Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. ShinyHunters Dumps Harvard and UPenn Data After Ransom
ShinyHunters Dumps Harvard and UPenn Data After Ransom
NEWS

ShinyHunters Dumps Harvard and UPenn Data After Ransom

The ShinyHunters cybercriminal syndicate has published stolen data from Harvard University and the University of Pennsylvania after both institutions...

Dylan H.

News Desk

February 20, 2026
5 min read

Ivy League Data on the Dark Web

The ShinyHunters cybercriminal syndicate has published stolen data from Harvard University and the University of Pennsylvania (UPenn) on its dark web leak site after both institutions refused to pay ransom demands. The breach exposed over 2 million combined records containing sensitive alumni and donor information.

The attack is part of a broader ShinyHunters campaign that has compromised 15+ organizations in early 2026 using sophisticated AI-powered voice phishing (vishing) attacks targeting employee Okta SSO credentials.


Breach Details

Harvard University

AttributeDetail
Records Exposed~115,000
Department AffectedAlumni Affairs and Development (AAD)
Data TypesEmail addresses, phone numbers, home/business addresses, event attendance, donation details, biographical information
Discovery DateFebruary 4, 2026

University of Pennsylvania

AttributeDetail
Records Exposed~1.9 million
Departments AffectedAlumni relations and development offices
Data TypesSimilar to Harvard — contact information, donor records, engagement history
Discovery DateFebruary 4, 2026

Attack Method: AI-Powered Vishing

The breach was executed through a multi-stage social engineering attack that leveraged AI technology:

Stage 1: Voice Phishing with Deepfake

  1. Attackers called targeted employees using deepfake voice technology to impersonate IT support staff
  2. The synthetic voice was convincing enough to pass casual verification
  3. Employees were directed to a typosquatted Single Sign-On (SSO) portal that mimicked their institution's Okta login page

Stage 2: Credential and MFA Harvesting

  1. The fake portal used a Man-in-the-Middle (MitM) architecture to relay credentials to the real Okta instance in real time
  2. This captured both passwords and MFA tokens as victims entered them
  3. Attackers gained authenticated sessions to internal systems

Stage 3: Data Exfiltration

  1. With valid sessions, attackers accessed alumni databases and development systems
  2. Data was exfiltrated and staged for ransom negotiations
  3. When ransom was refused, data was published on ShinyHunters' leak site

The ShinyHunters Campaign

Harvard and UPenn are part of a larger campaign. Confirmed victims include:

OrganizationSectorData Compromised
Harvard UniversityEducation115K alumni records
University of PennsylvaniaEducation1.9M alumni records
Panera BreadRetail/Food5M customer records
Figure TechnologyFintech~1M customer records
Match GroupTechnologyUndisclosed
BettermentFintechUndisclosed
SoundCloudTechnologyUndisclosed
SubstackMedia700K user records

All victims were compromised through the same Okta SSO vishing technique, suggesting a repeatable, scalable attack playbook.


Why Ransom Was Refused

Both Harvard and UPenn declined to pay ransom. This decision aligns with:

  • FBI guidance recommending against ransom payments
  • Institutional policy at major universities
  • Legal and ethical considerations around funding criminal enterprises
  • The understanding that payment doesn't guarantee data deletion

The consequence: full publication of stolen data on ShinyHunters' dark web site, making it accessible to any threat actor.


Impact Assessment

For Affected Alumni

  • Phishing risk — Email addresses and personal details enable targeted phishing
  • Identity theft — Home addresses combined with biographical information enable identity fraud
  • Social engineering — Donation history and event attendance provide rich context for pretexting attacks
  • Reputational exposure — Donation amounts and engagement details are now public

For Institutions

  • Regulatory exposure — Potential violations of state breach notification laws across all 50 states
  • Donor trust — Alumni may reduce engagement and giving due to privacy concerns
  • Legal liability — Class action lawsuits are likely from affected individuals
  • Operational disruption — Incident response and remediation consume significant resources

Defense Lessons

The Vishing Problem

This campaign demonstrates that voice phishing with AI deepfakes can defeat even organizations with strong technical security:

  1. MFA is not enough — MitM attacks capture MFA tokens in real time
  2. Voice verification is unreliable — Deepfake voices pass casual checks
  3. Okta SSO is a high-value target — Compromising one SSO session grants access to all connected applications
  4. Human training has limits — Even security-aware employees can be deceived by convincing synthetic voices

Recommended Controls

  • Deploy phishing-resistant MFA (FIDO2/WebAuthn hardware keys) that cannot be proxied
  • Implement callback verification procedures — Require employees to call back IT support on a known number
  • Enable Okta session anomaly detection to flag unusual login locations or behaviors
  • Conduct vishing simulation training that includes AI-generated voice scenarios

Key Takeaways

  1. 2M+ records exposed from Harvard and UPenn after ransom refusal
  2. AI-powered vishing using deepfake voices was the initial access vector
  3. Okta SSO MitM captured both credentials and MFA tokens in real time
  4. 15+ organizations compromised in the same ShinyHunters campaign
  5. Phishing-resistant MFA (FIDO2) is the primary defense against this attack class

Sources

  • TechCrunch — Hackers Publish Personal Information Stolen During Harvard, UPenn Data Breaches
  • InfoStealers — A Technical and Ethical Post-Mortem of the Feb 2026 Harvard University ShinyHunters Data Breach
  • BankInfoSecurity — Harvard, UPenn Data Leaked in ShinyHunters Shakedown
  • SC Media — ShinyHunters Exposes Harvard, UPenn Data

Related Reading

  • ShinyHunters Dumps 5.1 Million Panera Bread Customer
  • Fintech Giant Figure Technology Confirms Breach: Nearly 1
  • Telus Digital Confirms Massive Breach After ShinyHunters
#ShinyHunters#Data Breach#Harvard#UPenn#Vishing#Deepfake#Education

Related Articles

Telus Digital Confirms Massive Breach After ShinyHunters

Canadian telecom giant Telus Digital has confirmed a security incident after the ShinyHunters hacking group claimed to have stolen nearly 1 petabyte of...

5 min read

Fintech Giant Figure Technology Confirms Breach: Nearly 1

Blockchain-based lending platform Figure Technology Solutions confirms a data breach affecting nearly 1 million customers after ShinyHunters exploited an...

5 min read

ShinyHunters Dumps 600K+ Canada Goose Customer Records on

Data extortion group ShinyHunters posts 1.67 GB of alleged Canada Goose customer data including names, emails, addresses, and partial payment card...

3 min read
Back to all News