Executive Summary

In August 2025, the University of Hawaii Cancer Center experienced a ransomware incident that resulted in threat actors encrypting systems associated with a specific research project. The intrusion led to the exfiltration and encryption of files, some of which dated back to the 1990s and included research participant data containing Social Security numbers, predating modern de-identification practices. While only research files and not clinical or patient treatment data were affected, the disruption necessitated a comprehensive remediation effort including system replacements, forensic investigations, ransomware payment for decryption, and negotiations for deletion of exfiltrated information.

This incident underscores the targeting of higher-education and research organizations by ransomware attackers seeking both data and financial gain. With universities increasingly storing decades-old PII, and ransomware groups escalating both exfiltration and extortion, the breach exemplifies the urgency of robust detection, legacy data management, and compliance disciplines in the education and research sector.

Why This Matters Now

The University of Hawaii Cancer Center breach highlights persistent vulnerabilities in research environments, especially related to legacy data containing sensitive PII. As ransomware operators continue to target under-protected sectors, academic organizations face urgent pressure to modernize security controls, enhance east-west security, and ensure historical records are safeguarded against evolving extortion tactics.

Attack Path Analysis

MITRE ATT&CK® Techniques

Potential Compliance Exposure

Sector Implications

Sources

Frequently Asked Questions

The breach exposed research project files, including some from the 1990s containing Social Security numbers of research participants, but did not impact clinical or patient treatment records.

Cloud Native Security Fabric Mitigations and ControlsCNSF

The incident demonstrates how segmentation, east-west traffic security, egress policy enforcement, and real-time anomaly detection—core CNSF and zero trust controls—could have restricted attacker movement, detected abnormal behavior, and minimized data loss during each kill chain stage.

Initial Compromise

Control: Cloud Native Security Fabric (CNSF)

Mitigation: Real-time inline policy enforcement would block unauthorized initial access.

Privilege Escalation

Control: Zero Trust Segmentation

Mitigation: Identity-based segmentation limits privilege expansion to only necessary resources.

Lateral Movement

Control: East-West Traffic Security

Mitigation: Unapproved east-west movement is detected and blocked between sensitive workloads.

Command & Control

Control: Threat Detection & Anomaly Response

Mitigation: Anomalous outbound traffic patterns trigger alerts for timely incident response.

Exfiltration

Control: Egress Security & Policy Enforcement

Mitigation: Exfiltration attempts are blocked or closely monitored based on strict outbound policy.

Impact (Mitigations)

Broad operational visibility accelerates incident response and limits ransomware effects.

Impact at a Glance

Affected Business Functions

  • Research Operations
Operational Disruption

Estimated downtime: 30 days

Financial Impact

Estimated loss: $500,000

Data Exposure

Personal information, including Social Security numbers from the 1990s, of cancer study participants was accessed and potentially exfiltrated.

Recommended Actions

  • Deploy zero trust segmentation and microsegmentation to limit lateral movement between research networks and legacy data stores.
  • Enforce granular egress policies and outbound filtering to block data exfiltration attempts by unauthorized processes or users.
  • Implement comprehensive east-west traffic inspection to detect and stop lateral pivoting by threat actors within internal environments.
  • Integrate real-time threat detection and anomaly response to rapidly discover and contain ongoing attacks before data theft or encryption can occur.
  • Continuously audit and monitor all cloud, on-prem, and hybrid infrastructures for policy drift or unauthorized changes affecting sensitive workloads.

Secure the Paths Between Cloud Workloads

A cloud-native security fabric that enforces Zero Trust across workload communication—reducing attack paths, compliance risk, and operational complexity.

Cta pattren Image