University of Pennsylvania investigating offensive email sent through graduate school system

The University of Pennsylvania is investigating an email that was sent out to thousands of current and former students on Friday afternoon containing offensive language and threats of a data breach. 

A spokesperson for the university told Recorded Future News that the email, sent from an address belonging to the Graduate School of Education (GSE), is fraudulent.

“This is obviously a fake, and nothing in the highly offensive, hurtful message reflects the mission or actions of Penn or of Penn GSE,” the spokesperson said. “The University’s Office of Information Security is aware of the situation, and our Incident Response team is actively addressing it.” 

The spokesperson did not respond to further questions about whether there has been a breach of the university’s systems. 

A banner on the university website makes a similar statement and adds that recipients should “disregard or delete the message.”

“However, if you receive any new or different messages that raise concern, please contact your local IT support provider (LSP),” the message said. 

The email leveled a range of criticisms at the school and threatened to leak data purportedly stolen from the university. 

It claimed the university “loves… unqualified affirmative action admits” and accused the school of flouting federal rules governing student records as well as the Supreme Court’s 2023 ruling around race-based admissions. 

The email bears the hallmarks of recent cyberattacks on Columbia University, New York University and the University of Minnesota that occurred in the wake of the Supreme Court decision to strike down affirmative action

In the University of Minnesota and New York University breaches, the hacker explicitly came forward to say their goal was to prove that schools are not abiding by the Supreme Court ruling because they have continued to admit Black and Latino students.

After the Columbia University incident — which exposed the sensitive personal information of more than 860,000 people — the hacker provided tranches of the data to conservative activists who have railed against affirmative action, as well as to Bloomberg News and The New York Times, both of which ran controversial stories based on the stolen information.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Chinese hackers scanning, exploiting Cisco ASA firewalls used by governments worldwide

Next Post

ASD Warns of Ongoing BADCANDY Attacks Exploiting Cisco IOS XE Vulnerability

Related Posts

APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks

The Russia-linked state-sponsored threat actor known as APT28 (aka UAC-0001) has been attributed to attacks exploiting a newly disclosed security flaw in Microsoft Office as part of a campaign codenamed Operation Neusploit. Zscaler ThreatLabz said it observed the hacking group weaponizing the shortcoming on January 29, 2026, in attacks targeting users in Ukraine, Slovakia, and Romania, three
Read More

Why Data Security and Privacy Need to Start in Code

AI-assisted coding and AI app generation platforms have created an unprecedented surge in software development. Companies are now facing rapid growth in both the number of applications and the pace of change within those applications. Security and privacy teams are under significant pressure as the surface area they must cover is expanding quickly while their staffing levels remain largely
Read More

Three Flaws in Anthropic MCP Git Server Enable File Access and Code Execution

A set of three security vulnerabilities has been disclosed in mcp-server-git, the official Git Model Context Protocol (MCP) server maintained by Anthropic, that could be exploited to read or delete arbitrary files and execute code under certain conditions. "These flaws can be exploited through prompt injection, meaning an attacker who can influence what an AI assistant reads (a malicious README,
Read More