CRITICAL SEVERITYEducation

Dartmouth College Data Breach

Dartmouth College Ivy League University Breach (2025): 163K Records Including SSN Exposed

Private Ivy League research university.

Verified by ObscureIQ Intelligence

8.0Severity
163KRecords
5Fields
2025Year

ObscureIQ Breach Intelligence Scores
24.0
Breach Risk Index
25
Data Value
60
Market Recency
130
days
Since Breach

Risk Interpretation

High risk of phishing, identity theft, payroll or tuition fraud, and targeting of research or donor relationships. University data also often includes young adults and long-lived alumni identities.

🎯 Impact & Downstream Threats

The institutional impact on Dartmouth has been significant given the SSN-and-financial-data exposure of approximately 35,000 to 40,000 individuals. Dartmouth incurred costs associated with forensic investigation by an outside firm, multi-state attorney general filings, individualized victim notification across multiple states, and the provision of one year of complimentary Experian credit monitoring and identity theft protection services. Class-action litigation has been initiated by plaintiffs'

Primary downstream threats:
  • Identity theft and synthetic identity construction using government-issued IDs
  • SIM swap attacks where phone numbers are present
  • Targeted phishing campaigns using exposed email addresses

🔓 Threat Vectors

Phishing, credential stuffing & account takeover
Name-based social engineering
SIM swapping, vishing & SMS phishing
Geographic narrowing
Full identity theft & synthetic identity fraud

📋 Breach Intelligence

EntityDartmouth College
OrganizationPrivate University • USA
Breach Date2025-11-13
Disclosure2025-11-24
DBC Added2025-12-18
Added Date2025-12-18
Records~163K (163,306 records)
Attack VectorUnknown
Threat ActorCl0p / TA505 (Oracle EBS zero-day campaign; CVE-2025-61882)
Data SubjectsStudent
Breach PathwayDirect
SourceDataBreach.com / ObscureIQ
SensitivityStandard
CA Reported2025-11-24
TX Published2025-11-25
Breach ID364.0
StatusConfirmed

📝 Executive Summary

Dartmouth College, a private Ivy League research university, suffered a data breach during a three-day window from August 9 to August 12, 2025 when the Cl0p ransomware gang (also known as TA505) exploited a zero-day vulnerability in Oracle's E-Business Suite software (CVE-2025-61882) to access Dartmouth's enterprise resource planning system and exfiltrate files containing personal information. Oracle disclosed the underlying vulnerability and released security patches in early October 2025. Dartmouth subsequently launched an internal investigation, identified the impacted data on October 30, 2025, and began notifying affected individuals through letters mailed in late November 2025 with state attorney general filings on November 24, 2025. Cl0p formally claimed responsibility for the Dartmouth breach on its dark-web data leak site on November 11, 2025, with the attackers leaking approximately 226 gigabytes of stolen Dartmouth data after Dartmouth declined to pay ransom.

The breach affected approximately 35,000 to 40,000 individuals based on combined state attorney general filings (with DataBreach.com reporting approximately 163,306 rows of data, reflecting the underlying file content rather than the count of affected individuals). Compromised fields included full names, Social Security numbers, financial account information including bank account details, email addresses, phone numbers, and ZIP codes. The affected population included current and former Dartmouth students (including student-employees), faculty, staff, and other individuals whose information was processed through Dartmouth's Oracle E-Business Suite platform. The exposure of SSN combined with bank account information represents an exceptionally high-risk data combination because it directly enables both identity theft and ACH-fraud (unauthorized direct withdrawal from compromised bank accounts).

For affected individuals, the practical risk profile is exceptionally severe due to the combination of SSN exposure with bank account data. Affected individuals should enroll in the complimentary Experian credit monitoring and identity theft protection services offered by Dartmouth before the February 28, 2026 enrollment deadline. Affected individuals should also consider placing a credit freeze with all three credit bureaus (Equifax, Experian, and TransUnion), which is more protective than credit monitoring alone because it prevents new accounts from being opened in the affected individual's name. The SSN exposure at a university is distinctively concerning because students often do not actively monitor their credit during their studies (because they have no mortgage, car loan, or other large account that would trigger credit-bureau alerts), making student-victim populations especially vulnerable to silent identity-fraud accumulation that may not be apparent until after graduation. Affected individuals should monitor their bank accounts daily for unauthorized ACH withdrawals, request replacement bank account numbers from their financial institution if any unusual activity is detected, and remain alert to phishing or impersonation attempts referencing real Dartmouth-association details. Class-action litigation is available for affected individuals seeking compensation. Affected individuals may also file complaints with state attorneys general in New Hampshire, Vermont, Maine, Texas, or other applicable states.

