1.24 million
The University of Hawaiʻi (UH) Cancer Center has publicly disclosed a significant data breach resulting from a ransomware attack detected on August 31, 2025. The incident compromised servers in the center's Epidemiology Division, exposing the sensitive personal data of approximately 1.24 million individuals. The compromised information includes decades of research data, such as Social Security numbers, driver's license numbers from around the year 2000, and 1998 voter registration records. Notably, the university confirmed it made the decision to pay the ransom to the unidentified threat actors to receive a decryption key and an assurance that stolen data would be deleted. This event highlights the difficult decisions faced by victim organizations and the long-tail risks associated with historical research data.
On August 31, 2025, an unidentified ransomware group successfully attacked and encrypted servers within the UH Cancer Center's Epidemiology Division. A subsequent forensic investigation revealed the potential exposure of data for 1.24 million people. The breach did not affect active patient care systems or student records.
The compromised data is highly sensitive and historical in nature:
The decision to pay the ransom is a contentious one. While it may have been seen as the only way to recover the encrypted research data, it provides no guarantee that the attackers actually deleted the exfiltrated copies. Victims remain at high risk.
While the specific ransomware variant was not named, the attack pattern is consistent with modern ransomware operations.
Likely MITRE ATT&CK Techniques:
T1566 - Phishing, exploiting a vulnerable public-facing application (T1190 - Exploit Public-Facing Application), or brute-forcing remote services like RDP (T1110 - Brute Force).T1018 - Remote System Discovery).T1213 - Data from Information Repositories.T1041 - Exfiltration Over C2 Channel.T1486 - Data Encrypted for Impact.The payment of the ransom is a critical detail. It emboldens threat actors and funds their future operations. Furthermore, the 'affirmation' of data destruction from a criminal group is unreliable and should not be trusted. All exposed data must be considered permanently compromised.
No specific Indicators of Compromise (IOCs) were provided in the source articles.
| Type | Value | Description |
|---|---|---|
| log_source | VPN/Remote Access Logs | Monitor for logins from unusual geographic locations or multiple failed login attempts followed by a success. |
| process_name | powershell.exe |
Look for suspicious PowerShell execution, especially encoded commands or those used for network reconnaissance or downloading tools. |
| file_name | Files with new, unknown extensions | The most obvious sign of an active ransomware infection is files being renamed with a specific extension (e.g., .locked, .crypted). |
| network_traffic_pattern | RDP traffic to non-standard ports | Attackers may use tools to scan for open RDP ports or tunnel RDP over other protocols to evade detection. |
Detection:
File Content Rules to flag suspicious file changes.Response:
Strategic Mitigations:
Tactical Mitigations:
Isolate sensitive research data in a secure enclave with strict access controls to prevent unauthorized access from other parts of the network.
Mapped D3FEND Techniques:
Implement data minimization and secure archiving policies to reduce the amount of sensitive PII stored on live production systems.
Use modern EDR/XDR solutions with behavioral detection to identify and block ransomware activity before it can cause widespread damage.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats