In this days the hacking group Team GhostShell claimed credit for the hack of servers of the 100 principal universities from around the world, including Stanford, Princeton Harvard, the University of Michigan and also the Italian University of Rome. The hackers named the campaign #ProjectWestWind.
The group accessed to the databases of universities stealing hundred of thousand of records, recently in a post on Pastebin the group released about 120,000 records from the breached servers.
The name Team GhostShell is not new, the hackers are very active, last summer they conducted a campaign named Project HellFire, a massive leak of data, alleged to top more than a million records.
In that occasion Team GhostShell, along with two other associate groups, successfully attacked hundreds of websites, the victims of Project Hellfire were very heterogeneous, financial, law enforcement, political organizations and private businesses.
The group, which recently claimed credit for several major hacking incidents, in July penetrated into ITWallStreet.com, a recuiting website IT professionals who are searching for financial Wall Street jobs or working with Wall Street firms, and exposed valuable information belonging to tens of thousands of job applicants.
Why the hackers have chosen the universities in the last wave of attacks?
The group desires demonstrate the “failing educational standards around the world“, in the university system.
“We have set out to raise awareness towards the changes made in today’s education, how new laws imposed by politicians affect us, our economy and overall, our way of life. How far we have ventured from learning valuable skills that would normally help us be prepared in life, to just, simply memorizing large chunks of text in exchange for good grades. How our very own traditions are heard less and less, losing touch with who we truly are. Slowly casting the identities, that our ancestors fought to protect, into exile. – TGS
As a wise man once said: “Those who cannot remember the past are condemned to repeat it.”
What is surprising is the large scale attack that demonstrated the lack of defense in what could be considered the “temples of knowledge” and have been discovered vulnerable to offensive. In some cases, the hackers have breached multiple servers at the same university, very unfortunate circumstance that must raise many question on the approach of these institutions to the security.
The message posted on PasteBin states
“We tried to keep the leaked information to a minimum, so just around 120,000+ accounts and records are here, leaving in their servers hundreds of thousands more,”
“When we got there, we found out that a lot of them have malware injected. No surprise there since some have credit card information stored,”
According the official communication of Stanford University, two departmental websites had been violated but no restricted or sensible data was exposed.
Also other universities provided similar comments to the event … according their declarations nothing of important is happened. The University of Michigan spokesman said:
“However there was no sensitive data or passwords accessed,” he said in emailed comments. “What they gained access to was data that is generally available to the public on our website.”
The blog Identity Finder provided an interesting analysis of the leaked data highlighting that the hackers hasn’t only published the stolen info, but they spent long time to analyze and aggregate them.
Probably behind these operation there is also a long study of objectives and a specific strategy, differently of what wrongly people believes.
The attacks represent a large breach of SQL database information obtained from various subdomains belonging to more than 50 top U.S. and international universities.
Following some interesting figure on the data breach:
“Based upon a casual sampling of time stamps in the data set, it appears that the hackers spent at least four months aggregating the information prior to release,” explained Aaron Titus, Chief Privacy Officer for Identity Finder. “Although the hackers claim to have posted 120,000 accounts, Identity Finder could only confirm around 40,000 accounts exposed. 40,000 accounts is still a large number, and it is possible that the hackers had access to far more.”
The data leaked includes more user’s credentials and information, to aggravate the situation the fact that many passwords were available in plain text format.
What lessons should we learn from these events?
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.