DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Metropolitan State University updates details on hack claimed by Abdilo

Posted on April 15, 2015 by Dissent

Back in January, DataBreaches.net reported that Metropolitan State University had acknowledged that they had been hacked. As I reported at that time, a teenage hacker from Australia, who used the Twitter name @Abdilo, had previously claimed in December that he had hacked them via SQL injection, and he thanked them for 22,000 Social Security numbers. They were only one of dozens of education sector hacks Abdilo claimed to have executed SQL injections on because of their “idiotic security.” Abdilo has since had his home raided by law enforcement in Australia.

Now Metropolitan State University seems to have updated their disclosure. Pioneer Press reported today that MSU says that

 a hacker could have accessed data on about 160,000 past and present students in December, but no financial information was exposed.

They are now also providing more details on the type of data involved:

The St. Paul school said the data included names, birth dates, contact information and grades. The school said the last four digits of the Social Security numbers of about 11,000 students also likely were exposed; those students will be notified by mail.

Metro State said in February that 900 faculty members from 2004-09 had their Social Security numbers exposed. The staff were offered identity protection services.

“Likely exposed?” Abdilo claimed in December that there were 22k SSN. I wonder if Australian law enforcement is sharing anything they find on Abdilo’s computers – if he’s turned over his encryption keys and hadn’t destroyed the data he had hacked.

I also wonder – no, hope – that Metro State  saw the message Abdilo included to them in his February paste – months after the initial hack and their disclosure of it:

Metrostate.edu illy for publicly announcing you got sqli’d, but check your subdomains you are still vuln to sqli <3.


Related:

  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Toys “R” Us Canada customers notified of breach of personal information
  • Kaufman County's data breach was their second one in three weeks
  • Hacking Formula 1: Accessing Max Verstappen's passport and PII through FIA bugs
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
Category: Education SectorHackU.S.

Post navigation

← Right-wing group blamed for posting top law officials’ info
Lawyer: Malware located on drive provided by police department in discovery →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.