- Nyu -Websted was recently exercised to show data claimed racism at university
- The files exposed sensitive information about millions of students
- The university’s IT team diminished the attack within three hours
A hacking group that calls itself “Computerniggy Utilization” has hit the New York University (NYU) site in an attempt to postpone the university’s alleged racism – but has also exposed sensitive information about millions of NYU applicants.
The Nyu site was practiced, and instead of the usual website, three charts showing what the group claims to be Nyus’s average that was admitted to SAT scores, ACT scores and GPAs for the cycle of 2024-2025.
The group recalled that the Supreme Court killed “affirmative action” back in 2023, but NYU “continued anyway” and that the data shows that the average admitted test results and GPAs for Asian and Caucasian applicants were higher, compared to Latin American and black applications.
Sensitive data leaks
Affirmative action is a policy designed to promote opportunities for historically marginalized groups, especially in education and employment, by considering factors such as race or gender in admission and employment decisions.
In the United States, the Supreme Court effectively ended racing-based affirmative action in college recordings on June 29, 2023 with its decision in students for Fair Admissions v. Harvard and students for FAIR Admissions against the University of North Carolina.
But here it gets even worse. The four CSV files available on the site revealed NYU recording data since 1989, including 3 million admitted students’ applications, demographic data, city, postal codes and citizenship. In addition, the CSVs also showed ordinary application data with information such as rejected students, financial support, early decision -making students and information about siblings and parents.
The post Says the group tried to edit the files so that the students could not be identified but failed according to Zack Ganot, one of the people who runs Databreach.com. Full names, addresses, phone numbers, average average, e -mail addresses, were all exposed.
Ganot uploaded the database to its platform so students could check if their information was leaking. More details can be found here.
The administration lasted for about two hours, after which the university’s IT team managed to regain control.