Accelerated by:


Copyright © 2025 Apollo Cybersecurity

Recently the National Autonomous University of Mexico (UNAM) confirmed to have suffered a cyberattack that affected five of its computer systems during the holiday period at the end of the year, activating response protocols and raising concerns about data protection and the resilience of institutions with enormous digital infrastructures. This incident, the subject of extensive coverage in national and international media, highlights that even large educational organizations are targets of sophisticated computer threats.
The UNAM reported that, between December 31, 2025 and January 1, 2026, it detected a unauthorized intrusion into five of its more than 100,000 computer systems, belonging to different units and services of the university.
After the incident was detected, the General Directorate of Computing and Information and Communication Technologies (DGTIC) activated the institutional protocols for dealing with computer security incidents, including the preventive immobilization of compromised servers and coordination with authorities to file the corresponding complaints with the Office of the Attorney General of the Republic (FGR).
Although the UNAM assured that there is no evidence of extraction or filtration of personal data of students, teachers or administrative staff in these five specific systems, the initial disclosure of the hack has sparked debate and various media versions, including research that suggests the exposure of emails, encrypted passwords, enrollment numbers and other sensitive data.
Modern universities aren't just educational institutions; they are complex digital ecosystems who manage large volumes of personal data, intellectual property, research and critical services for thousands of users. This makes them attractive objectives for cybercriminals and actors with diverse motivations (from data theft to reputation or internal information leak).
While the official version minimizes data leakage, several news reports indicate that improper access could have allowed attackers to obtain information that includes institutional emails, passwords (albeit encrypted), financial receipts and internal communications. These differences between public versions and independent reports highlight the importance of transparency and detailed technical analysis after a security incident.
The attack was detected during a vacation period, which is usually a window of opportunity for attackers due to reduced operational oversight. This highlights the need for continuous monitoring, independence of key resources and robust access control, especially in large scale infrastructures such as those of a university.
Un cyberattack is defined as any offensive action aimed at compromising the confidentiality, integrity or availability of systems, networks or data, for malicious purposes such as information theft, interruption of services or unauthorized access.
Attacks on institutions with a high density of data and digitized services may involve:
The complexity of these vectors requires a multilayered defense that combines technology, processes and coordinated response.
Although many attacks on universities seem “public”, the impact can extend to private organizations and the business sector:
If users use the same passwords in external or corporate environments, a gap in an education system can facilitate access to business assets.
Companies that collaborate with universities can be involved if their systems are connected or if they manage shared services.
If an attack compromises systems that interact with other services or providers, it can trigger cascading effects across a company's entire digital chain.
Faced with incidents such as the UNAM hack, organizations should consider:
El Cyberattack on the UNAM it is not only a wake-up call for educational institutions but for all organizations with valuable digital assets. The convergence of personal data, critical services and sophisticated threat vectors requires a comprehensive approach to security that combines technology, organizational culture and operational resilience.
These types of threats reinforce the need to consider the enterprise IT security as a strategic business pillar, not only as an element of technical protection.
In Apollo Cybersecurity we support companies to:
If you want to understand How an incident like the one at the UNAM could affect your organization and what are the best practices to reinforce your security, we can help you design a preventive strategy aligned with your business objectives.
Contact Apolo Cybersecurity and strengthens your defense against increasingly sophisticated cyberattacks.
.webp)