DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Hawaiʻi Community College pays ransom to attackers

Posted on July 28, 2023 by Dissent

Law enforcement and experienced ransomware professionals generally advise victims not to pay any ransom demands. Yet the University of Hawaiʻi Community College decided that they would pay following an attack that they first disclosed on June 13. So why did they make that decision?

In a statement on their website this week, they explain:

After determining that the compromised data most likely contained personal information of approximately 28,000 individuals, the University of Hawaiʻi made the difficult decision to negotiate with the threat actors in order to protect the individuals whose sensitive information might have been compromised. A significant consideration in this decision-making process was that the criminal entity responsible for the attack has a documented history of publicly posting the stolen personal information of individuals when agreement with the impacted entity was not reached. Working with an external team of cybersecurity experts, UH reached an agreement with the threat actors to destroy all of the information it illegally obtained.

What information did the university consider so sensitive that it would warrant paying ransom when compared to other data breaches in the education sector where the victims didn’t pay? DataBreaches asked Brett Callow of Emsisoft for his thoughts on why the university paid when most universities take the advice of experts and don’t pay.  He replied:

Paying a ransom to ‘protect’ data or individuals makes little sense. There’s absolutely no way for victims to know whether the stolen data will actually be deleted and, given that they’re dealing with untrustworthy bad faith actors, it likely will not be. Why would criminals delete information they may be able to monetize further?

It’s interesting that UH stated the fact the criminals release data online was a “a significant consideration” in the decision to pay. Most ransomware groups release data online, and sometimes that data is extremely sensitive – yet most schools do not pay. Why UH decided that payment was a sensible option is not clear.

The university also announced that notification letters are being sent to approximately 28,000 individuals. The letters will include an offer of credit monitoring and identity theft protection services through Experian.

The university does not say how much it agreed to pay and it did not name the attackers in its announcement, but the listing on the NoEscape dark web leak site was removed.  Although the NoEscape ransomware gang first appeared under that name in June of this year, they are believed to be a rebrand of the Avaddon threat actors. They appear to be just another group using the double-extortion model that leaks the data of victims who don’t pay.

By all superficial factors, then, this breach doesn’t seem to have warranted any different treatment or response than other education sector breaches over the past few years. So were the decision-makers of the university just more sensitive to personal information breaches than decision-makers for other universities? Or were they just trying to decrease the chances of a lawsuit?

Those who are not long-time readers of DataBreaches.net may not know that back in 2009-2010, the university system had four breaches affecting about 100,000 students, faculty, and staff. They wound up settling a class-action lawsuit in 2012 by agreeing to provide two years of credit monitoring to those affected (an outcome DataBreaches had predicted), but the state legislature and others were all very concerned and looking at the university system’s infosecurity.  Some of the articles on this site from that time included:

  • Class-action suit filed against UH over data breaches
  • Securing data will be costly, UH says
  • Liberty Coalition gives University of Hawaii an ‘F’ for data breaches
  • UH computer breach may have compromised 53,000 people
  • Four U. Hawaii breaches since 2009 makes at least one student nervous
  • University of Hawaii-Manoa Breaches exposes sensitive info on 40,000 students

With the exception of one vendor breach in 2019, things seem to have been pretty quiet since then, until earlier this year when UH Maui College learned in mid-February that there had been a breach of their computer network. That breach was disclosed in April. Did UH fear that a second databreach disclosed just months later would result in another class action lawsuit? Did they pay the attackers, knowing that criminals shouldn’t be trusted to keep their word to try to placate people so there would be no litigation this time? Or was it really out of concern for sensitive data?

Perhaps news media or a legislator in Hawaii can find out more about what kinds of sensitive data UH had on its system that was acquired by the attackers — and why such sensitive information was even accessible to them.

 

Category: Breach IncidentsCommentaries and AnalysesEducation SectorMalwareU.S.

Post navigation

← NH: Lebanon students to finally receive grades from June after cyberattack delay
SSNDOB Marketplace Admin Pleads Guilty To Charges Related To His Operation Of A Series Of Websites →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • AT&T gets preliminary approval for $177 million data breach settlement
  • Aflac notifies SEC of breach suspected to be work of Scattered Spider
  • Former JBLM soldier pleads guilty to attempting to share military secrets with China
  • No, the 16 billion credentials leak is not a new data breach — a wake-up call about fake news
  • Tonga’s health system hit by cyberattack (1)
  • Russia Expert Falls Prey to Elite Hackers Disguised as US Officials
  • Proposed class action settlement in In re Netgain Technology litigation
  • Qilin Offers “Call a lawyer” Button For Affiliates Attempting To Extort Ransoms From Victims Who Won’t Pay
  • Ireland’s Data Protection Commission publishes 2024 Annual Report
  • The headlines suggested Freedman Healthcare suffered a ransomware attack that affected patient data. The reality was quite different.

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The Markup caught 4 more states sharing personal health data with Big Tech
  • Privacy in the Big Sky State: Montana’s Consumer Privacy Law Gets Amended
  • UK Passes Data Use and Access Regulation Bill
  • Officials defend Liberal bill that would force hospitals, banks, hotels to hand over data
  • US Judge Invalidates Biden Rule Protecting Privacy for Abortions
  • DOJ’s Data Security Program: Key Compliance Considerations for Impacted Entities
  • 23andMe fined £2.31 million for failing to protect UK users’ genetic data

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.