BreachExchange mailing list archives

Undergrad suspected in massive Univ. of Nebraska breach


From: security curmudgeon <jericho () attrition org>
Date: Fri, 1 Jun 2012 02:43:48 -0500 (CDT)



---------- Forwarded message ----------
From: InfoSec News <alerts () infosecnews org>

https://www.computerworld.com/s/article/9227629/Undergrad_suspected_in_massive_Univ._of_Nebraska_breach

By Jaikumar Vijayan
Computerworld
May 31, 2012

Officials at the University of Nebraska in Lincoln (UNL) have identified 
an undergraduate student they say is responsible for a recent intrusion 
into a university database containing personal information on more than 
650,000 students, parents and employees.

Campus police on Wednesday night seized computers and other equipment from 
the room of the UNL student after tracing the IP address of the computer 
used in the attack. The seized equipment is currently undergoing forensic 
analysis, according to information from by the school. The name of the 
suspect has not been released.

"An arrest has not yet been made," a university spokeswoman said today. 
"When and if that happens we will release the name of the individual."

The intrusion, which was described by university officials as a "skilled 
attack," exposed the Social Security Numbers (SSNs), names, addresses, 
course grades financial aid and other information on students who attended 
the university since 1985.

[...]
_______________________________________________
Dataloss Mailing List (dataloss () datalossdb org)
Archived at http://seclists.org/dataloss/
Unsubscribe at http://datalossdb.org/mailing_list

Supporters:

Risk Based Security (http://www.riskbasedsecurity.com/)
Risk Based Security equips organizations with security intelligence, risk
management services and on-demand security solutions to establish
customized risk-based programs to address information security and
compliance challenges. 

Tenable Network Security (http://www.tenable.com/)
Tenable Network Security provides a suite of solutions which unify real-time
vulnerability, event and compliance monitoring into a single, role-based, interface
for administrators, auditors and risk managers to evaluate, communicate and
report needed information for effective decision making and systems management.


Current thread: