March 12, 2015 By Douglas Bonderud 2 min read

On Jan. 22, the University of Chicago became aware of a cyberattack that targeted student records from its Biological Sciences department. According to ZDNet, university officials still aren’t certain when the hack started or how deep it went, but in a letter dated Feb. 22, the institution apologized for the threat to student and employee security and offered a one-year subscription to a credit-monitoring service. This isn’t the first time a university has been the victim of a data breach, and it certainly won’t be the last.

Known Quantities

University administrators now know that at least one Department of Medicine database was compromised, which included information about current students and employees in addition to data about former students, employees and even contractors.

The school’s letter indicates that stolen personal information ranges from names and Social Security numbers to employee IDs, usernames and physical addresses. However, it assured those affected that no banking information or other types of financial data were compromised.

Access to the database has been restricted while IT experts attempt to determine the exact scope of this data breach and for how long cybercriminals had access. So far, there’s no word on who might be responsible for the attack. The other unknown? Why universities keep popping up in the news for IT breaches.

Familiar Qualities?

Retail stores and health care agencies are both popular targets for cyberattacks because they deal with a high volume of sensitive consumer information, often with payment details attached. Post-secondary schools share some of these qualities, since students are required to provide a large amount of personal information and financial assurances to guarantee their enrollment. However, in comparison to the 70 million credit cards compromised in last year’s Target attack, the 300,000 students and faculty targeted at North Dakota University or the University of Maryland last year seem like just a drop in the bucket. With malicious actors now able to crack some of the world’s most complex and secure systems, why would they target universities?

There are two reasons. First, post-secondary IT security can sometimes be spotty. Several recent data breaches were successful because information wasn’t properly encrypted or network access policies simply weren’t up to snuff. The second reason is usability — students are typically slow to replace stolen cards or track credit ratings, and universities often wait months before disclosing the nature and scope of a breach. This leaves malicious actors with a significant amount of time to commit fraud without being detected and then move on to their next target.

The big lesson here for the University of Chicago and other post-secondary schools is that holding a large amount of student and employee records — both current and former — puts them on the same playing field as enterprises. Therefore, IT security must be tailored to match the value of assets, not assumptions.

Image Source: Flickr

More from

FYSA – Adobe Cold Fusion Path Traversal Vulnerability

2 min read - Summary Adobe has released a security bulletin (APSB24-107) addressing an arbitrary file system read vulnerability in ColdFusion, a web application server. The vulnerability, identified as CVE-2024-53961, can be exploited to read arbitrary files on the system, potentially leading to unauthorized access and data exposure. Threat Topography Threat Type: Arbitrary File System Read Industries Impacted: Technology, Software, and Web Development Geolocation: Global Environment Impact: Web servers running ColdFusion 2021 and 2023 are vulnerable Overview X-Force Incident Command is monitoring the disclosure…

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today