Princeton University says database containing donor, alumni info breached

A database containing personal information belonging to Princeton University donors, alumni, students, faculty and parents was hacked on November 10.

University officials announced the hack in an email sent to alumni on November 15 and in a blog post on the school website. 

The hacker was in the database for less than 24 hours and it is unclear what information was viewed, according to the blog post.

Information including names, email addresses, telephone numbers, and home and business addresses is stored on the database, in addition to donation information.

The database does not “generally” contain Social Security numbers, passwords or financial information such as credit card or bank account numbers, the blog post said. Student records covered by federal privacy law also are not stored in the database.

No systems other than the advancement database were accessed.

Princeton is one of a string of Ivy League universities to be recently hit with a data breach.

In June, a hacker seeking data on affirmative action in admissions broke into a Columbia University database. Last month, an email containing offensive language and threats regarding a data breach was sent to thousands of students and alumni at the University of Pennsylvania.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Suzanne Smalley

Suzanne Smalley

is a reporter covering privacy, disinformation and cybersecurity policy for The Record. She was previously a cybersecurity reporter at CyberScoop and Reuters. Earlier in her career Suzanne covered the Boston Police Department for the Boston Globe and two presidential campaign cycles for Newsweek. She lives in Washington with her husband and three children.

 

Total
0
Shares
Previous Post

Kenyan gov’t websites back online after hackers deface pages with white supremacist messages

Next Post

Pennsylvania attorney general says SSNs stolen during August ransomware attack

Related Posts

Apple Backports Fix for CVE-2025-43300 Exploited in Sophisticated Spyware Attack

Apple on Monday backported fixes for a recently patched security flaw that has been actively exploited in the wild. The vulnerability in question is CVE-2025-43300 (CVSS score: 8.8), an out-of-bounds write issue in the ImageIO component that could result in memory corruption when processing a malicious image file. "Apple is aware of a report that this issue may have been exploited in an
Read More

Chrome Targeted by Active In-the-Wild Exploit Tied to Undisclosed High-Severity Flaw

Google on Wednesday shipped security updates for its Chrome browser to address three security flaws, including one it said has come under active exploitation in the wild. The vulnerability, rated high in severity, is being tracked under the Chromium issue tracker ID "466192044." Unlike other disclosures, Google has opted to keep information about the CVE identifier, the affected component, and
Read More

X Warns Users With Security Keys to Re-Enroll Before November 10 to Avoid Lockouts

Social media platform X is urging users who have enrolled for two-factor authentication (2FA) using passkeys and hardware security keys like Yubikeys to re-enroll their key to ensure continued access to the service. To that end, users are being asked to complete the re-enrollment, either using their existing security key or enrolling a new one, by November 10, 2025. "After November 10, if you
Read More