
Western New Mexico University (WNMU) has been grappling with a debilitating cyberattack since April 13, 2025, attributed to the Russian-speaking ransomware group Qilin. Internal emails obtained by Searchlight New Mexico confirm the university’s systems—including payroll, financial records, and email—remain compromised, while public statements describe the incident as “technical issues.” The attackers have threatened to leak sensitive employee data and network credentials unless a ransom is paid, mirroring Qilin’s double-extortion tactics observed in prior attacks on healthcare and media sectors1.
Attack Timeline and Technical Impact
The ransomware attack began on April 13, 2025, with Qilin encrypting WNMU’s website, internal databases, and administrative systems. By April 25, payroll disruptions left some employees unpaid, though third-party platforms like Canvas remained unaffected. The group’s ransom note, reviewed by DataBreaches.net, listed stolen data including Social Security numbers, driver’s licenses, and detailed network maps with credentials3. The FBI and New Mexico Higher Education Department are assisting with recovery, while the university has deployed Wi-Fi hotspots to mitigate disruptions to classes.
Qilin’s Modus Operandi and Historical Context
Qilin operates a ransomware-as-a-service model, demanding ransoms between $50,000 and $800,000 while leaking data regardless of payment1. The group previously targeted London hospitals in 2024 and Lee Enterprises in early 2025, exploiting unpatched vulnerabilities in public-facing applications. Notably, WNMU’s attack coincides with institutional instability following its president’s resignation in December 2024 and recent regent turnover. The U.S. Department of Homeland Security had awarded New Mexico $4 million in 2024 for cybersecurity upgrades, but WNMU’s systems were evidently not prioritized4.
Response and Mitigation Strategies
WNMU’s incident response team, aided by external cybersecurity firms, has focused on isolating infected systems and restoring backups. The attack underscores the need for:
- Regular vulnerability assessments of public-facing infrastructure
- Segmentation of critical systems (e.g., payroll from general IT networks)
- Strict access controls for sensitive data repositories
New Mexico’s Higher Education Department has urged statewide institutions to audit their defenses, particularly against Qilin’s known tactics like exploiting weak RDP configurations and phishing campaigns2.
Broader Implications for Higher Education
The WNMU attack highlights systemic vulnerabilities in higher education, where budget constraints often delay security upgrades. Similar incidents, such as the 2023 breach at Manchester Metropolitan University, reveal a pattern of threat actors targeting underfunded IT departments. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has since reiterated guidance for educational institutions to adopt multi-factor authentication and endpoint detection tools4.
As of April 27, WNMU has not confirmed whether data was exfiltrated or if negotiations with Qilin are underway. The university’s recovery efforts may set a precedent for how small institutions respond to advanced ransomware threats.
References
- “Russian-linked hackers cripple WNMU systems,” Searchlight New Mexico, Apr. 27, 2025.
- “Qilin ransomware targets New Mexico university,” Yahoo News, Apr. 27, 2025.
- “WNMU data leak threatened by Qilin,” DataBreaches.Net, Apr. 27, 2025.
- “Cybersecurity crisis at WNMU,” Silver City Daily Press, Apr. 24, 2025.
- “Qilin Threat Profile,” U.S. HHS, 2024.
- “State and Local Cybersecurity Grant Program,” CISA, 2024.