The ShinyHunters cybercriminal group has published stolen data from Harvard University and the University of Pennsylvania after both institutions refused to pay ransom demands. The breach, which occurred in late 2025 through social engineering attacks, exposed approximately 2 million records containing sensitive alumni, donor, and student information.

Incident overview

AttributeDetails
Threat actorShinyHunters / Scattered LAPSUS$ Hunters
VictimsHarvard University, University of Pennsylvania
Data publishedFebruary 4, 2026
Original breachNovember 2025
Harvard records~1.1 million (1.1GB compressed)
UPenn records~900,000
Attack methodVoice phishing (vishing) with potential deepfake
Ransom paidNo (both institutions)

Timeline

DateEvent
November 2025Initial unauthorized access to Harvard AAD systems
November 2025Harvard acknowledges cybersecurity incident
Late 2025ShinyHunters contacts institutions with ransom demands
January 2026Both universities decline to pay
February 4, 2026ShinyHunters publishes stolen data
February 2026Class action lawsuit filed, later withdrawn

Data exposed

Harvard University

Data typeRisk level
Email addressesHigh
Phone numbersHigh
Home addressesHigh
Business addressesMedium
Event attendance recordsMedium
Donation detailsHigh
Biographical informationMedium

Affected populations

GroupExposure
AlumniPrimary targets of AAD systems
DonorsFinancial contribution history
Spouses/partners of alumniContact information
Parents of studentsBiographical data
Current studentsLimited records
Faculty and staffSome records

UPenn data

Data typeDetails
Total records~900,000
Similar scopeAlumni affairs and development data
Overlap with HarvardSame threat actor, same techniques

Attack methodology

Social engineering chain

StageTechnique
1Vishing campaign targeting administrative staff
2Potential deepfake voice impersonation of IT support
3Direction to typosquatted SSO portal
4Man-in-the-Middle credential capture
5MFA bypass via push notification approval
6Lateral movement within AAD systems

Why the attack succeeded

FactorVulnerability
Cloud-based platformsCentralized target for attackers
Bypassable MFAPush notifications susceptible to social engineering
Wealth of dataAlumni systems contain high-value information
Single point of failureCredential compromise grants broad access

Institutional response

Harvard statement

Harvard acknowledged the breach and confirmed:

“The university experienced unauthorized access to alumni affairs systems through social engineering tactics.”

UPenn statement

The University of Pennsylvania issued similar acknowledgment:

“We are working with law enforcement and cybersecurity experts to investigate this incident and protect affected individuals.”

Why no ransom paid

RationaleConsideration
No guarantee of data deletionCriminals may retain copies
Funding criminal enterpriseEncourages future attacks
Law enforcement guidanceFBI recommends against payment
Institutional policyMany universities prohibit ransom payments

Class action lawsuit

AttributeStatus
FiledFebruary 2026
AllegationFailure to adequately secure alumni database
StatusVoluntarily withdrawn
Plaintiff claimInadequate security measures

The lawsuit alleged Harvard failed to implement proper security controls despite holding sensitive personal and financial information on millions of individuals.

Security researcher analysis

Security researchers noted critical vulnerabilities in the institutions’ approach:

“By centralizing admissions statuses, wealth ratings and private family hierarchies into cloud-based platforms protected by bypassable MFA, institutions have created a single point of failure.”

ControlPurpose
FIDO2/hardware keysPhishing-resistant MFA
Zero Trust architectureAssume breach, verify continuously
Privileged access managementLimit administrative credentials
Security awareness trainingCounter social engineering
Network segmentationLimit lateral movement

ShinyHunters profile

Group characteristics

AttributeDetails
First observed2020
Operating modelData extortion
TacticsBreach and leak if unpaid
Known victims70+ major organizations
AffiliationScattered LAPSUS$ Hunters collective

Recent ShinyHunters activity

TargetSector
Match GroupDating/Social
Allianz LifeInsurance
CrunchbaseBusiness data
Harvard/UPennEducation

The group has escalated activity against high-profile targets, focusing on organizations with valuable data and the financial means to pay ransoms.

Impact on affected individuals

Identity theft risks

RiskMitigation
Phishing attacksVerify all communications
Donation fraudContact university directly
Targeted scamsWealth data enables customized approaches
Credential stuffingUse unique passwords

Recommendations for affected individuals

PriorityAction
ImmediateMonitor credit reports
ImmediateEnable MFA on all accounts
HighBe alert to phishing targeting Harvard/UPenn affiliations
HighVerify any donation requests directly
OngoingConsider identity monitoring services

Higher education sector implications

Systemic vulnerabilities

IssueRisk
Legacy systemsOften lack modern security controls
Decentralized ITInconsistent security policies
Vast data holdingsDecades of alumni records
Budget constraintsSecurity competes with academic priorities

Sector-wide recommendations

PriorityAction
CriticalImplement phishing-resistant MFA
CriticalAudit alumni/development system access
HighSegment sensitive databases
HighTrain staff on vishing attacks
MediumImplement data minimization
OngoingRegular security assessments

Indicators of compromise

Social engineering indicators

IndicatorDetection
IT support calls requesting credentialsVerify through official channels
Links to unfamiliar SSO portalsCheck domain carefully
Urgency in requestsClassic social engineering
Requests to approve MFA promptsNever approve unexpected prompts

Network indicators

IndicatorAction
Logins from unusual locationsGeographic anomaly detection
Bulk data accessDLP monitoring
Off-hours access to AAD systemsTime-based alerts
Access from unmanaged devicesMDM verification

Context

The Harvard and UPenn breach illustrates the evolving sophistication of data extortion groups like ShinyHunters. By targeting alumni affairs systems—repositories of wealth indicators, contact information, and relationship data—attackers accessed information valuable for multiple types of fraud.

The use of vishing with potential deepfake technology represents an escalation in social engineering capabilities. Traditional security awareness training focused on email phishing may be insufficient as attackers exploit voice and video channels.

Higher education institutions face unique challenges: they hold vast amounts of historical data, often operate with decentralized IT governance, and face budget pressures that can deprioritize security investments. The Harvard/UPenn breach serves as a warning that prestigious institutions are high-value targets.

For individuals affected by this breach, the exposure of donation history and wealth indicators creates elevated risk for targeted scams. Attackers can craft highly personalized approaches using the leaked biographical data, making verification of all communications essential.

The broader message for organizations: phishing-resistant MFA is no longer optional. Push notifications and SMS codes can be socially engineered. Only hardware keys and FIDO2 authentication provide robust protection against the vishing attacks that enabled this breach.