CRITICAL SEVERITYEducation

Columbia University Data Breach

Columbia University Breach (2025): 346K Records Including SSN Exposed by Politically Motivated Hacktivist

Private research university in New York City.

Verified by ObscureIQ Intelligence

8.5Severity
346KRecords
5Fields
2025Year

ObscureIQ Breach Intelligence Scores
11.2
Breach Risk Index
25
Data Value
40
Market Recency
301
days
Since Breach

Risk Interpretation

High risk of phishing, identity theft, payroll or tuition fraud, and exposure of research or donor relationships. Large university ecosystems also create broad attack surface across students and staff.

🎯 Impact & Downstream Threats

The institutional impact on Columbia has been substantial and continues to evolve. Columbia incurred costs associated with extended IT system recovery (with the breach causing a multi-day outage of UNI logins, LionMail, and the CourseWorks learning platform), forensic investigation, multi-state regulatory filings, and individualized victim notification. The breach occurred during an exceptionally complicated political period for Columbia given the parallel federal funding freeze and ongoing publ

Primary downstream threats:
  • Identity theft and synthetic identity construction using government-issued IDs
  • Identity verification bypass using name + date of birth combination
  • SIM swap attacks where phone numbers are present
  • Targeted phishing campaigns using exposed email addresses

🔓 Threat Vectors

Identity verification bypass
Phishing, credential stuffing & account takeover
Name-based social engineering
SIM swapping, vishing & SMS phishing
Full identity theft & synthetic identity fraud

📋 Breach Intelligence

EntityColumbia University
OrganizationPrivate University • USA
Breach Date2025-06-24
Disclosure2025-08-07
DBC Added2025-06-30
Added Date2025-06-30
Records~346K (345,746 records)
Attack VectorMisconfiguration
Threat Actor"niggy" / "Computer Niggy Operations" (politically-motivated hacktivist; same actor as UMN 2023 + NYU 2025)
Data SubjectsStudent
Breach PathwayDirect
SourceDataBreach.com / ObscureIQ
SensitivityStandard
CA Reported2025-08-07
TX Published2025-08-08
Breach ID316.0
StatusConfirmed

📝 Executive Summary

Columbia University suffered a data breach in approximately April 2025 when a politically-motivated hacktivist using the alias 'niggy' (or 'Computer Niggy Operations') gained unauthorized access to Columbia's IT infrastructure and spent more than two months prowling the network before triggering a multi-day system outage on June 24, 2025. The hacker compromised Columbia's Student Information System (SIS), multiple Active Directory domains (including ADCU and several others), and all VMware ESXi virtualization hosts at both Columbia's Morningside Heights data center and the Syracuse, New York data center. The hacker exfiltrated approximately 460 gigabytes of data and released a 1.6-gigabyte sample to demonstrate authenticity. Columbia disclosed the breach on July 1, 2025 with state attorney general filings on August 7-8, 2025. The same hacker has claimed responsibility for two prior university breaches: the University of Minnesota in July 2023 (with seven million SSNs exfiltrated) and New York University in March 2025 (with NYU's website defaced with admissions data sorted by race), with all three attacks framed as politically motivated efforts to expose continued affirmative-action admissions practices following the U.S. Supreme Court's June 2023 ruling barring race-based admissions.

The breach affected approximately 345,746 individuals based on records indexed by DataBreach.com (with The Record citing approximately 900,000 affected individuals based on subsequent Columbia disclosures). Compromised fields included full names, Social Security numbers, dates of birth, email addresses, phone numbers, addresses, driver's license numbers, financial account information including bank account details for tuition payment and refund processing, medical information, health insurance information, and university-issued identification numbers (UNIs). The attacker also obtained approximately 2.5 million admission applications dating to the late 1990s including university-issued identification numbers, citizenship status, and final admissions decisions. The exposure of SSN combined with date of birth, address, driver's license, financial account, and medical information represents an exceptionally comprehensive identity-fraud kit.

For affected individuals, the practical risk profile is exceptionally severe given the comprehensive identity-data exposure. Affected individuals who are current or former Columbia students, faculty, staff, alumni, or applicants should enroll in the complimentary credit monitoring services offered by Columbia, place a credit freeze with all three credit bureaus (Equifax, Experian, TransUnion), monitor financial accounts and medical records for unauthorized activity, and remain alert to phishing or impersonation attempts referencing real Columbia-association details. The SSN exposure at a university is distinctively concerning because students often do not actively monitor their credit during their studies (because they have no mortgage, car loan, or other large account that would trigger credit-bureau alerts), making student-victim populations especially vulnerable to silent identity-fraud accumulation that may not be apparent until after graduation. Affected international students whose citizenship status was exposed face additional risk including potential targeted profiling. Affected individuals whose admission applications were exfiltrated may face additional risk because the hacker's stated motivation involves the public release of admissions data including racial demographic information, which could subject affected applicants to identification through subsequent media reporting based on the stolen data. Class-action litigation is available for affected individuals seeking compensation, and affected individuals may file complaints with state attorneys general in California, Texas, or other applicable states.

