Friday, February 14, 2025
HomeCyber Security NewsLincoln College Closed its Doors after 157 Due to Recent Cyber Attack

Lincoln College Closed its Doors after 157 Due to Recent Cyber Attack

Published on

SIEM as a Service

Follow Us on Google News

Lincoln College is a private college in Lincoln, Illinois, United States, declared that it will be closing its doors because of a cascade of problems brought on by a recent cyberattack. It has been serving students from across the globe for more than 157 years.

According to the announcement published on the college website, “Lincoln College was a victim of a cyberattack in December 2021 that let down admissions activities and hindered access to all institutional data, creating an unclear picture of fall 2022 enrolment projections.”

The institution went through record-breaking student enrolment in fall 2019, with residence halls at maximum capacity.

Also, the coronavirus pandemic radically impacted recruitment and fundraising efforts, sporting events, and all campus life activities say the institution. Due to a decline in enrolment, the college was not able to sustain itself past the semester.

Lincoln College mentions that “The financial crisis initiated by the pandemic involved large investments in technology and campus safety measures, as well as a significant drop in enrolment with students choosing to postpone college or take a leave of absence, which impacted the institution’s financial position”.

The loss of history, careers and a community of students and alumni is immense”. — David Gerlach, president of Lincoln College.

Cyber Attack Hit College

The cyberattack, slowed down admissions and fundraising activities during this period when the college was already struggling.

 “All systems required for recruitment, retention, and fundraising efforts were inoperable. Fortunately, no personal identifying information was exposed. Once fully restored in March 2022, the projections displayed significant enrolment shortfalls, requiring a transformational donation or partnership to sustain Lincoln College beyond the current semester.”

Fund Raising Activities of the Institution

The institution worked hard to strengthen its financial position through fundraising campaigns, selling assets, consolidating employee positions, and exploring alternatives for the leased building in Normal.

A GoFundMe was recently launched, with the hopes of raising $20 million. However, the page had only earned 19 donations, totaling $1,252.

“You can’t get your admissions applications into the system, you can’t recruit students,” Lincoln’s president, David Gerlach, claiming that the attack put admissions activities “out of operation for a month and a half”.

Therefore, all these efforts did not create long-term possibilities for Lincoln College in the face of the pandemic.

Final Word

Schools and Colleges are natural targets for attacks, as they store large amounts of personal, academic, and financial information and institutions have a track record of low IT budgets and poor security practices, which can make them an easy victims.

Finally, Lincoln College promises that the Illinois State Board of Education will take over student transcripts and records for future needs. They ensure academic support and transitional services will be available to students through the remainder of the semester.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

WinZip Vulnerability Allows Remote Attackers to Execute Arbitrary Code

A newly discovered vulnerability in WinZip, a popular file compression and archiving utility, has...

New Microsoft Windows GUI 0-Day Vulnerability Actively Exploited in the Wild

A newly discovered vulnerability in Microsoft Windows, identified by ClearSky Cyber Security, is reportedly...

Burp Suite Professional / Community 2025.2 Released With New Built-in AI Integration

PortSwigger has announced the release of Burp Suite Professional and Community Edition 2025.2, introducing...

Arbitrary File Upload Vulnerability in WordPress Plugin Let Attackers Hack 30,000 Website

A subgroup of the Russian state-sponsored hacking group Seashell Blizzard, also known as Sandworm,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

WinZip Vulnerability Allows Remote Attackers to Execute Arbitrary Code

A newly discovered vulnerability in WinZip, a popular file compression and archiving utility, has...

New Microsoft Windows GUI 0-Day Vulnerability Actively Exploited in the Wild

A newly discovered vulnerability in Microsoft Windows, identified by ClearSky Cyber Security, is reportedly...

Burp Suite Professional / Community 2025.2 Released With New Built-in AI Integration

PortSwigger has announced the release of Burp Suite Professional and Community Edition 2025.2, introducing...