Data allegedly stolen from Cincinnati State Technical and Community College has been leaked after Vice Society attacked the campus.

Many of the stolen documents were posted on the hackers’ websites. These documents date from several years ago until November 24, 2022, suggesting that threat actors still have access to the compromised systems, but this has not been confirmed. The leaked files contain personally identifiable information and can be accessed freely. 

Impact on College Resources

Earlier this month, Cincinnati State College notified its 10,000 students and 1,000 employees that they had suffered a cybersecurity attack. Campus officials warned that restoring online services and regular operations would take time.

Earlier this week, the university announced that some internet access, classroom computers, and on-campus email had been restored after the cyberattack. However, many online applications, registration portals, voicemail, network printing, VPN access, and other resources remain unavailable. 

For the time being, the college has posted FAQs to guide employees, current students, and new students on how to interact with the college administration. However, the disruption caused by the cyberattack remains significant for the college, as workarounds are not available for all services.

Vice Society 

There is a long history of Vice Society targeting educational institutions, ranging from K-12 schools to universities. Vice Society’s disproportionate targeting of schools and universities prompted the FBI to issue a warning in September.

Among Vice Society’s more recent victims was Los Angeles Unified (LAUSD), the second-largest school district in the country. However, Vice Society has also been associated with other attacks worldwide.

Related Posts - TKS Blog

TKS Newsletter - 2025 April
Here's our April 2025 Newsletter Read the full PDF version here: The TKS Sentinel - April Issue In this month's edition, we discuss: Fake Google Ads Insider...
Read more
TKS Newsletter - 2025 March
Here's our March 2025 Newsletter Read the full PDF version here: The TKS Sentinel - March Issue In this month's edition, we discuss: Cybersecurity Planning Microsoft Trashes...
Read more
failovers and failback strategyfailovers and failback strategy
Mastering Failover and Failback
Businesses face a constant threat of unexpected disruptions on a regular basis. Whether it's a cyberattack, natural disaster, or power outage, downtime can lead to...
Read more
what is your backup strategywhat is your backup strategy
The 3-2-1 Backup Strategy
Data loss can have a devastating impact on a business. Whether caused by cyberattacks, hardware failures, or natural disasters, losing critical information can lead to...
Read more

Used with permission from Article Aggregator