December 7, 2022 By Jonathan Reed 2 min read

Over 2.5 million student loan accounts were breached in the summer of 2022, according to a recent Maine Attorney General data breach notification. The target of the breach was Nelnet Servicing, a servicing system and web portal provider for the Oklahoma Student Loan Authority (OSLA) and EdFinancial.

An investigation determined that intruders accessed student loan account registration information between June and July 2022. The stolen data includes names, addresses, emails, phone numbers and social security numbers for 2,501,324 student loan account holders. According to Nelnet, the breach did not expose users’ financial information. At this time, it’s unclear exactly how the breach occurred or who was behind the attack.

News of the breach states that the OSLA security team blocked suspicious activity and launched an investigation with forensic experts. The lender has also notified law enforcement agencies. Some are concerned about the future implications of this incident for student loanees.

Potential future threat to student loan holders

In August 2022, President Biden announced a massive student loan relief plan. This plan impacts millions of borrowers. While the program itself remains stalled in appeals court, the information stolen in the OSLA / Nelnet breach could still take advantage of the loan forgiveness plan. For example, actors could use the stolen emails to contact unsuspecting loan holders. Through social engineering or phishing scams, borrowers could be duped by nefarious actors. The schemes could also be used to access bank accounts or other sensitive data.

Was it a credential hack?

While the exact details of the OSLA breach are still unclear, the breach did involve the Nelnet web portal. This suggests that stolen credentials may have provided access. This continues to be one of the most common ways intruders breach systems. Given that so much work occurs remotely and in the cloud, securing networks is more challenging than ever.

The reality is that these types of attacks are all too common. According to one report, 83% of surveyed organizations have had more than one data breach. Also, 45% of the incidents studied were cloud-based. Meanwhile, the average total cost of a data breach has reached $4.35 million.

Security against data breaches

Today’s realities, such as cloud and remote work, have driven the development of new access security solutions. One example is single sign-on which provides centralized access control, strong authentication and user self-service. Additional security layers, such as multifactor authentication or passwordless access, can also be applied to data and applications.

Another powerful security tool is adaptive access, which continuously evaluates user risk for higher accuracy. This method uses machine learning and AI to analyze key parameters, such as user, device, activity, environment and behavior. This is how adaptive access leverages context to determine holistic risk scores. The analysis drives more accurate, contextual authentication decisions to strengthen security.

The OSLA / Nelnet breach was not an isolated event. These incidents are all too common. Organizations should take measures to provide themselves and their customers with adequate protection.

More from Data Protection

Communication platforms play a major role in data breach risks

4 min read - Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools.When it comes to cybersecurity, communicating means more than just talking to another person; it includes any activity where you are transferring data from one point online to another. Companies use a wide range of different types of tools to communicate, including email,…

SpyAgent malware targets crypto wallets by stealing screenshots

4 min read - A new Android malware strain known as SpyAgent is making the rounds — and stealing screenshots as it goes. Using optical character recognition (OCR) technology, the malware is after cryptocurrency recovery phrases often stored in screenshots on user devices.Here's how to dodge the bullet.Attackers shooting their (screen) shotAttacks start — as always — with phishing efforts. Users receive text messages prompting them to download seemingly legitimate apps. If they take the bait and install the app, the SpyAgent malware gets…

Exploring DORA: How to manage ICT incidents and minimize cyber threat risks

3 min read - As cybersecurity breaches continue to rise globally, institutions handling sensitive information are particularly vulnerable. In 2024, the average cost of a data breach in the financial sector reached $6.08 million, making it the second hardest hit after healthcare, according to IBM's 2024 Cost of a Data Breach report. This underscores the need for robust IT security regulations in critical sectors.More than just a defensive measure, compliance with security regulations helps organizations reduce risk, strengthen operational resilience and enhance customer trust.…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today