Data breach reported for Chapel Hill Presbyterian Church

UpGuard Team
UpGuard Team
March 24, 2026

Key facts: Chapel Hill Church data breach

  • Date reported: March 23, 2026.
  • Unauthorized access identified: January 30, 2026.
  • Target entity: Chapel Hill Church (chapelhillpc.org).
  • Source of breach: Unknown, unauthorized third-party.
  • Data types: Not detailed/disclosed.
  • Status: Confirmed; official notice letters issued to 1,000 individuals.
  • Severity: Medium; confirmed exposure of personal information and disrupted systems.

What happened in the Chapel Hill Church data breach?

Chapel Hill Church (chapelhillpc.org) reported a data breach incident on March 23, 2026. The organization identified an external system breach that initially occurred on January 30, 2026, and was discovered nearly a month later on February 26, 2026. No specific threat actor has been publicly identified in connection with the event, though the incident involved unauthorized access to the church's digital infrastructure.

The breach disrupted access to certain systems and resulted in unauthorized access to information pertaining to approximately 1,000 individuals. While the specific categories of data were not detailed in the official notification, the incident is classified as medium severity due to the confirmed exposure of personal information. Such incidents typically carry risks of targeted phishing or unauthorized account access if sensitive identifiers or contact details were among the accessed data.

Who is behind the incident?

The attacker or cause of the incident has not been identified.

Impact and risks for Chapel Hill Church customers

For those associated with Chapel Hill Church, the primary risks involve potential social engineering or phishing attempts. If contact information or personal identifiers were accessed, individuals might receive deceptive communications designed to solicit further sensitive data or login credentials. There is also a risk of credential abuse if the breached systems contained information related to user accounts or shared passwords.

Organizations often face reputational challenges and operational disruptions following such disclosures. Impacted individuals should monitor their accounts for suspicious activity and consider updating passwords for any services linked to the church. Proactive transparency from the organization helps mitigate long-term identity theft risks and encourages timely protective action from the affected community.

How to protect against similar security incidents

Following the external system breach at Chapel Hill Church, affected individuals should take immediate steps to secure their personal information and digital accounts.

  • Enable multi-factor authentication. Implement phishing-resistant multi-factor authentication (MFA) on all sensitive accounts, including email and financial services. This provides a critical layer of security even if login credentials have been compromised during the breach.
  • Monitor for suspicious communications. Be alert for unsolicited emails, text messages, or phone calls requesting personal information or payment. Verify the identity of any sender claiming to be from Chapel Hill Church before clicking links or downloading attachments.
  • Implement account monitoring. Regularly review financial statements and credit reports for unauthorized transactions or new accounts. Using a credit monitoring service can provide automated alerts for suspicious changes to your credit profile.
  • Adopt continuous security monitoring. Organizations should utilize attack surface management tools to identify and secure vulnerable external-facing systems. Continuous monitoring helps detect unauthorized access attempts before they escalate into full-scale data breaches.

Taking these proactive measures can significantly reduce the risk of secondary attacks following a data exposure.

Frequently asked questions

What happened in the Chapel Hill Church security breach?

On March 23, 2026, Chapel Hill Church (chapelhillpc.org) disclosed a security breach. According to initial reports, an external system breach occurred on January 30, 2026, which disrupted access to systems and allowed unauthorized access to information belonging to 1,000 individuals.

When did the Chapel Hill Church breach occur?

The Chapel Hill Church breach was publicly reported on March 23, 2026. The initial unauthorized access took place on January 30, 2026, and was discovered by the organization on February 26, 2026.

What data was exposed?

The types of data involved in the Chapel Hill Church incident have not been disclosed. This page will be updated as verified information becomes available.

Is my personal information at risk?

If you interacted with Chapel Hill Church, there's a possibility your personal information could be affected. Similar incidents often involve email addresses, login details, or financial records. Stay alert for updates and take precautionary measures to secure your accounts.

How can I protect myself after a data breach?

• Change passwords for accounts associated with the organization
• Enable multi-factor authentication (MFA) wherever possible
• Monitor your financial accounts for unauthorized activity
• Watch for phishing emails or suspicious communications
• Use breach monitoring tools to track your data exposure

What steps should companies take after being breached?

Chapel Hill Church has taken steps to secure its systems and has sent written notifications to the 1,000 individuals impacted by the breach. Organizations in this position typically review security protocols and may deploy attack surface management to prevent future incidents.

This cybersecurity news article is powered by UpGuard Breach Risk — continuous attack surface monitoring for your organisation and supply chain.

How secure is ?

  • Check icon
    View our free preliminary report on ’s security posture
  • Check icon
    13 risk factors, including email security, SSL, DNS health, open ports and common vulnerabilities
Security ratings
Deliver icon

Sign up for our newsletter

UpGuard's monthly newsletter cuts through the noise and brings you what matters most: our breaking research, in-depth analysis of emerging threats, and actionable strategic insights.
UpGuard customer support teamUpGuard customer support teamUpGuard customer support team

Protect your organization

Get in touch or book a free demo.
Free instant security score

How secure is your organization?

Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
  • Check icon
    Instant insights you can act on immediately
  • Check icon
    Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities
Website Security scan resultsWebsite Security scan rating