DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Guilford Technical Community College notifies 65,646 affected by ransomware incident in 2020

Posted on January 14, 2022 by Dissent

On September 19, 2020, DataBreaches.net reported that Guilford Technical Community College (GTCC) in North Carolina had reportedly become a ransomware victim of DoppelPaymer on September 13.

The following month, this site followed up by asking whether GTCC had notified the more than 43,000 students whose data had appeared on the dark web. A spokesperson for the college responded:

Guilford Technical Community College has notified faculty, staff and students of a recent ransomware cyberattack. This communication was in response to an unauthorized access to the college’s network, which was discovered on Sept. 13, 2020.

Upon discovery of the event, the College immediately launched an investigation, with the assistance of leading cybersecurity experts, the Federal Bureau of Investigation, and other state agencies to determine what happened and to remediate impacted systems.

Additionally out of an abundance of caution, the college is proactively taking the necessary steps to assist those individuals who have been potentially impacted by the attack. The college’s faculty, staff and students will be offered free credit monitoring and identity restoration services.

So in October, 2020, the college said those potentially impacted would be offered credit monitoring and identity restoration services. But it seems that those offers may not have been made until this week.

Yesterday, external counsel for GTCC notified the Maine Attorney General’s Office about the breach. Their notification indicated that a total of 65,646 current or former students, faculty members, or staff members were being notified of the incident and that written notification would go out on January 13, 2022. A sample notification letter for adults was attached to the submission.

One of the most shocking aspects of the notification (apart from its delay) is that it does not mention that data was leaked on the dark web back in October 2020.

From part of the sample notification letter (emphasis added by this site):

You are receiving this letter as the data mining determined that your personal information was present on GTCC’s network at the time of the attack and may have been accessible to the cybercriminal as a result. This personal information includes your: name, <>. There is no confirmation that this personal information was accessed or acquired by the cybercriminal(s).

“May have been accessible?” “No confirmation that this personal information was accessed or acquired?” Seriously?  Is that what they wrote to all the people whose personal information was actually leaked on the dark web?

Perhaps there is another letter that went to people who had their personal information leaked on the dark web?

DataBreaches.net sent an email inquiry to GTCC to ask whether there was an alternative notification for those who had their data leaked in October 2020. No reply has been received.

So almost 1.5 years after a ransomware incident, those impacted are sent a letter that may be misleading at best, with an offer for help that they should have been made back in October, 2020.

Does the government thinks that is just fine? As this site pointed out in 2020, the Federal Trade Commission can enforce data security for financial aid data under the GLBA. Why don’t they? And what is the U.S. Education Department doing?

 

 

Related posts:

  • Kept in the Dark — Meet the Hired Guns Who Make Sure School Cyberattacks Stay Hidden
Category: Breach IncidentsCommentaries and AnalysesEducation SectorMalwareU.S.

Post navigation

← Former Acting Inspector General for the U.S. Department of Homeland Security Pleads Guilty to Scheme to Defraud the U.S. Government
The definitions of “recently” and “discovered” leave a lot to be desired →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Stormous claims to have protected health info on 600,000 patients of North Country Healthcare. The data appear fake.
  • Back from the Brink: District Court Clears Air Regarding Individualized Damages Assessment in Data Breach Cases
  • Multiple lawsuits filed against Doyon Ltd over April 2024 data breach and late notification
  • Chinese hackers suspected in breach of powerful DC law firm
  • Qilin Emerged as The Most Active Group, Exploiting Unpatched Fortinet Vulnerabilities
  • CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch
  • McDonald’s McHire leak involving ‘123456’ admin password exposes 64 million applicant chat records
  • Qilin claims attack on Accu Reference Medical Laboratory. It wasn’t the lab’s first data breach.
  • Louis Vuitton hit by data breach in Türkiye, over 140,000 users exposed; UK customers also affected (1)
  • Infosys McCamish Systems Enters Consent Order with Vermont DFR Over Cyber Incident

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Australian law is now clearer about clinicians’ discretion to tell our patients’ relatives about their genetic risk
  • The ICO’s AI and biometrics strategy
  • Trump Border Czar Boasts ICE Can ‘Briefly Detain’ People Based On ‘Physical Appearance’
  • DeleteMyInfo Wins 2025 Digital Privacy Excellence Award from Internet Safety Council
  • TikTok Loses First Appeal Against £12.7M ICO Fine, Faces Second Investigation by DPC
  • German court offers EUR 5000 compensation for data breaches caused by Meta
  • How to Build on Washington’s “My Health, My Data” Act

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.