Return-Path: <sentto-279987-4864-1024666160-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Fri, 21 Jun 2002 06:32:09 -0700 (PDT) Received: (qmail 7653 invoked by uid 510); 21 Jun 2002 13:29:20 -0000 Received: from n32.grp.scd.yahoo.com (66.218.66.100) by all.net with SMTP; 21 Jun 2002 13:29:20 -0000 X-eGroups-Return: sentto-279987-4864-1024666160-fc=all.net@returns.groups.yahoo.com Received: from [66.218.67.193] by n32.grp.scd.yahoo.com with NNFMP; 21 Jun 2002 13:29:21 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_3_2); 21 Jun 2002 13:29:20 -0000 Received: (qmail 21270 invoked from network); 21 Jun 2002 13:29:20 -0000 Received: from unknown (66.218.66.217) by m11.grp.scd.yahoo.com with QMQP; 21 Jun 2002 13:29:20 -0000 Received: from unknown (HELO red.all.net) (12.232.72.152) by mta2.grp.scd.yahoo.com with SMTP; 21 Jun 2002 13:29:20 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g5LDU6s04768 for iwar@onelist.com; Fri, 21 Jun 2002 06:30:06 -0700 Message-Id: <200206211330.g5LDU6s04768@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Fri, 21 Jun 2002 06:30:06 -0700 (PDT) Subject: [iwar] [fc:Secret.Service.probes.school.hackings] Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, hits=3.2 required=5.0 tests=RISK_FREE,FREE_MONEY,DIFFERENT_REPLY_TO version=2.20 X-Spam-Level: *** Secret Service probes school hackings By Robert Lemos Staff Writer, CNET News.com June 20, 2002, 6:50 PM PT Students at universities in four states may have been monitored by "spyware" placed on computers by online criminals to capture passwords and credit card numbers, a public safety officer at one of the schools involved, said Thursday. A month ago, agents with the U.S. Secret Service notified Arizona State University officials that some of their computers may have been compromised, said Lt. John Sutton of the university's Department of Public Safety. The Secret Service seized almost 20 hard drives from computers at the university and are currently analyzing them for clues as part of the investigation, he said. "We are looking to see if some type of software was installed on them that would allows someone from the keyboard or from a remote location to identify keystrokes and grab personal information," he said. The investigation has encompassed compromised computers at universities in Arizona, Texas, Florida and California, Sutton said. It's believed that many of the computers had the software loaded onto the system by someone sitting at the keyboard, he added. Agents of the U.S. Secret Service's San Francisco bureau would not immediately comment on the investigation. Most of the computers being examined at ASU were located in student computer labs, Sutton said. The users of the PCs are usually limited to students, but the rule is not enforced. "It is supposed to be used for students only, and like any other loosely secured area, it is possible that someone could come in and use it who is not a student," he said. It's been known that university systems have long been a haven for hackers and online vandals. Compromised university systems contributed to the denial-of-service attacks that struck at well-known e-commerce sites more than two years ago. ------------------------ Yahoo! Groups Sponsor ---------------------~--> Free $5 Love Reading Risk Free! http://us.click.yahoo.com/3PCXaC/PfREAA/Ey.GAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2003-08-24 02:46:32 PDT