🏢 About Columbia University

Columbia University in the City of New York is a private Ivy League research university founded in 1754 (originally as King's College) and headquartered at the Morningside Heights campus in Manhattan with additional campuses including the Manhattanville campus, the medical center campus at Washington Heights, and a Syracuse, New York data center. Columbia enrolls more than 36,000 students across its undergraduate program, graduate schools, and professional schools including the Columbia Business School, the College of Physicians and Surgeons, the Mailman School of Public Health, the Columbia Law School, the Columbia Journalism School, and the Columbia Engineering school. As a major research university with extensive academic, administrative, healthcare, and alumni operations, Columbia maintains identity, contact, academic, financial, employment, applicant, alumni, and research-related records across multiple enterprise systems including its Student Information System (SIS), Active Directory authentication infrastructure, and VMware-based virtualization platforms across Manhattan and Syracuse data centers.

University | Higher education and research | Academic institution | USA
Private UniversityUSAcolumbia.edu

🗂 Why They Hold Your Data

Universities collect identity, contact, academic, financial, employment, applicant, alumni, and research-related records across education, healthcare, and administrative systems.

📰 Recent Developments

Columbia disclosed the breach on July 1, 2025 after initially characterizing the June 24, 2025 incident as a 'technical outage' or 'IT outage.' On July 2, 2025, a Columbia official publicly stated that the attack was perpetrated by a 'highly sophisticated' hacktivist with a 'political agenda' who broke in and stole 'targeted' student data. Columbia engaged a top cyber-forensics firm and reported no detected intrusions since June 24, 2025. The hacker subsequently provided tranches of the stolen data to Bloomberg News and The New York Times, both of which ran stories based on the stolen data including the Bloomberg report indicating that the dataset includes approximately 2.5 million admission applications dating to the late 1990s. State attorney general filings in California and Texas on August 7-8, 2025 disclosed approximately 345,746 affected individuals (with The Record citing 900,000 affected individuals based on a separate Columbia disclosure). The case sits within Columbia's broader political conflict with the Trump administration including a $400 million federal research funding freeze that the administration imposed citing concerns about Columbia's handling of pro-Palestine protests on campus and diversity programs.

🔍 Data Points Exposed

5 verified field types:
Social Security Number
Birthday
Email
Phone Number
Name

Exposure Categories

CredentialsSSN

State-Reported Affected Data Types

Name of individualAddressSocial Security Number InformationDriver’s License numberFinancial Information (e.g. account number, credit or debit card number)Medical InformationHealth Insurance InformationOtherDate of Birth

Canonical Fields

date_of_birth, email_address, full_name, phone_number, ssn

🌐 Dark Web Verification

Confirmed
  • Dataset containing ~346K records identified in breach intelligence sources
  • Data indexed and searchable across breach notification platforms
  • Source: columbia-university-2025

🛡 Recommended Actions

⚠️ Do not assume this is low sensitivity.

1Freeze Your Credit
Place a credit freeze with Equifax, Experian, and TransUnion.
2Expect Targeted Phishing
Watch for emails referencing this breach. Verify through official channels.
3Enable MFA Everywhere
Enable multi-factor authentication on all accounts.
4Monitor Accounts
Watch for unauthorized activity on financial and personal accounts.
5Check Your Exposure
ObscureIQ clients: this breach is indexed in your profile.

Protect Yourself

Check If You’re Affected

Enter your email to check if your data appears in this breach.

Get Free Breach Alerts

Be the first to know when new breaches are disclosed.

High-Risk? Get an Exposure Audit

Full-spectrum exposure audits for executives and public figures.

Request Consultation

ObscureIQ Advisory

We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.

If you are:
  • A public-facing individual
  • A high-profile executive
  • A customer of Columbia University
  • Or concerned about credential reuse
Services
AuditsWipesThreat MonitoringTraining

Classification Tags

MisconfigurationEducationEmailPhoneDOB

Powered by the ObscureIQ Breach Intelligence Database

© 2026 ObscureIQ · All Rights Reserved · Data Licensing

Latest from ObscureIQ

Credit

What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)

July 14, 2025
Every time there’s a major data breach, companies scramble to offer “free” credit monitoring. It sounds like a responsible move.…
breach economycredit freezecredit scoreequifaxexperian
Credible Threats

Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.

September 2, 2025
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars. Over 80% of security incidents now start in the browser. Chrome.…
brave browserbreachesbrowser exploitbrowserschrome
Analysis

Sextortion Spam

May 10, 2025
Sextortion scams aren’t new, but they remain one of the most effective forms of cyber-enabled fraud. These scams don’t rely…
bitcoindeadlinefeargoogle maps apiransom