DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Possible security breach involving Xavier University?

Posted on January 29, 2011 by Dissent

On January 26, Jennifer Baker of the Cincinnati Enquirer reported that Miller Beckham III, 32, of Springfield Township was charged with demanding $20,000 from Xavier University in exchange for not publicly releasing personal student documents.

On January 27, Cliff Peal of the same paper reported that students had not been notified of any breach and that the university reported it was “still investigating” the situation.

On January 28, the paper reported:

An alleged extortion case at Xavier University involved personal information of a “limited number” of students and parents, a university spokeswoman said Friday, and there is no evidence the information was misused or that any university databases were breached.

The university sent a message to students and staff Friday alerting them of the Jan. 25 arrest of Miller Beckham III, 32, of Springfield Township on a felony extortion charge. Beckham allegedly demanded $20,000 from the university Jan. 14 in exchange for personal student documents.

The “nature of the information and how it was obtained” remain under investigation by Cincinnati police, said University spokeswoman Deb del Valle. She could not say Friday how many students may have been victims, but said those individuals have been contacted directly.

Beckham has never worked for the university. He remained jailed Friday on $10,000 bond. His next court appearance is Feb. 4, according to jail records.

I fail to understand how people can say that “no information was misused” when it was used for an extortion attempt. How is that not misuse?

There is no statement on the university’s web site as of the time of this posting. Since the extortion attempt was directed to them, it seems reasonable to hypothesize that the student and parent information was obtained from them somehow, even if they have found no evidence that any database was breached. Are they defining “breached” only as a hack? Have they really ruled out an employee downloading information and giving it to the accused?

If anyone received the letter or has additional information on this, please let me know.


Related:

  • Two more entities have folded after ransomware attacks
  • Microsoft Releases Urgent Patch for SharePoint RCE Flaw Exploited in Ongoing Cyber Attacks
  • Michigan ‘ATM jackpotting’: Florida men allegedly forced machines to dispense $107K
  • Premier Health Partners issues a press release about a breach two years ago. Why was this needed now?
  • Missouri Adopts New Data Breach Notice Law
  • Qantas obtains injunction to prevent hacked data’s release
Category: Breach IncidentsEducation SectorU.S.

Post navigation

← Veterans Administration December report to Congress
Minnesota Education Department improperly releases transcripts from online charter school →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
  • Hacker group “Silent Crow” claims responsibility for cyberattack on Russia’s Aeroflot
  • AIIMS ORBO Portal Vulnerability Exposing Sensitive Organ Donor Data Discovered by Researcher
  • Two Data Breaches in Three Years: McKenzie Health
  • Scattered Spider is running a VMware ESXi hacking spree
  • BreachForums — the one that went offline in April — reappears with a new founder/owner
  • Fans React After NASCAR Confirms Ransomware Breach
  • Allianz Life says ‘majority’ of customers’ personal data stolen in cyberattack (1)
  • Infinite Services notifying employees and patients of limited ransomware attack
  • The safe place for women to talk wasn’t so safe: hackers leak 13,000 user photos and IDs from the Tea app

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • White House ordered to restore Medicaid funding to Planned Parenthood clinics
  • California Attorney General Announces $1.55M CCPA Settlement with Healthline.com
  • Canada’s Bill C-2 Opens the Floodgates to U.S. Surveillance
  • Wiretap Suits Pit Old Privacy Laws Against New AI Technology
  • Action against tiny Scottish charity sparks huge ICO row
  • Congress tries to outlaw AI that jacks up prices based on what it knows about you
  • Microsoft’s controversial Recall feature is now blocked by Brave and AdGuard

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.