[iwar] [fc:Secret.Service.probes.school.hackings]

From: Fred Cohen (fc@all.net)
Date: 2002-06-21 06:30:06


Return-Path: <sentto-279987-4864-1024666160-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Fri, 21 Jun 2002 06:32:09 -0700 (PDT)
Received: (qmail 7653 invoked by uid 510); 21 Jun 2002 13:29:20 -0000
Received: from n32.grp.scd.yahoo.com (66.218.66.100) by all.net with SMTP; 21 Jun 2002 13:29:20 -0000
X-eGroups-Return: sentto-279987-4864-1024666160-fc=all.net@returns.groups.yahoo.com
Received: from [66.218.67.193] by n32.grp.scd.yahoo.com with NNFMP; 21 Jun 2002 13:29:21 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_3_2); 21 Jun 2002 13:29:20 -0000
Received: (qmail 21270 invoked from network); 21 Jun 2002 13:29:20 -0000
Received: from unknown (66.218.66.217) by m11.grp.scd.yahoo.com with QMQP; 21 Jun 2002 13:29:20 -0000
Received: from unknown (HELO red.all.net) (12.232.72.152) by mta2.grp.scd.yahoo.com with SMTP; 21 Jun 2002 13:29:20 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g5LDU6s04768 for iwar@onelist.com; Fri, 21 Jun 2002 06:30:06 -0700
Message-Id: <200206211330.g5LDU6s04768@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Fri, 21 Jun 2002 06:30:06 -0700 (PDT)
Subject: [iwar] [fc:Secret.Service.probes.school.hackings]
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
X-Spam-Status: No, hits=3.2 required=5.0 tests=RISK_FREE,FREE_MONEY,DIFFERENT_REPLY_TO version=2.20
X-Spam-Level: ***

Secret Service probes school hackings

By Robert Lemos
Staff Writer, CNET News.com
June 20, 2002, 6:50 PM PT

Students at universities in four states may have been monitored by "spyware"
placed on computers by online criminals to capture passwords and credit card
numbers, a public safety officer at one of the schools involved, said
Thursday.

A month ago, agents with the U.S. Secret Service notified Arizona State
University officials that some of their computers may have been compromised,
said Lt. John Sutton of the university's Department of Public Safety. The
Secret Service seized almost 20 hard drives from computers at the university
and are currently analyzing them for clues as part of the investigation, he
said.

"We are looking to see if some type of software was installed on them that
would allows someone from the keyboard or from a remote location to identify
keystrokes and grab personal information," he said.

The investigation has encompassed compromised computers at universities in
Arizona, Texas, Florida and California, Sutton said. It's believed that many
of the computers had the software loaded onto the system by someone sitting
at the keyboard, he added.

Agents of the U.S. Secret Service's San Francisco bureau would not
immediately comment on the investigation.

Most of the computers being examined at ASU were located in student computer
labs, Sutton said. The users of the PCs are usually limited to students, but
the rule is not enforced. "It is supposed to be used for students only, and
like any other loosely secured area, it is possible that someone could come
in and use it who is not a student," he said.

It's been known that university systems have long been a haven for hackers
and online vandals. Compromised university systems contributed to the
denial-of-service attacks that struck at well-known e-commerce sites more
than two years ago. 

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Free $5 Love Reading
Risk Free!
http://us.click.yahoo.com/3PCXaC/PfREAA/Ey.GAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2003-08-24 02:46:32 PDT