University of Pennsylvania Breach - 623K Accounts Exposed
In October 2025, the University of Pennsylvania was the victim of a data breach followed by a ransom demand , largely affecting its donor database. After the incident, the attackers sent inflammatory emails to some victims. The data was later published online in February 2026 and included 624k uniqu...
Overview
In October 2025, the University of Pennsylvania experienced a significant cybersecurity incident. Attackers breached the university’s donor database, stole sensitive information, and issued a ransom demand. When their demands were not met, the attackers escalated their actions. They sent inflammatory, targeted emails to some of the affected individuals and, in February 2026, published the stolen data online. This breach compromised the personal information of approximately 623,750 individuals connected to the university’s donor community.
What Was Exposed
The core dataset published online includes names, email addresses, and physical addresses. For a significant number of records, gender and date of birth were also exposed. Most concerning is that a smaller subset of donor records contained highly sensitive details, including:
- Religion
- Spouse’s name
- Estimated income
- Donation history
This combination of basic contact information with intimate personal and financial details significantly increases the risk for victims.
Potential Impact
The exposure of this data creates multiple avenues for harm. With names, addresses, and emails, victims face a high risk of targeted phishing campaigns and identity theft. The inclusion of dates of birth makes it easier for criminals to impersonate individuals for financial fraud. The sensitive subset of data-particularly religion, income, and donation history-opens the door for extreme personal targeting, discrimination, or tailored scams. The attackers’ prior action of sending inflammatory emails proves they are willing to use this data for harassment, causing emotional distress beyond financial risk.
Recommendations
If you have ever donated to or been associated with the University of Pennsylvania, take these steps immediately:
- Change Passwords & Enable 2FA: Immediately update the password for the email address exposed, and any other accounts that use it or a similar password. Enable two-factor authentication (2FA) everywhere possible.
- Beware of Targeted Phishing: Be extremely cautious of all emails, especially those referencing your donation, address, or other exposed details. Do not click links or open attachments from unsolicited messages. Verify communications directly with the university through official channels.
- Monitor Financial Accounts: Regularly review bank and credit card statements for unauthorized activity. Consider placing a fraud alert on your credit file with the three major bureaus (Equifax, Experian, TransUnion).
- Stay Vigilant for Harassment: Be aware that your physical address and personal details are public. Report any harassing communications to local authorities and the university.
- Consider a Credit Freeze: For the highest level of protection against new accounts being opened in your name, initiate a credit freeze.
How to Check If You’re Affected
The breach has been reported to the free service Have I Been Pwned. To see if your information was compromised:
- Visit https://haveibeenpwned.com
- Enter your primary email address(es) into the search bar.
- The service will indicate if your email is listed in the “University of Pennsylvania” breach dataset. You can also directly access the breach notification at: https://haveibeenpwned.com/Breach/UniversityOfPennsylvania
Investigate Breaches Safely with NordVPN
Researching exposed data, paste sites, or threat actor infrastructure? Route your OSINT traffic through a VPN to avoid attribution and keep your investigation IP separate from your corporate network.
Get NordVPN for ResearchAffiliate link — we may earn a commission at no extra cost to you.
Never miss a data breach report
Get real-time security alerts delivered to your preferred platform.
Related Breach Reports
In April 2026, the hacking group ShinyHunters claimed they had breached Amtrak . The group typically compromises organisations' Salesforce instances before demanding a ransom and later, if not paid, dumping the data publicly. They subsequently published the alleged data which contained over 2M uniqu...
In March 2026, Hallmark suffered an alleged breach and subsequent extortion after attackers gained access to data stored within Salesforce. The data was later published after the extortion deadline passed, exposing 1.7M unique email addresses across both Hallmark and the Hallmark+ streaming service,...
In March 2026, the anime streaming service Crunchyroll suffered a data breach alleged to have impacted 6.8M users . The exposed data is reported to have originated from the company's Zendesk support system where "name, login name, email address, IP address, general geographic location and the conten...
In February, the AI-powered comic generation platform KomikoAI suffered a data breach . The incident exposed 1M unique email addresses along with names, user posts and the AI prompts used to generate content. The exposed data enables the mapping of individual AI prompts to specific email addresses.