Hackers hijack information from Pitt, Penn servers
University of Pittsburgh officials on Thursday said the school was among more than 50 research universities around the world whose information files were posted online by an anonymous group of hackers calling themselves Team GhostShell.
The group dubbed its data release — posted online at Pastebin.com — Project Westwind. Team GhostShell, which infiltrated university servers at Harvard, Johns Hopkins, Duke, Penn, Cambridge and the University of Tokyo among others, said it wanted to draw attention to shortcomings in higher education around the world. No vital information was compromised, analysts said.
“We wanted to bring to your attention different examples from Europe, how the laws change so often that even the teachers have a hard time adjusting to them ... to the U.S., where tuition fees have spiked up so much that by the time you finish any sort of degree, you will be in more debt than you can handle,” the hackers wrote.
Aaron Titus, chief privacy officer for IndentiFinder, a New York data-loss prevention company, analyzed the data drop. He said it contained information such as dates of birth, marital status and citizenship, but not Social Security or credit card numbers.
“None of the (universities') core systems were hacked. They were all obscure tertiary systems some professor had set up under low security and forgot about,” Titus said.
Titus said the time stamps suggested the hackers spent several months scanning and downloading information.
Team GhostShell said many of the university servers already were infiltrated with malware — software used to disrupt services or gather information — by the time it breached them.
Penn spokesman Stephen MacCarthy said the Philadelphia school notified students and faculty of the breach on Wednesday. Information disclosed in the breach at Penn included names, email addresses, phone numbers and student ID numbers.
“Fortunately, no sensitive information that could result in identity theft, such as Social Security numbers, PennKey Password, bank account numbers or credit card numbers are contained in the database that was compromised,” MacCarthy said.
Daniel Mosse, chairman of the computer science department at Pitt, said the sites compromised at Pitt were not from his department, nor were they part of the university's web infrastructure. He described the servers that were breached as research experimental servers containing old code.
“No sensitive or confidential data (were) exposed. All information there and exposed was for testing purposes or available on the Internet,” he said.
Pitt spokesman John Fedele echoed Mosse's assessment of the breach.
“Work is under way to move these sites to the university's enterprise infrastructure, and we expect that to happen in the very near future,” Fedele said in an email.
In April, a video posted on YouTube said the group Anonymous infiltrated Pitt servers and threatened to post confidential information on the Internet unless Chancellor Mark Nordenberg apologized for his handling of a series of bomb threats.
Pitt officials at the time said their servers had not been hacked. Two months later, FBI agents arrested an Ohio man in connection with the hoax.
Debra Erdley is a staff writer for Trib Total Media. She can be reached at 412-320-7996 or firstname.lastname@example.org.
Show commenting policy
TribLive commenting policy
You are solely responsible for your comments and by using TribLive.com you agree to our Terms of Service.
We moderate comments. Our goal is to provide substantive commentary for a general readership. By screening submissions, we provide a space where readers can share intelligent and informed commentary that enhances the quality of our news and information.
While most comments will be posted if they are on-topic and not abusive, moderating decisions are subjective. We will make them as carefully and consistently as we can. Because of the volume of reader comments, we cannot review individual moderation decisions with readers.
We value thoughtful comments representing a range of views that make their point quickly and politely. We make an effort to protect discussions from repeated comments either by the same reader or different readers.
We follow the same standards for taste as the daily newspaper. A few things we won't tolerate: personal attacks, obscenity, vulgarity, profanity (including expletives and letters followed by dashes), commercial promotion, impersonations, incoherence, proselytizing and SHOUTING. Don't include URLs to Web sites.
We do not edit comments. They are either approved or deleted. We reserve the right to edit a comment that is quoted or excerpted in an article. In this case, we may fix spelling and punctuation.
We welcome strong opinions and criticism of our work, but we don't want comments to become bogged down with discussions of our policies and we will moderate accordingly.
We appreciate it when readers and people quoted in articles or blog posts point out errors of fact or emphasis and will investigate all assertions. But these suggestions should be sent via e-mail. To avoid distracting other readers, we won't publish comments that suggest a correction. Instead, corrections will be made in a blog post or in an article.