Group Says it Hacked Systems at 100 Major Universities

A hacking group that calls itself Team GhostShell this week claimed credit for breaking into servers at 100 major universities from around the world, including Harvard, Stanford, the University of Pennsylvania and the University of Michigan.

By
Wed, October 03, 2012

Computerworld — A hacking group that calls itself Team GhostShell this week claimed credit for breaking into servers at 100 major universities from around the world, including Harvard, Stanford, the University of Pennsylvania and the University of Michigan.

Slideshow: Anonymous, LulzSec, AntiSec, Etc.: A Brief History of Hacktivism

In a message posted on Pastebin, the group said it accessed and publicly posted about 120,000 records from the breached servers.

The group, which recently claimed creditfor several major hacking incidents, said it attacked the university systems to focus attention on what it called a failing educational standards around the world.

A Computerworld review of a small portion of the publicly posted data showed what appeared to be names, phone numbers, email addresses, login credentials and other data from some of the breached servers.

In some cases, the hackers appear to have breached multiple servers at the same university.

At least some of the publicly posted data appeared to be innocuous.

In its Pastebin message, Team GhostShell claimed that it deliberately leaked little information from the hacked servers.

"We tried to keep the leaked information to a minimum, so just around 120,000+ accounts and records are here, leaving in their servers hundreds of thousands more," the message said.

"When we got there, we found out that a lot of them have malware injected. No surprise there since some have credit card information stored," it added.

A spokeswoman from Stanford University today confirmed that two of its departmental websites had been improperly accessed.

However, information security officers at the university consider the breach to be minor, she said. "No restricted or prohibited data was compromised, nor was any sensitive or other personal information that could lead to identity theft."

"The breach was discovered (Tuesday) night and the sites and their servers have been secured," the spokeswoman added in an emailed comment.

A University of Michigan spokesman confirmed that Team GhostShell had gained access to three servers.

"However there was no sensitive data or passwords accessed," he said in emailed comments. "What they gained access to was data that is generally available to the public on our website."

Officials at Harvard and Penn did not respond to a request for comment on the reported intrusions.

In a blog post, Identity Finder, a New York-based provider of data leak prevention software, said that its analysis of the leaked data suggests that the hackers spent about four months aggregating the information.

The leaked data includes more than 36,000 unique email addresses, and thousands of usernames and passwords -- some of them stored in hashed form and some in plain text format.

Continue Reading

Originally published on www.computerworld.com. Click here to read the original story.
Our Commenting Policies