DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Another North Carolina community college hit with ransomware — Piedmont Community College

Posted on October 28, 2020 by Dissent

It seems I missed an announcement that another North Carolina community college  got hit with ransomware (or is this the mysterious listing I saw briefly on a dedicated leak site but it was gone before I could note the name and details?). In any event, on August 24, Piedmont Community College (PCC) in North Carolina reported that they had discovered what they described as a “cyber-incident.”  The college took critical systems  such as VPN access and other services offline by the end of that day.

On October 1, the college issued an update stating that they were continuing to work on repairing systems impacted by what they now labeled a ransomware attack. They make no mention, however, of any ransom demand, the type of ransomware, and whether they have a usable backup to restore from.  Their update notes some help they were receiving:

We are grateful to legislative allocation of funds for Rural Broadband Access Funds that will enable us to purchase additional hardware and services as part of our overall restoration.

It is now two months since the attack.  What do they know? Was any student or employee data accessed? Was any exfiltrated? What are they doing about protecting students and employees if there is a chance they are at risk? Are systems fully restored?

DataBreaches.net has reached out to PCC to ask for more information and will update this post if a response is received.

Update of October 29:  Dr. Pamela Senegal, the President of PCC, responded to this site’s inquiries:  “We are not interested in sharing the requested information with this site.”

Oh. Well who is PCC sharing it with? So far, it seems like they are not sharing it with stakeholders, as there is nothing on their site to inform current and former students and employees whether their personal information has been accessed or exfiltrated.

Dr. Senegal doesn’t want to share information with this site, but someone who describes themself as having knowledge of  PCC claims that PCC had been warned that it wasn’t a matter of if [they would be hacked] but when:

“The PCC IT dept was ill prepared,”  the individual, who asked to remain anonymous, wrote. “Backups and patching not kept up with. Backups on windows and Solaris based systems were compromised. Phone system was rolled back to an early August restore point. End users couldn’t access their voice mails or use phone features afterwards. Systems were down 4 weeks while everything was being rebuilt. Next 2 weeks saw incremental improvements.

PCC IT is understaffed and inexperienced. All experienced staff have left the school over the past 2 years…. They rely on one contractor to keep critical infrastructure running. 36-49 users have local admin rights to their computers.

The state has not commented what the malware was by name. Or its intrusion vector.

PCC has not been forthcoming to current or former students if their personal information was downloaded. Same for faculty and staff.

That PCC does not want to share information with the media or this site in particular is unfortunate. That they are allegedly not sharing vital information with those who may be directly impacted is troubling.

If anyone — including the threat actors — has further details on this incident that they are willing to share, please contact this site via e-mail to breaches[at]protonmail.ch or via Signal +1-516-776-7756. 
 


Related:

  • Clorox Files $380M Suit Alleging Cognizant Gave Hackers Passwords in Catastrophic 2023 Cyberattack
  • #StopRansomware: Interlock
  • Two more entities have folded after ransomware attacks
  • British institutions to be banned from paying ransoms to Russian hackers
  • Michigan ‘ATM jackpotting’: Florida men allegedly forced machines to dispense $107K
  • Authorities released free decryptor for Phobos and 8base ransomware
Category: Education SectorMalwareU.S.

Post navigation

← Sodinokibi ransomware group hits the Hanover Chamber of Crafts
Federal agencies issue alert: credible information of increased and imminent threat of ransomware attacks on healthcare and public health sector →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Oops! Catasauqua employees’ Social Security numbers, other data accidentally sent to government watchdog group
  • EU-wide Breach Notification Template on the Horizon
  • Sex toy maker Lovense caught leaking users’ email addresses and exposing accounts to takeovers
  • Hackers wipe out Rs 384 crore from Bengaluru cryptocurrency firm Neblio Technologies; firm says inside job
  • Intelligence cyberattack on Crimea. Documents confirming abduction of children from Ukraine found
  • Seminole County Schools recovers money taken by hackers
  • Minnesota National Guard deployed; St. Paul declares state of emergency in response to cyberattack
  • Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
  • Hacker group “Silent Crow” claims responsibility for cyberattack on Russia’s Aeroflot
  • AIIMS ORBO Portal Vulnerability Exposing Sensitive Organ Donor Data Discovered by Researcher

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Attorney General James Takes Action to Protect Sensitive Personal Information of Tens of Millions of People
  • Searches of Your Private Data in the Cloud Amount to Illicit State Action
  • How a Tax Subpoena in Ohio Tests European Privacy Law
  • Cambodia moves to enact comprehensive data privacy law
  • White House ordered to restore Medicaid funding to Planned Parenthood clinics
  • California Attorney General Announces $1.55M CCPA Settlement with Healthline.com
  • Canada’s Bill C-2 Opens the Floodgates to U.S. Surveillance

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.