pm. Do you know where your patients' data are?
Saint Raphael Healthcare System sued because employee took – and circulated – pictures of young gunshot victim's corpse →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Turkish Group Hacks Zero-Day Flaw to Spy on Kurdish Forces
  • Cyberattacks on Long Island Schools Highlight Growing Threat
  • Dior faces scrutiny, fine in Korea for insufficient data breach reporting; data of wealthy clients in China, South Korea stolen
  • Administrator Of Online Criminal Marketplace Extradited From Kosovo To The United States
  • Twilio denies breach following leak of alleged Steam 2FA codes
  • Personal information exposed by Australian Human Rights Commission data breach
  • International cybercrime tackled: Amsterdam police and FBI dismantle proxy service Anyproxy
  • Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency
  • N.W.T.’s medical record system under the microscope after 2 reported cases of snooping
  • Department of Justice says Berkeley Research Group data breach may have exposed information on diocesan sex abuse survivors

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • License Plate Reader Company Flock Is Building a Massive People Lookup Tool, Leak Shows
  • FTC dismisses privacy concerns in Google breakup
  • ARC sells airline ticket records to ICE and others
  • Clothing Retailer, Todd Snyder, Inc., Settles CPPA Allegations Regarding California Consumer Privacy Act Violations
  • US Customs and Border Protection Plans to Photograph Everyone Exiting the US by Car
  • Google agrees to pay Texas $1.4 billion data privacy settlement
  • The App Store Freedom Act Compromises User Privacy To Punish Big Tech

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.