School District Still Using Default Login For Admin Account Surprised To Learn Its Site Has Been Hacked
from the the-password-is-'password'-but-with-a-1 dept
A Texas school district is learning the hard way about website security basics. If you'd like to keep your site from being compromised, the very least you can do is reset the default login. According to a post at Hackforums, the Round Rock Independent School District of Austin, TX was using the following name and password for its admin account. (h/t to Techdirt reader Vidiot)
hacked - idiots used default login/passOnce compromised, the hacker(s) dropped sexual terminology, racist statements and a few memes all over the Round Rock ISD site. The "Welcome" splash screen was altered to deliver the following "warning:"
u; admin
p; admin1
ATTENTION PARENTS AND STAFF: REDDIT HAS BEEN RAIDING ALL OF THE WEBSITES IN ROUND ROCK ISD AND POSTING PORNOGRAPHIC IMAGES. PLEASE REFRAIN FROM USING ANY ROUND ROCK ISD WEBSITES UNTIL FURTHER NOTICE. THANKSNeedless to say, this wasn't an official message from the school. Additional text next to the principal's photo noted that Caldwell Heights Elementary was a "Jewish Internet Defense Force (JIDF) World School" and that the school's goal was to "develop strong partnerships" with parents and "touch every child -- especially the littler ones." The "statement" was signed by "moot."
Another page features an apology from the principal ("Sorry for the AIDS") and a copy-pasta spinoff of the Navy SEAL rant meme that takes the memorable posturing and sweary proto-military threats and spins them into a defense of every slighted non-white male ever.
The district's reaction to this hacking has been particularly hilarious and prone to over-sensitive overstatements, especially if its hands-off approach to security provided the hole for the hackers to waltz on through.
"We have a third party managing the site (SharpSchool) and we have instructed them to take their time getting everything back up and running," said JoyLynn Occhiuzzi from the Round Rock ISD. "We want them to pull everything together and protect as much information as possible about how this happened so we can make sure it doesn't happen again."Well, I would assume changing the login and password was at the top of the To Do list. This may not entirely be the district's fault. SharpSchool likely bears some of the blame here, especially if it never bothered to ensure the admin login was something stronger than admin/admin1.
"It's disappointing that someone would take the time to hack into our websites…"Yes, it's "disappointing" that someone would have to try more than a handful of variations of the World's Dumbest Passwords before being granted access to the back end.
The site remained down for a few days, replaced with a placeholder image and a somewhat cheery apology. Local police say they will press charges if they manage to find the hacker(s) behind the defacement. The school district has also made statements along the same lines, but finding who's responsible will be a considerably harder than accessing the site without permission.
The altered message on the welcome screen pinned the blame on Reddit, but considering its obviously fake origin, it probably shouldn't be trusted.
The Houston Chronicle article contains this sentence which strains credulity to its breaking point.
Many of the pages can't be printed but one did name a group "9gag'' as being behind the "raid" that came from their "mother's basement."Given Reddit's antipathy towards 9gag, this would seem to swing the finger of blame back on the Front Page of the Internet. Of course, the internet is filled with people and groups who hate 9gag, so that's hardly conclusive. The faux signature appended to the principal's photo ("moot") would seem to implicate 4chan, but Not Your Personal Army doesn't really sign its work. And the fact that the actual principal (Barbara Bergman) wasn't doxed and scattered across the internet would seem to indicate that the Internet Hate Machine didn't perform this particular defacement.
The details that have been made public indicate a rather amateurish job. There's a lot of namedropping going on, but a school site with an unfortunate login/password combination is hardly the sort of target these "groups" would expend much energy hassling.
Considering no real damage was done (other than a few people being offended), perhaps the district should just count its blessings and change the damn password. No data was lost and whatever downtime resulted from the defacement should be borne cost-wise by the third party paid to run the site(s). Prosecuting some low-level vandal for this temporary inconvenience won't prevent anyone from doing this sort of thing in the future. The easiest way to dissuade bored hackers is to put up at least a tiny bit of resistance in the security department -- something a simple login/password change months ago would have ensured.
Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Filed Under: austin, hacked, passwords, round rock school district, school district
Reader Comments
Subscribe: RSS
View by: Time | Thread
[ link to this | view in chronology ]
Re:
http://research.microsoft.com/pubs/161829/EverythingWeKnow.pdf
[ link to this | view in chronology ]
Re: Re:
That's why electronic thieves prefer to steal credit card numbers.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Re:
Yes, it can. Password guessing is a well-known hacking technique.
If there was no password, or if the password was exposed (like on a password prompt which says "the password is hunter2", or visible with "view source" on the page), or if simple and obvious URL manipulation were enough to get in, THEN you could rightfully ask whether it could be considered hacking.
[ link to this | view in chronology ]
Re: Re:
The password was the same as the login name with "1" tagged at the end, and the way the article is written suggests it's the standard default password for the system they were using. It was exposed.
[ link to this | view in chronology ]
Re: Re: Re:
If you are right, I apologize. One can rightfully ask whether it could be considered hacking.
[ link to this | view in chronology ]
Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re:
This is the definition of a dictionary attack.
[ link to this | view in chronology ]
Re: Re: Re:
This would not be "hacking" in the typical sense of the word, it would just be "probing", then using publicly known information.
Kind of like walking past a bunch of cars and trying the door in each one to see if it's locked. You wouldn't say someone "broke into" the car, but "entered" the car.
[ link to this | view in chronology ]
Re: Re: Re: Re:
To sum up:
The keyring with a bunch of keys is the dictionary.
The door on which the keys are tried is the password hash.
When a "key" from the "keyring" is found to work with the door, i.e., hasing a word from the dictionary creates the same hash that the cracker is trying to crack, "the door would open".
[ link to this | view in chronology ]
Re: Re: Re: Re: Re:
Its obvious that Reddit did it. I have no idea why would anyone think that it was 4chan.
[ link to this | view in chronology ]
Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re:
If you leave your house unlocked (but the door closed) and someone comes in, they've committed the crime of breaking & entering. If you left your door open so that they don't need to open it, then no "breaking" has occurred. The crime is "trespassing".
[ link to this | view in chronology ]
Re: Re:
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re:
I think it should be called 'hacking' in the legal sense in that whoever does it should still be liable for any damages caused. In the "techie" sense ... probably not.
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
The Administration and IT staff should be fired
[ link to this | view in chronology ]
/s
[ link to this | view in chronology ]
Re: /s
[ link to this | view in chronology ]
Re: /s
[ link to this | view in chronology ]
Re: Re: /s
[ link to this | view in chronology ]
Re: /s
[ link to this | view in chronology ]
I've posted to 4chan for years. I remember when you could follow /b/ by the front page alone. 4chan didn't do this.
How do I know this?
Well, look at the clues. You have the Angry Marine Rant meme, but someone modified it; 4chan would've posted the real thing. You have porn, but no guro images; 4chan would've posted some of the nastier stuff /b/'s ever seen. You have an apology to parents; 4chan would've gotten scared and gone to live with their aunt and uncle in Bel-Air.
[ link to this | view in chronology ]
Top Lel
User posts login credentials.
Lots of people login and change stuff.
Definitely not /b/
[ link to this | view in chronology ]
Re:
The biggest smoking gun towards 4chan here (other than casting the blame on 9gag and Reddit, two sites that aren't held in high regard by the 4chan userbase) is the reference to the Jewish Internet Defense Force. I don't think I've seen that mentioned anywhere online other than the 4chan /pol/ board.
[ link to this | view in chronology ]
Ahem...
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re: Re:
[ link to this | view in chronology ]
[ link to this | view in chronology ]
4Chan
[ link to this | view in chronology ]
Re: 4Chan
[ link to this | view in chronology ]
The real scoop
However, I can tell you all that there was no hacking involved in this little escapade, just merely some student (probably given permission to help his teacher out or something) posting the username and password to my site.
I hope this will remind all to use an actual password and not give full access to dozens of sites to kids.
[ link to this | view in chronology ]
Re: The real scoop
http://best-boarding-schools.net/
[ link to this | view in chronology ]
[ link to this | view in chronology ]