BreachExchange mailing list archives

Nearly 3, 000 Social Security Numbers Taken From Hendrick House


From: Erica Absetz <erica () riskbasedsecurity com>
Date: Tue, 25 Jun 2013 11:01:48 -0500

http://www.foxillinois.com/news/local/Nearly-3000-Social-Security-Numbers-Taken-From-Hendrick-House-212767631.html

URBANA--A security breach at a University of Illinois private housing
complex has left nearly 3,000 people at risk.

The Hendrick House is trying to reach more than a decades worth of
people who lived in the dorms, and tell them to keep a close watch on
their credit reports.

The breach happened sometime in 2011, and University of Illinois
Police detectives tell us, a former student broke into a locked
offices and hacked into a company computer.

He then downloaded the personal information of about 2,800 people to
his own flash drive.

"Personal information, names, addresses, Social Security numbers, and
birthdates starting with fall of 1997 and through and including spring
of 2011." said Hendrick House general manager Becky Rowe.

Police say they found the information on 22-year old Daniel Beckwitt
while investigating his role in a similar crime.

Police also say they don't have any evidence Beckwitt used the Social
Security numbers to steal anybody's identification. However, they are
asking people who lived in Hendrick House from 1997 to 2011 to keep
track of activity on their credit.
_______________________________________________
Dataloss-discuss Mailing List (dataloss-discuss () datalossdb org)
Archived at http://seclists.org/dataloss/
Unsubscribe at http://lists.osvdb.org/mailman/listinfo/dataloss-discuss

Supporters:

Risk Based Security (http://www.riskbasedsecurity.com/)
Risk Based Security equips organizations with security intelligence, risk
management services and on-demand security solutions to establish
customized risk-based programs to address information security and
compliance challenges. 

Tenable Network Security (http://www.tenable.com/)
Tenable Network Security provides a suite of solutions which unify real-time
vulnerability, event and compliance monitoring into a single, role-based, interface
for administrators, auditors and risk managers to evaluate, communicate and
report needed information for effective decision making and systems management.


Current thread: