DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Number of tax refund fraud victims at Ball State U. climbs; source of breach unknown

Posted on March 10, 2015 by Dissent

Eighty employees of Ball State University have become victims of tax refund fraud, and the numbers seem to be growing each week, while both the university and Anthem say that they are not responsible for the problem.

In response to its employees’ problems, however, BSU has created an identity theft information line.

Seth Sablaugh reports on the known victims of tax refund fraud:

Reports filed with city and county police show the victims include an associate vice president, a dean, assistant deans, assistant department chairs, directors and other senior officials in information technology, human resources, the controller’s office, the student center, the health center, the athletics department, the career center, the university foundation, the library, the human performance lab and counseling.

Numerous faculty also have filed police reports, but so far no clerical/maintenance/union/non-professional staff have done so other than a couple of office coordinators.

As we have seen in other cases, the fraudulent tax refunds are loaded on prepaid cards which the criminals then drain. Sablaugh reports:

One BSU economics faculty member told police he received a tax refund in the mail of $8,395.10 on a pre-paid T-Mobile Visa card. When the professor and his wife called T-Mobile, they learned $8.10 remained on the card. The card was cashed in at Walmarts in several California cities.

When an associate dean received a refund in the mail of about $8,400 on a pre-paid Green Dot card, he found out only $3 was left on the card.

Ball State University officials have asserted that investigations of their systems reveal no breach. And Anthem has said that there is no evidence that the Anthem security breach is related to fraud schemes at Ball State or anywhere else.

Anthem has not made clear what it would consider evidence of a causal relationship between their breach and tax refund fraud.

Read more on The Star Press.


Related:

  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
  • NY: Gloversville hit by ransomware attack, paid ransom
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • TX: Kaufman County Faces Cybersecurity Attack: Courthouse Computer Operations Disrupted
  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
Category: ID TheftU.S.

Post navigation

← Is Anthem screwing dependents of former members on breach notification? (update 2: No)
Government to drop charges against National Weather Service employee accused of hacking →

2 thoughts on “Number of tax refund fraud victims at Ball State U. climbs; source of breach unknown”

  1. kellyjo says:
    March 11, 2015 at 9:41 pm

    I work for a company with over 8000 employees with this same thing happening to 60 so far. I was a victim and first to report. Fraudulent check mailed to me. Seems pretty similar…

    1. Dissent says:
      March 12, 2015 at 8:27 am

      Can you tell me the name of your company? Feel free to email me at [email protected].

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • OpenAI fights order to turn over millions of ChatGPT conversations
  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.