DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Follow-up: How did a hacker get into UGA system?

Posted on April 29, 2013 by Dissent

Joe Johnson reports some of the follow-up on University of Georgia hack disclosed last year:

University of Georgia officials thought they may have been under attack from multiple hackers when the identities of thousands of employees and students went missing last fall.

But it turned out to be the work of a single person, a former UGA student, who used a proxy server that disguised the Internet Protocol address of his computer.

According to documents recently filed in Clarke County Superior Court, 26-year-old Charles Stapler Stell used a London-based website, Hidemyass.com, when breaking into UGA’s Identity Management System.

Read more on Augusta Chronicle.

Category: Breach IncidentsEducation SectorHackInsider

Post navigation

← Why LivingSocial’s 50-million password breach is graver than you may think
Hope Hospice notifies patients after email with PHI sent insecurely on two occasions →

2 thoughts on “Follow-up: How did a hacker get into UGA system?”

  1. IA Eng says:
    April 29, 2013 at 12:08 pm

    Hide nothing. This is proof positive that people who feel comfortable about using proxy style services better prepare themselves to have their pants around thy ankles if they think they have a rock solid scheme to hide one’s IP.

    People who use these services don’t realize, or care that these services tend to act as a man in the middle to their surfing habits. Can these sites watch your browsing habits? Can these sites capture your keystrokes? If the act as a MITM (man in the middle), your connection to them is ripe for the picking.

    So you spoof your address, but the ability for you to get into the site is limited by the knowledge you have visited in the past. To ensure the path works, I bet it was first tested to see that entry could be gained. Then, he tries it behind a proxy and well, add two plus two, its not hard to retrace steps with the right forensic team and the audit trail. This is hypethetical, but more than likely they found the intrusion and prior navigation by the same individual.

    I am sure the website didn’t hide him at all when the website was offered a dilemna from the feds. People don’t understand that any communication whatsoever can be backtracked through devices if they are done within a certain timeframe. Its a long story, but eventually, that session was tracked back to the site. I haven’t been to the site, so I am unsure how they got his name, but they surely could have got his original IP. With that and a warrant, they forensically search his computer and well the rest is displayed here.

    Again, nothing is totally fool proof when it comes to disguising one self. It all depends on how far the breached organization wants to go. Here, they pushed all in and got an end result. Who knows what other material they pulled from evidence.

    Good, I hope he gets a fair trial and if found guilty sits in his cell for the primetime of his life, and headslaps himself for being so “ego-testical”.

    1. Steve says:
      May 4, 2013 at 8:42 pm

      Unfortunately, you can use someone’s open wifi then a proxy server.
      Harder to catch unless you are silly enough to use your neighbours.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Masimo Manufacturing Facilities Hit by Cyberattack
  • Education giant Pearson hit by cyberattack exposing customer data
  • Star Health hacker claims sending bullets, threats to top executives: Reports
  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported
  • Georgia hospital defeats data-tracking lawsuit
  • 60K BTC Wallets Tied to LockBit Ransomware Gang Leaked
  • UK: Legal Aid Agency hit by cyber security incident
  • Public notice for individuals affected by an information security breach in the Social Services, Health Care and Rescue Services Division of Helsinki
  • PowerSchool paid a hacker’s extortion demand, but now school district clients are being extorted anyway (3)
  • Defending Against UNC3944: Cybercrime Hardening Guidance from the Frontlines

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Google agrees to pay Texas $1.4 billion data privacy settlement
  • The App Store Freedom Act Compromises User Privacy To Punish Big Tech
  • Florida bill requiring encryption backdoors for social media accounts has failed
  • Apple Siri Eavesdropping Payout Deadline Confirmed—How To Make A Claim
  • Privacy matters to Canadians – Privacy Commissioner of Canada marks Privacy Awareness Week with release of latest survey results
  • Missouri Clinic Must Give State AG Minor Trans Care Information
  • Georgia hospital defeats data-tracking lawsuit

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.