DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Guilford Technical Community College notifies 65,646 affected by ransomware incident in 2020

Posted on January 14, 2022 by Dissent

On September 19, 2020, DataBreaches.net reported that Guilford Technical Community College (GTCC) in North Carolina had reportedly become a ransomware victim of DoppelPaymer on September 13.

The following month, this site followed up by asking whether GTCC had notified the more than 43,000 students whose data had appeared on the dark web. A spokesperson for the college responded:

Guilford Technical Community College has notified faculty, staff and students of a recent ransomware cyberattack. This communication was in response to an unauthorized access to the college’s network, which was discovered on Sept. 13, 2020.

Upon discovery of the event, the College immediately launched an investigation, with the assistance of leading cybersecurity experts, the Federal Bureau of Investigation, and other state agencies to determine what happened and to remediate impacted systems.

Additionally out of an abundance of caution, the college is proactively taking the necessary steps to assist those individuals who have been potentially impacted by the attack. The college’s faculty, staff and students will be offered free credit monitoring and identity restoration services.

So in October, 2020, the college said those potentially impacted would be offered credit monitoring and identity restoration services. But it seems that those offers may not have been made until this week.

Yesterday, external counsel for GTCC notified the Maine Attorney General’s Office about the breach. Their notification indicated that a total of 65,646 current or former students, faculty members, or staff members were being notified of the incident and that written notification would go out on January 13, 2022. A sample notification letter for adults was attached to the submission.

One of the most shocking aspects of the notification (apart from its delay) is that it does not mention that data was leaked on the dark web back in October 2020.

From part of the sample notification letter (emphasis added by this site):

You are receiving this letter as the data mining determined that your personal information was present on GTCC’s network at the time of the attack and may have been accessible to the cybercriminal as a result. This personal information includes your: name, <>. There is no confirmation that this personal information was accessed or acquired by the cybercriminal(s).

“May have been accessible?” “No confirmation that this personal information was accessed or acquired?” Seriously?  Is that what they wrote to all the people whose personal information was actually leaked on the dark web?

Perhaps there is another letter that went to people who had their personal information leaked on the dark web?

DataBreaches.net sent an email inquiry to GTCC to ask whether there was an alternative notification for those who had their data leaked in October 2020. No reply has been received.

So almost 1.5 years after a ransomware incident, those impacted are sent a letter that may be misleading at best, with an offer for help that they should have been made back in October, 2020.

Does the government thinks that is just fine? As this site pointed out in 2020, the Federal Trade Commission can enforce data security for financial aid data under the GLBA. Why don’t they? And what is the U.S. Education Department doing?

 

 


Related:

  • John Bolton Indictment Provides Interesting Details About Hack of His AOL Account and Extortion Attempt
  • A business's cyber insurance policy included ransom coverage, but when they needed it, the insurer refused to pay. Why?
  • Before Their Telegram Channel Was Banned Again, ScatteredLAPSUS$Hunters Dropped Files Doxing Government Employees (2)
  • Scenes from a "No Kings" Protest, 10-18-25
  • No Kings. Not Today. Not Ever.
  • Massachusetts hospitals Heywood, Athol say outage was a cybersecurity incident
Category: Breach IncidentsCommentaries and AnalysesEducation SectorMalwareU.S.

Post navigation

← Former Acting Inspector General for the U.S. Department of Homeland Security Pleads Guilty to Scheme to Defraud the U.S. Government
The definitions of “recently” and “discovered” leave a lot to be desired →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.