Dartmouth College Data Breach
Dartmouth College Ivy League University Breach (2025): 163K Records Including SSN Exposed
Private Ivy League research university.
Risk Interpretation
High risk of phishing, identity theft, payroll or tuition fraud, and targeting of research or donor relationships. University data also often includes young adults and long-lived alumni identities.
Impact & Downstream Threats
The institutional impact on Dartmouth has been significant given the SSN-and-financial-data exposure of approximately 35,000 to 40,000 individuals. Dartmouth incurred costs associated with forensic investigation by an outside firm, multi-state attorney general filings, individualized victim notification across multiple states, and the provision of one year of complimentary Experian credit monitoring and identity theft protection services. Class-action litigation has been initiated by plaintiffs'
- Identity theft and synthetic identity construction using government-issued IDs
- SIM swap attacks where phone numbers are present
- Targeted phishing campaigns using exposed email addresses
Threat Vectors
Breach Intelligence
Executive Summary
Dartmouth College, a private Ivy League research university, suffered a data breach during a three-day window from August 9 to August 12, 2025 when the Cl0p ransomware gang (also known as TA505) exploited a zero-day vulnerability in Oracle's E-Business Suite software (CVE-2025-61882) to access Dartmouth's enterprise resource planning system and exfiltrate files containing personal information. Oracle disclosed the underlying vulnerability and released security patches in early October 2025. Dartmouth subsequently launched an internal investigation, identified the impacted data on October 30, 2025, and began notifying affected individuals through letters mailed in late November 2025 with state attorney general filings on November 24, 2025. Cl0p formally claimed responsibility for the Dartmouth breach on its dark-web data leak site on November 11, 2025, with the attackers leaking approximately 226 gigabytes of stolen Dartmouth data after Dartmouth declined to pay ransom.
The breach affected approximately 35,000 to 40,000 individuals based on combined state attorney general filings (with DataBreach.com reporting approximately 163,306 rows of data, reflecting the underlying file content rather than the count of affected individuals). Compromised fields included full names, Social Security numbers, financial account information including bank account details, email addresses, phone numbers, and ZIP codes. The affected population included current and former Dartmouth students (including student-employees), faculty, staff, and other individuals whose information was processed through Dartmouth's Oracle E-Business Suite platform. The exposure of SSN combined with bank account information represents an exceptionally high-risk data combination because it directly enables both identity theft and ACH-fraud (unauthorized direct withdrawal from compromised bank accounts).
For affected individuals, the practical risk profile is exceptionally severe due to the combination of SSN exposure with bank account data. Affected individuals should enroll in the complimentary Experian credit monitoring and identity theft protection services offered by Dartmouth before the February 28, 2026 enrollment deadline. Affected individuals should also consider placing a credit freeze with all three credit bureaus (Equifax, Experian, and TransUnion), which is more protective than credit monitoring alone because it prevents new accounts from being opened in the affected individual's name. The SSN exposure at a university is distinctively concerning because students often do not actively monitor their credit during their studies (because they have no mortgage, car loan, or other large account that would trigger credit-bureau alerts), making student-victim populations especially vulnerable to silent identity-fraud accumulation that may not be apparent until after graduation. Affected individuals should monitor their bank accounts daily for unauthorized ACH withdrawals, request replacement bank account numbers from their financial institution if any unusual activity is detected, and remain alert to phishing or impersonation attempts referencing real Dartmouth-association details. Class-action litigation is available for affected individuals seeking compensation. Affected individuals may also file complaints with state attorneys general in New Hampshire, Vermont, Maine, Texas, or other applicable states.
About Dartmouth College
Dartmouth College is a private Ivy League research university located in Hanover, New Hampshire and founded in 1769, making it one of the oldest institutions of higher education in the United States. Dartmouth enrolls approximately 6,700 students across its undergraduate liberal arts program, the Geisel School of Medicine, the Thayer School of Engineering, the Tuck School of Business, and various graduate programs. The institution employs approximately 4,000 faculty and staff and maintains substantial alumni records dating back centuries. As a research university with extensive administrative, academic, financial, and alumni operations, Dartmouth maintains identity, contact, financial, academic, employment, and donor records across multiple integrated enterprise systems including the Oracle E-Business Suite platform that handles financial management, human resources, and administrative workflows for the institution.
Why They Hold Your Data
Universities collect student, staff, faculty, alumni, applicant, donor, and research-linked identity, contact, financial, academic, and employment records across education and administration systems.
Recent Developments
Dartmouth disclosed the breach to affected individuals through letters mailed in late November 2025 and through state attorney general filings in New Hampshire (31,742 residents), Vermont (more than 12,700 residents), Maine (at least 1,494 residents), and Texas. Interim Chief Information Officer Tom DeChiaro circulated a campus-wide email on December 16, 2025 acknowledging the incident and encouraging affected individuals to enroll in the complimentary Experian credit monitoring and identity theft protection services offered by the institution (with an enrollment deadline of February 28, 2026). Dartmouth has emphasized that the breach was the result of a zero-day vulnerability in Oracle's E-Business Suite software (CVE-2025-61882) rather than a phishing attack or other action by Dartmouth personnel, and that Dartmouth has implemented all available Oracle security patches and established a hotline for affected individuals. The case is part of the broader Cl0p ransomware gang campaign that has compromised more than 100 organizations globally including Harvard University, the University of Pennsylvania, and Cox Enterprises.
Data Points Exposed
Exposure Categories
State-Reported Affected Data Types
Canonical Fields
email_address, full_name, phone_number, postal_code, ssn
Dark Web Verification
- Dataset containing ~163K records identified in breach intelligence sources
- Data indexed and searchable across breach notification platforms
- Source: dartmouth-edu-2025
Recommended Actions
⚠️ Do not assume this is low sensitivity.
Protect Yourself
Check If You’re Affected
Enter your email to check if your data appears in this breach.
Get Free Breach Alerts
Be the first to know when new breaches are disclosed.
High-Risk? Get an Exposure Audit
Full-spectrum exposure audits for executives and public figures.
ObscureIQ Advisory
We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.
- A public-facing individual
- A high-profile executive
- A customer of Dartmouth College
- Or concerned about credential reuse
Powered by the ObscureIQ Breach Intelligence Database
© 2026 ObscureIQ · All Rights Reserved · Data Licensing
Latest from ObscureIQ
What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.
Sextortion Spam
