Team GhostShell Exposes 120,000 Records From Universities
Calculated attacks turn up hundreds of thousands of vulnerable records at 100 universities across the globe, hacker group says
The hacktivist group TeamGhostShell says it has embarked on a new campaign to expose data and vulnerabilities at 100 of the top universities around the world.
In a posting on Pastebin Monday, TeamGhostShell released some 120,000 records from universities such as Oxford and Harvard. The campaign, which the group has dubbed "Project WestWind," has revealed vulnerabilities in university systems that could put hundreds of thousands more records at risk, the group says.
More Security Insights
- Forrester Study: The Total Economic Impact of VMware View
- Securing Executives and Highly Sensitive Documents of Corporations Globally
- State of Cloud 2011: Time for Process Maturation
- Research: Federal Government Cloud Computing Survey
- Closing the Book on Windows Server 2003: Planning for Windows Server 2012 Opens New Possibilities
- Smarter Process: Five Ways to Make Your Day-to-Day Operations Better, Faster and More Measurable
"After carefully filtering the [university servers] that we've already leaked before and the ones where Anonymous has in major operations, we have eventually got together a new fresh list," the posting says. "The majority of them should be here. Also, some of us decided to go ahead and add vulnerable links to the other ones anyway, which you can find at the bottom, at 'Other Universities.'
"We tried to keep the leaked information to a minimum, so just around 120,000+ accounts and records are here, leaving in their servers hundreds of thousands more," the group states. "When we got there, we found out that a lot of them have malware injected. No surprise there, since some have credit card information stored."
The group says its goal is to raise awareness of problems in the modern education system. The posting does not discuss how the data was obtained or how much data the group was able to expose.
Have a comment on this story? Please click "Add a Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.