🏢 About Dartmouth College

Dartmouth College is a private Ivy League research university located in Hanover, New Hampshire and founded in 1769, making it one of the oldest institutions of higher education in the United States. Dartmouth enrolls approximately 6,700 students across its undergraduate liberal arts program, the Geisel School of Medicine, the Thayer School of Engineering, the Tuck School of Business, and various graduate programs. The institution employs approximately 4,000 faculty and staff and maintains substantial alumni records dating back centuries. As a research university with extensive administrative, academic, financial, and alumni operations, Dartmouth maintains identity, contact, financial, academic, employment, and donor records across multiple integrated enterprise systems including the Oracle E-Business Suite platform that handles financial management, human resources, and administrative workflows for the institution.

University | Higher education and research | Academic institution | USA
Private UniversityUSAdartmouth.edu

🗂 Why They Hold Your Data

Universities collect student, staff, faculty, alumni, applicant, donor, and research-linked identity, contact, financial, academic, and employment records across education and administration systems.

📰 Recent Developments

Dartmouth disclosed the breach to affected individuals through letters mailed in late November 2025 and through state attorney general filings in New Hampshire (31,742 residents), Vermont (more than 12,700 residents), Maine (at least 1,494 residents), and Texas. Interim Chief Information Officer Tom DeChiaro circulated a campus-wide email on December 16, 2025 acknowledging the incident and encouraging affected individuals to enroll in the complimentary Experian credit monitoring and identity theft protection services offered by the institution (with an enrollment deadline of February 28, 2026). Dartmouth has emphasized that the breach was the result of a zero-day vulnerability in Oracle's E-Business Suite software (CVE-2025-61882) rather than a phishing attack or other action by Dartmouth personnel, and that Dartmouth has implemented all available Oracle security patches and established a hotline for affected individuals. The case is part of the broader Cl0p ransomware gang campaign that has compromised more than 100 organizations globally including Harvard University, the University of Pennsylvania, and Cox Enterprises.

🔍 Data Points Exposed

5 verified field types:
Social Security Number
Email
Phone Number
Zipcode
Name

Exposure Categories

CredentialsSSN

State-Reported Affected Data Types

Name of individualSocial Security Number InformationFinancial Information (e.g. account number, credit or debit card number)

Canonical Fields

email_address, full_name, phone_number, postal_code, ssn

🌐 Dark Web Verification

Confirmed
  • Dataset containing ~163K records identified in breach intelligence sources
  • Data indexed and searchable across breach notification platforms
  • Source: dartmouth-edu-2025

🛡 Recommended Actions

⚠️ Do not assume this is low sensitivity.

1Freeze Your Credit
Place a credit freeze with Equifax, Experian, and TransUnion.
2Expect Targeted Phishing
Watch for emails referencing this breach. Verify through official channels.
3Enable MFA Everywhere
Enable multi-factor authentication on all accounts.
4Monitor Accounts
Watch for unauthorized activity on financial and personal accounts.
5Check Your Exposure
ObscureIQ clients: this breach is indexed in your profile.

Protect Yourself

Check If You’re Affected

Enter your email to check if your data appears in this breach.

Get Free Breach Alerts

Be the first to know when new breaches are disclosed.

High-Risk? Get an Exposure Audit

Full-spectrum exposure audits for executives and public figures.

Request Consultation

ObscureIQ Advisory

We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.

If you are:
  • A public-facing individual
  • A high-profile executive
  • A customer of Dartmouth College
  • Or concerned about credential reuse
Services
AuditsWipesThreat MonitoringTraining

Classification Tags

EducationEmailPhone

Powered by the ObscureIQ Breach Intelligence Database

© 2026 ObscureIQ · All Rights Reserved · Data Licensing

Latest from ObscureIQ

Credit

What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)

July 14, 2025
Every time there’s a major data breach, companies scramble to offer “free” credit monitoring. It sounds like a responsible move.…
breach economycredit freezecredit scoreequifaxexperian
Credible Threats

Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.

September 2, 2025
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars. Over 80% of security incidents now start in the browser. Chrome.…
brave browserbreachesbrowser exploitbrowserschrome
Analysis

Sextortion Spam

May 10, 2025
Sextortion scams aren’t new, but they remain one of the most effective forms of cyber-enabled fraud. These scams don’t rely…
bitcoindeadlinefeargoogle maps apiransom