CRITICAL SEVERITYEducation

University of California Data Breach

Verified by ObscureIQ Intelligence

9.0Severity
547KRecords
10Data Fields
2020Year

Impact & Downstream Threats

This breach carries critical risk due to the nature of exposed data fields and the scale of affected records.

Primary downstream threats:
  • Identity theft and synthetic identity construction using government-issued IDs
  • Identity verification bypass using name + date of birth combination
  • SIM swap attacks where phone numbers are present
  • Targeted phishing campaigns using exposed email addresses
  • Doxxing risk from physical address exposure
  • Employment-based social engineering using job and employer data

Breach Intelligence

EntityUniversity of California
OrganizationPublic University • United States
Breach DateDecember 2020
DisclosureJune 2021
Records Exposed~547K
Attack VectorMisconfiguration
SourceHave I Been Pwned / ObscureIQ intelligence
StatusConfirmed

Executive Summary

In December 2020, the University of California suffered a data breach due to vulnerability in in a third-party provider, Accellion. The breach exposed extensive personal data on both students and staff including 547 thousand unique email addresses, names, dates of birth, genders, social security numbers, ethnicities and other academic related data attributes. Further analysis is available in Exploring the Impact of the UC Data Breach. The data was provided to HIBP courtesy of Cyril Gorlla.

About University of California

Public university system in California.

Public UniversityUnited Statesuniversityofcalifornia.edu

Data Points Exposed

Verified fields in the released dataset:
Dates of birth
Education information
Email addresses
Ethnicity / race
Full names
Gender
Job / occupation
Phone numbers
Physical addresses

Dark Web Verification

Status: Confirmed

  • Dataset containing approximately 547K records identified in breach intelligence sources.
  • The data is indexed and searchable across breach notification platforms.

Recommended Actions

⚠️ Do not assume this is low sensitivity.

Expect Targeted Phishing
Watch for emails referencing this breach. Verify communications through official channels.
Secure Email & Enable MFA
Email compromise is often the first pivot point. Enable multi-factor authentication.
Monitor Financial Accounts
Watch for unauthorized credit applications and suspicious activity.
Check Your Exposure
ObscureIQ clients: this breach is indexed in your profile.
Non-clients may request a breach impact review.

Frequently Asked Questions

What happened in the University of California data breach?

In December 2020, University of California experienced a data breach that exposed approximately 547K records containing personal information.

What data was exposed?

The exposed data includes fields such as date of birth, education information, email address, ethnicity or race:ethnicity, full name.

How many records were affected?

Approximately 547K records were affected based on current breach intelligence.

Protect Yourself

Check If You’re Affected

Enter your email to check if your data appears in this breach.

Get Free Breach Alerts

Be the first to know when new breaches are disclosed.

High-Risk? Get an Exposure Audit

Full-spectrum exposure audits for executives and public figures.

Request Consultation

ObscureIQ Advisory

We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.

If you are:
  • A public-facing individual
  • A high-profile executive
  • A customer of University of California
  • Or concerned about credential reuse
Services
AuditsWipesThreat MonitoringTraining

Classification Tags

MisconfigurationEducationEmailPhoneAddressDOB

Powered by the ObscureIQ Breach Intelligence Database

© 2026 ObscureIQ · All Rights Reserved · Data Licensing

Latest from ObscureIQ

Credit

What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)

July 14, 2025
Every time there’s a major data breach, companies scramble to offer “free” credit monitoring. It sounds like a responsible move.…
breach economycredit freezecredit scoreequifaxexperian
Credible Threats

Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.

September 2, 2025
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars. Over 80% of security incidents now start in the browser. Chrome.…
brave browserbreachesbrowser exploitbrowserschrome
Analysis

Sextortion Spam

May 10, 2025
Sextortion scams aren’t new, but they remain one of the most effective forms of cyber-enabled fraud. These scams don’t rely…
bitcoindeadlinefeargoogle maps apiransom