[iwar] [fc:Alleged.Hacker.Attacks.U..Wisconsin.Student.Web.Sites]

From: Fred Cohen (fc@all.net)
Date: 2001-10-30 06:09:12


Return-Path: <sentto-279987-3633-1004450949-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Tue, 30 Oct 2001 06:10:08 -0800 (PST)
Received: (qmail 32654 invoked by uid 510); 30 Oct 2001 14:08:26 -0000
Received: from n15.groups.yahoo.com (216.115.96.65) by 204.181.12.215 with SMTP; 30 Oct 2001 14:08:26 -0000
X-eGroups-Return: sentto-279987-3633-1004450949-fc=all.net@returns.onelist.com
Received: from [10.1.1.223] by n15.groups.yahoo.com with NNFMP; 30 Oct 2001 14:09:02 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_0_1); 30 Oct 2001 14:09:09 -0000
Received: (qmail 43785 invoked from network); 30 Oct 2001 14:09:08 -0000
Received: from unknown (10.1.10.142) by 10.1.1.223 with QMQP; 30 Oct 2001 14:09:08 -0000
Received: from unknown (HELO red.all.net) (65.0.156.78) by mta3 with SMTP; 30 Oct 2001 14:09:08 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id f9UE9C309094 for iwar@onelist.com; Tue, 30 Oct 2001 06:09:12 -0800
Message-Id: <200110301409.f9UE9C309094@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Tue, 30 Oct 2001 06:09:12 -0800 (PST)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [fc:Alleged.Hacker.Attacks.U..Wisconsin.Student.Web.Sites]
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Alleged Hacker Attacks U. Wisconsin Student Web Sites 
Boyce &amp; Amanda Heyman, U-WIRE, 10/29/2001
<a href="http://www.antionline.com/showthread.php?threadid=121503">http://www.antionline.com/showthread.php?threadid=121503>

 MADISON, Wis. -- For the first time in more than two years, a hacker
invaded University of Wisconsin's Student Information Technology Web
sites last Friday, compromising one of SIT's machines and making SIT Web
sites unavailable. 
However, technicians solved the problem over the weekend and SIT
president Richard Lingk said they are currently investigating the
security breach. 
"We did have an incident on Friday, but we noticed it in a couple of
hours with some tools that we've developed over the years," he said. "We
got it under control right away. We fixed it over this weekend and used
the time to do some upgrades we've been wanting to do." 
Lingk, a University of Wisconsin-Madison senior, was unwilling to
disclose the specifics of the investigation, but said he is confident
the hacker will be identified. 
"We have to go through our log files that we have -- it's pretty
intensive," he said. "I don't want to go too much into it because it
just makes it easier for people to cover their tracks. It is currently
under investigation and we will catch the people or person who did it." 
SIT, organized in 1996, is a student-run program that facilitates Web
site production and maintenance for UW-Madison students and student
organizations. 
"The bulk of the system is managed by SIT," Division of Information
Technology employee Brian Rust said. 
DoIT works directly with SIT to provide a network connection for the Web
sites. Lingk said although he does not know what motivated Friday's
incident, hackers generally want to cause trouble. 
"Usually what hackers like to do is to break into a machine and use it
as a point to break into other machines," he said. "Or maybe just to
snoop -- who knows?" 
However, Lingk emphasized that SIT Web sites remain unhurt. 
"None of the people that use our service had any of their data lost," he
said. "They've caused us some problems, but it's been ironed out."

(C) 1999 Badger Herald via U-WIRE

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Get your FREE VeriSign guide to security solutions for your web site: encrypting transactions, securing intranets, and more!
http://us.click.yahoo.com/UnN2wB/m5_CAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:58 PST