
The group ShinyHunters has now posted data tied to the Harvard and UPenn incidents, turning what used to be private alumni and donor records into a public targeting list. TechCrunch reported the leak includes personal information taken during the breaches.
Why you should care: this is not about credit cards. It is about “context” data, the stuff scammers use to sound real. If someone can call you with your address, graduation year, event attendance, and donation history, vishing and impersonation get dramatically easier, even if no Social Security numbers are involved.
What was leaked, and what’s actually confirmed
Harvard: Harvard previously disclosed that an attacker accessed information systems used by Alumni Affairs and Development (AAD) via a voice phishing attack, and the activity was discovered on Nov. 18, 2025. BleepingComputer reported the exposed or viewed information included email addresses, telephone numbers, and home and business addresses, plus alumni engagement and fundraising details like event attendance and donation information.
That mix is exactly what fraudsters want. It is a ready-made “how to impersonate the institution” kit. Harvard Magazine also said Harvard “acted immediately to remove the attacker’s access,” but public coverage still does not pin down a definitive, independently verified record count for the Harvard dataset.
Harvard’s FAQ messaging matters here too. GovTech reported Harvard indicated Social Security numbers, passwords, and financial information were generally not kept in the affected AAD system. That can be true and still leave people exposed, because names, phones, addresses, and giving context are enough to run high-conversion scams.
UPenn: The scope is far less clear in public reporting. BleepingComputer reported that a hacker claimed theft of data tied to about 1.2 million people. That figure is attacker-claimed, not independently confirmed.
Here’s the complication: The Daily Pennsylvanian reported a court filing described the Oct. 31, 2025 incident as impacting “less than 10 people,” while ShinyHunters alleged 1.2 million records, and said it leaked data because Penn “did not pay a ransom or cooperate.” That is not just a PR contradiction, it changes how cautious alumni and staff should be. If you assume “it was only a few people,” you are more likely to trust an email or call that is actually powered by leaked data.
How the attacks worked (vishing plus SSO), and why identity is the blast radius
Harvard’s entry point was vishing, basically a phone-based con where the attacker convinces someone to hand over access, reset credentials, or approve a login. People are trained to distrust sketchy links. They are less trained to distrust a confident voice who claims to be IT, fundraising ops, or a vendor working a “time-sensitive” issue.
For UPenn, coverage around the ShinyHunters claims has focused on identity-layer access, specifically a compromised single sign-on account. That matters because SSO is a skeleton key. If an attacker gets the right SSO session, they may not need to “hack” every system. They just walk in through the front door and pivot into tools and data stores that trust the identity provider.
This does not look like a one-off either. BankInfoSecurity reported Sophos tracked about 150 domains created starting in December 2025 that were used in vishing campaigns tied to data theft and ransom notes. That is industrial scale infrastructure. It also reported threat intel firm Hudson Rock reviewed leaked Harvard data and described admissions and fundraising-related details, including information that could be used to pick out high-value targets.
Real-world impact: scams to expect, and what to do now
If your info is in this kind of leak, the most likely harm is downstream impersonation. Expect pretexts like “we are confirming your alumni record,” “your donation pledge needs verification,” “your event registration payment failed,” “your student’s account is on hold,” or “we need to re-issue your tax receipt.” With addresses and phone numbers, scammers can also blend online fraud with real-world pressure, including threats or fake legal notices.
- Treat inbound contact as hostile by default. If someone calls claiming to be Harvard, Penn, or a vendor, hang up and call back using an official number from the university website, not a number they provide.
- Lock down your core accounts. Change passwords where reused, use a password manager, and turn on phishing-resistant MFA where possible (security keys or passkeys) for email and any school-linked accounts.
- Check your email for silent takeovers. Look for mailbox rules or forwarding you did not set up. That is how attackers keep access even after password changes.
- Watch for “verification” traps. Scammers will ask you to “confirm” an address, phone, or graduation year. That is often a lead-in to account resets or money requests.
- Consider a credit freeze if you are worried. Even if SSNs were not typically stored in the Harvard AAD system, data gets stitched together. A freeze reduces the damage if someone tries to open accounts in your name.
The institutional lesson is blunt: identity is the blast radius. Tighten helpdesk verification (especially for reset requests), segment AAD and CRM access, and reduce what a single compromised identity can reach. “No SSNs” is not a security strategy when the data you do store makes impersonation easy.
The big takeaway from the Harvard and UPenn data breach leak is that alumni and donor databases are long-lived fraud infrastructure once they spill. ShinyHunters is betting universities will not pay, then publishing anyway. For everyone else, the risk is not only what was taken, it is how believable the next phone call becomes.

Leave a Reply