DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Another North Carolina community college hit with ransomware — Piedmont Community College

Posted on October 28, 2020 by Dissent

It seems I missed an announcement that another North Carolina community college  got hit with ransomware (or is this the mysterious listing I saw briefly on a dedicated leak site but it was gone before I could note the name and details?). In any event, on August 24, Piedmont Community College (PCC) in North Carolina reported that they had discovered what they described as a “cyber-incident.”  The college took critical systems  such as VPN access and other services offline by the end of that day.

On October 1, the college issued an update stating that they were continuing to work on repairing systems impacted by what they now labeled a ransomware attack. They make no mention, however, of any ransom demand, the type of ransomware, and whether they have a usable backup to restore from.  Their update notes some help they were receiving:

We are grateful to legislative allocation of funds for Rural Broadband Access Funds that will enable us to purchase additional hardware and services as part of our overall restoration.

It is now two months since the attack.  What do they know? Was any student or employee data accessed? Was any exfiltrated? What are they doing about protecting students and employees if there is a chance they are at risk? Are systems fully restored?

DataBreaches.net has reached out to PCC to ask for more information and will update this post if a response is received.

Update of October 29:  Dr. Pamela Senegal, the President of PCC, responded to this site’s inquiries:  “We are not interested in sharing the requested information with this site.”

Oh. Well who is PCC sharing it with? So far, it seems like they are not sharing it with stakeholders, as there is nothing on their site to inform current and former students and employees whether their personal information has been accessed or exfiltrated.

Dr. Senegal doesn’t want to share information with this site, but someone who describes themself as having knowledge of  PCC claims that PCC had been warned that it wasn’t a matter of if [they would be hacked] but when:

“The PCC IT dept was ill prepared,”  the individual, who asked to remain anonymous, wrote. “Backups and patching not kept up with. Backups on windows and Solaris based systems were compromised. Phone system was rolled back to an early August restore point. End users couldn’t access their voice mails or use phone features afterwards. Systems were down 4 weeks while everything was being rebuilt. Next 2 weeks saw incremental improvements.

PCC IT is understaffed and inexperienced. All experienced staff have left the school over the past 2 years…. They rely on one contractor to keep critical infrastructure running. 36-49 users have local admin rights to their computers.

The state has not commented what the malware was by name. Or its intrusion vector.

PCC has not been forthcoming to current or former students if their personal information was downloaded. Same for faculty and staff.

That PCC does not want to share information with the media or this site in particular is unfortunate. That they are allegedly not sharing vital information with those who may be directly impacted is troubling.

If anyone — including the threat actors — has further details on this incident that they are willing to share, please contact this site via e-mail to breaches[at]protonmail.ch or via Signal +1-516-776-7756. 
 

Category: Education SectorMalwareU.S.

Post navigation

← Sodinokibi ransomware group hits the Hanover Chamber of Crafts
Federal agencies issue alert: credible information of increased and imminent threat of ransomware attacks on healthcare and public health sector →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Twilio denies breach following leak of alleged Steam 2FA codes
  • Personal information exposed by Australian Human Rights Commission data breach
  • International cybercrime tackled: Amsterdam police and FBI dismantle proxy service Anyproxy
  • Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency
  • N.W.T.’s medical record system under the microscope after 2 reported cases of snooping
  • Department of Justice says Berkeley Research Group data breach may have exposed information on diocesan sex abuse survivors
  • Masimo Manufacturing Facilities Hit by Cyberattack
  • Education giant Pearson hit by cyberattack exposing customer data
  • Star Health hacker claims sending bullets, threats to top executives: Reports
  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • FTC dismisses privacy concerns in Google breakup
  • ARC sells airline ticket records to ICE and others
  • Clothing Retailer, Todd Snyder, Inc., Settles CPPA Allegations Regarding California Consumer Privacy Act Violations
  • US Customs and Border Protection Plans to Photograph Everyone Exiting the US by Car
  • Google agrees to pay Texas $1.4 billion data privacy settlement
  • The App Store Freedom Act Compromises User Privacy To Punish Big Tech
  • Florida bill requiring encryption backdoors for social media accounts has failed

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.