DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

AlphaV claims attack on Florida International University (updated)

Posted on April 11, 2022 by Dissent

It’s been a while since DataBreaches.net reported on data security incident involving Florida International University in Miami, but if AlphaV’s claims are true, they have been breached again.

AlphaV (“BlackCat”) added FIU to their leak site and claim:

In our design the following information:
-Personal information of students and teaching staff, including confidential data, SSN, contacts and more
-Contracts, financial and accounting documents
-SQL Databases
-Email Databases

1.2 TB of Data and 300 GB SQL

But there is nothing in their very limited proof of claim that discloses personal or sensitive information or proves that they exfiltrated it.

SuspectFile has an interesting write-up on this, noting that FIU was also impacted by the big Blackbaud ransomware attack in early 2020. They report having sent an email inquiry to FIU about AlphaV’s claims, but have yet to receive any response.

FIU’s Response

On April 9, ABC News reported that FIU had notified students and staff about the AlphaV incident. Their report seems somewhat contradictory, though:

University officials on Saturday notified students and staff that a ransomware group got a hold of sensitive data.

Officials said they are investigating.

In the message sent by the university, officials wrote, “There is no indication thus far that sensitive information has been compromised.”

If threat actors “got hold of” sensitive data, then it was compromised. So what, exactly, did FIU write to students and faculty?  DataBreaches.net sent an email inquiry to FIU, who provided a copy of the statement they sent out on April 8:

April 8, 2022

Dear members of the university community,

Today, a ransomware group posted that sensitive FIU data had been exfiltrated. We have been investigating and there is no indication thus far that sensitive information has been compromised. At this time, no further information is available.

That sounds like they are saying that they had not found any evidence of exfiltration, but it’s still not really clear, so DataBreaches requested clarification:

So when FIU said there was no indication that sensitive info has been
*compromised,* was FIU stating that there was no indication so far that sensitive info has been *exfiltrated?*

Or did the statement mean that there was indication that sensitive info had been exfiltrated but it had not been compromised?

No reply was immediately forthcoming, but DataBreaches will update this post when clarification is received. (UPDATE: A reply was received on April 12. It is posted under the original article, below).

Past Incidents

The Blackbaud incident discussed by SuspectFile impacted FIU’s data, but was not an attack on FIU’s system. FIU has had other incidents that did involve their system, however. Looking through this site’s archives:

  • In 2010, DataBreaches.net reported that FIU was notifying students and faculty about an unsecured database that exposed information such as GPAs, test scores, and social security numbers of more than 19,000 students as well as the social security numbers of 88 faculty members.
  • In 2015, DataBreaches.net pointed to news coverage in Florida that Team Ghost Shell had breached a number of Florida universities, allegedly including FIU’s Health Department. At that time, FIU reportedly confirmed The Herbert Wertheim College of Medicine website was hacked, but claimed that there was no sensitive information available on that website.
  • In 2016, DataBreaches.net reported on a claimed hack of FIU’s system, but despite repeated attempts at notification and inquiry, DataBreaches received no reply from FIU. In that incident, a paste contained 160 addresses with passwords in one part of the data dump, and another section of the dump included first and last names, usernames, encrypted passwords, and email addresses.

Some might argue that given how many attacks there are on the education sector, a handful of incidents in more than a decade is not that bad for a highly-ranked university that has tried to become a hub of cybersecurity research. It’s an argument that would not be without some merit, especially since DataBreaches is not currently aware of any successful attacks on their system since 2016.


Statement from FIU, April 12, 2022

Media Statement from Florida International University on Cybersecurity Incident

Florida International University (FIU) recently became aware of a security
incident involving ransomware that affected some systems at the university. We immediately started an investigation, informed law enforcement and engaged third party professionals to assist in the investigation of the incident. On Friday, April 8, 2022, we made our university community aware of a ransomware group’s claims that sensitive FIU data was exfiltrated and our efforts to investigate.

This investigation is ongoing, and we are working diligently with our partners to gain a complete understanding of the incident – including what type of data was stored on the server and may be at risk. At this time, we do not believe that any financial information, social security numbers, or information on student performance was stored on the impacted server.

Importantly, this incident has not impacted the education process -students and researchers are continuing their work, uninterrupted. We are committed to keeping all relevant parties informed throughout the process and will continue to provide updates as necessary.

Category: Breach IncidentsEducation SectorMalware

Post navigation

← NYS Comptroller releases more school district IT Audits
Update to Christie Clinics breach disclosure →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • B.C. health authority faces class-action lawsuit over 2009 data breach (1)
  • Private Industry Notification: Silent Ransom Group Targeting Law Firms
  • Data Breach Lawsuits Against Chord Specialty Dental Partners Consolidated
  • PA: York County alerts residents of potential data breach
  • FTC Finalizes Order with GoDaddy over Data Security Failures
  • Hacker steals $223 million in Cetus Protocol cryptocurrency heist
  • Operation ENDGAME strikes again: the ransomware kill chain broken at its source
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
  • Mysterious hacking group Careto was run by the Spanish government, sources say
  • 16 Defendants Federally Charged in Connection with DanaBot Malware Scheme That Infected Computers Worldwide

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • D.C. Federal Court Rules Termination of Democrat PCLOB Members Is Unlawful
  • Meta may continue to train AI with user data, German court says
  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.