The hacker allegedly acquired the data from three different US healthcare organisations.
Security researchers note that the new Dridex campaign has evolved to better target more victims.
It is unclear how hackers accessed the university's systems and why the passwords leaked are in cleartext.
It is suspected the hackers had inside knowledge of the loyalty scheme, law enforcement claim.
The botnet now comes with modifications designed to deter detection
Experts analysing the breach have found evidence that weak security practices aided the hackers.
The cyberattacks coincide with the 30-day Operation Icarus campaign orchestrated by hacking group Anonymous.
The hackers also defaced the FRF's site for the Romanian Football Cup.
"You can't arrest a lizard," AppleJ4ck told IBTimes UK.
UK government to bolster ICO capabilities with fines on firms that fail to protect data.
There is no information on whether users' personal information was compromised or not in the cyberattak.
A cyber defence strategy is more important than ever before - yet Nato is reportedly underprepared for attack
No serious disruption or damage has yet been caused by such critical infrastructure hacks.
The hacker, who was arrested in Malaysia in 2015, said in court he did not know why he did it.
The 16-year-old student breached websites in 87 separate countries, the Seoul Metropolitan Police revealed.
Purchasing access to a server located in an EU government network can cost as little as $6.
Ghost Squad Hackers claim to be targeting both Clinton and Trump's presidential campaigns.
The cyberattack resulted in the theft of over 4,000 valid passport numbers, the JTB Corp disclosed
Malware was likely sent from a compromised email belonging to another nation's ministry of foreign affairs
VerticalScope, which runs the forums, acknowledged the breach.
Analysis suggests the hackers had access to the DNC's computer networks for over a year.
Ash Carter launched 'Hack the Pentagon' and 100 flaws have been found in its defence systems so far.