DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

North Dakota State College of Science reports malware activity found on Wahpeton and Fargo computers

Posted on October 9, 2014 by Dissent

North Dakota State College of Science Information Technology Services department has been alerted to malware activity on a number of NDSCS-owned computers in Wahpeton and Fargo and has taken immediate steps to ramp up security on its systems.

Personal information such as names, Social Security numbers and mailing addresses of more than 15,000 current and former students and employees were contained on some of the affected computers. Those whose information was found are in the process of being notified.

“We have found no evidence that any unauthorized individual accessed or is using the personal data,” said Cloy Tobola, NDSCS Chief Information Officer. “However we encourage all those affected to remain diligent in monitoring their personal information and to notify local law enforcement if they suspect any inappropriate or suspicious activity.”

The malware was discovered on September 1, 2014 and immediate action was taken to secure NDSCS systems. This included conducting a thorough internal investigation by NDSCS and North Dakota University System Information Technology experts. Law enforcement has been contacted, and key systems have been sent to a national forensic organization to confirm the analysis.

A toll-free hotline has been set up to answer questions and can be reached by calling 1-877-615-3755. The Call Center will open on Friday, October 10, 2014 at 8 a.m., CST, and will operate between the hours of 8 a.m. – 8 p.m., CST, Monday through Saturday for the foreseeable future.

As an added precaution, NDSCS has arranged to provide 12 months of identity protection to those affected at no cost to them. The College has also established a web page that provides more details about the incident. It can be accessed at www.ndscs.edu/data.

“We are committed to the privacy of student and employee information,” said NDSCS President John Richman, Ph.D. “We are continually reviewing our practices and processes to enhance the security of sensitive information. This incident serves as a reminder that we need to be even more vigilant in those efforts.”

SOURCE: NDSCS


Related:

  • Russian Police Bust Suspected Meduza Infostealer Developers
  • Ukrainian Conti Ransomware Suspect Extradited to US from Ireland
  • Some lower-tier ransomware gangs have formed a new RaaS alliance -- or have they? (1)
  • NY: Gloversville hit by ransomware attack, paid ransom
  • Confidence in ransomware recovery is high but actual success rates remain low
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
Category: Education SectorMalware

Post navigation

← NC: Cone Health Notifies Patients of Breach Due to Mailing Error
Fidelity hack points to JPMorgan link →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says
  • The Case for Making EdTech Companies Liable Under FERPA
  • NHS providers reviewing stolen Synnovis data published by cyber criminals

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation
  • Who’s watching the watchers? This Mozilla fellow, and her Surveillance Watch map

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.