1.24 million
The University of Hawaiʻi (UH) Cancer Center has publicly disclosed a significant data breach resulting from a ransomware attack detected on August 31, 2025. The incident compromised servers in the center's Epidemiology Division, exposing the sensitive personal data of approximately 1.24 million individuals. The compromised information includes decades of research data, such as Social Security numbers, driver's license numbers from around the year 2000, and 1998 voter registration records. Notably, the university confirmed it made the decision to pay the ransom to the unidentified threat actors to receive a decryption key and an assurance that stolen data would be deleted. This event highlights the difficult decisions faced by victim organizations and the long-tail risks associated with historical research data.
On August 31, 2025, an unidentified ransomware group successfully attacked and encrypted servers within the UH Cancer Center's Epidemiology Division. A subsequent forensic investigation revealed the potential exposure of data for 1.24 million people. The breach did not affect active patient care systems or student records.
The compromised data is highly sensitive and historical in nature:
The decision to pay the ransom is a contentious one. While it may have been seen as the only way to recover the encrypted research data, it provides no guarantee that the attackers actually deleted the exfiltrated copies. Victims remain at high risk.
While the specific ransomware variant was not named, the attack pattern is consistent with modern ransomware operations.
Likely MITRE ATT&CK Techniques:
T1566 - Phishing, exploiting a vulnerable public-facing application (T1190 - Exploit Public-Facing Application), or brute-forcing remote services like RDP (T1110 - Brute Force).T1018 - Remote System Discovery).T1213 - Data from Information Repositories.T1041 - Exfiltration Over C2 Channel.T1486 - Data Encrypted for Impact.The payment of the ransom is a critical detail. It emboldens threat actors and funds their future operations. Furthermore, the 'affirmation' of data destruction from a criminal group is unreliable and should not be trusted. All exposed data must be considered permanently compromised.
No specific Indicators of Compromise (IOCs) were provided in the source articles.
powershell.exe.locked, .crypted).Detection:
File Content Rules to flag suspicious file changes.Response:
Strategic Mitigations:
Tactical Mitigations:
UH confirms full impact of 2025 ransomware attack, explicitly stating data exfiltration of 1.2M records, including driver's licenses and voter data.
Isolate sensitive research data in a secure enclave with strict access controls to prevent unauthorized access from other parts of the network.
Mapped D3FEND Techniques:
Implement data minimization and secure archiving policies to reduce the amount of sensitive PII stored on live production systems.
Use modern EDR/XDR solutions with behavioral detection to identify and block ransomware activity before it can cause widespread damage.
Mapped D3FEND Techniques:
Some of the compromised data, such as voter registration records, dates back to 1998.
The ransomware attack was first detected by the UH Cancer Center.
The university publicly discloses the breach and begins mailing notification letters.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.