Princeton University says database containing donor, alumni info breached

A database containing personal information belonging to Princeton University donors, alumni, students, faculty and parents was hacked on November 10.

University officials announced the hack in an email sent to alumni on November 15 and in a blog post on the school website. 

The hacker was in the database for less than 24 hours and it is unclear what information was viewed, according to the blog post.

Information including names, email addresses, telephone numbers, and home and business addresses is stored on the database, in addition to donation information.

The database does not “generally” contain Social Security numbers, passwords or financial information such as credit card or bank account numbers, the blog post said. Student records covered by federal privacy law also are not stored in the database.

No systems other than the advancement database were accessed.

Princeton is one of a string of Ivy League universities to be recently hit with a data breach.

In June, a hacker seeking data on affirmative action in admissions broke into a Columbia University database. Last month, an email containing offensive language and threats regarding a data breach was sent to thousands of students and alumni at the University of Pennsylvania.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Suzanne Smalley

Suzanne Smalley

is a reporter covering privacy, disinformation and cybersecurity policy for The Record. She was previously a cybersecurity reporter at CyberScoop and Reuters. Earlier in her career Suzanne covered the Boston Police Department for the Boston Globe and two presidential campaign cycles for Newsweek. She lives in Washington with her husband and three children.

 

Total
0
Shares
Previous Post

Kenyan gov’t websites back online after hackers deface pages with white supremacist messages

Next Post

Pennsylvania attorney general says SSNs stolen during August ransomware attack

Related Posts

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting diplomatic, maritime, financial, and telecom entities in the Middle East with a Rust-based implant codenamed RustyWater. "The campaign uses icon spoofing and malicious Word documents to deliver Rust based implants capable of asynchronous C2, anti-analysis, registry persistence, and modular
Read More

New HttpTroy Backdoor Poses as VPN Invoice in Targeted Cyberattack on South Korea

The North Korea-linked threat actor known as Kimsuky has distributed a previously undocumented backdoor codenamed HttpTroy as part of a likely spear-phishing attack targeting a single victim in South Korea. Gen Digital, which disclosed details of the activity, did not reveal any details on when the incident occurred, but noted that the phishing email contained a ZIP file ("250908_A_HK이노션
Read More

Critical Grist-Core Vulnerability Allows RCE Attacks via Spreadsheet Formulas

A critical security flaw has been disclosed in Grist‑Core, an open-source, self-hosted version of the Grist relational spreadsheet-database, that could result in remote code execution. The vulnerability, tracked as CVE-2026-24002 (CVSS score: 9.1), has been codenamed Cellbreak by Cyera Research Labs. "One malicious formula can turn a spreadsheet into a Remote Code Execution (RCE) beachhead,"
Read More