Hackers steal 22,000 Social Security numbers from University of Missouri database

Share this article:

The University of Missouri is the latest university to fall victim to cybercrime, after hackers breached a database and lifted more than 20,000 Social Security numbers (SSNs).

The attackers, using IP addresses from China and Australia, stole 22,396 SSNs associated with anyone who worked in the university's system in 2004 who were also current or former students.

The university has campuses in Columbia, Kansas City, Rolla and St. Louis.

The school's IT security personnel on Thursday first noticed suspicious activity on a computer help-desk application, and by Friday morning they identified a large series of query errors being made to that application and its associated database, according to a university statement.

Soon after, technicians disabled the account used by the two malicious IP addresses, but by then hackers had already made off with the sensitive data. They retrieved the information "through a webpage used to make queries about the status of trouble reports" to the IT help desk on the Columbia campus, according to the university statement.

"The hacker was able to reach the information by making thousands of queries over a span of hours, allowing the identities to be exposed one at a time," according to the statement.

School spokesman Scott Charton told SCMagazine.com today that the intruders accessed the data in a report that "probably should have been expunged but was not." It did not, however, contain any financial information, and there is no evidence that any of the data has been misused.

The university has already answered 1,800 calls and 400 emails from victims, and it plans to send out 13,000 notification letters via regular mail today, Charton said.

Ironically, SC Magazine recently spoke with Becky Thurmond Fowler, systems security analyst of IT at the University of Missouri in Columbia, for a story about the SANS Institute’s new push to educate application developers on security.

Fowler coordinates a college initiative called SafeWeb, which seeks to raise campus awareness about the need to implement security in applications.

Reached today, she deferred questions about the hacking incident to Charton.

David Larson, director of product management at Maynard, Mass.-based data security firm Tizor Systems, told SCMagazine.com today that universities should deploy software that monitors back-end databases in real time.

"You're like a bank," he said. "You should view your data like a vault. And there is no vault that doesn't have cameras in it."

This is the latest in a series of computer intrusions affecting major universities. Ohio State, University of California, Los Angeles, and Texas A&M have lost hundreds of thousands of records to hackers in recent months.

Experts have said colleges are frequent targets of hackers because some schools employ sub-par security, while other industry professionals think cybercrooks prefer stealing identity information about students, who likely have better credit than older Americans.

Click here to email reporter Dan Kaplan.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

More in News

CryptoWall surpasses CryptoLocker in infection rates

CryptoWall surpasses CryptoLocker in infection rates

A threat analysis from Dell SecureWorks CTU says that CryptoWall has picked up where its famous sibling left off.

Professor says Google search, not hacking, yielded medical info

Professor says Google search, not hacking, yielded medical ...

A professor of ethical hacking at City College San Francisco came forward to clarify that he did not demonstrate hacking a medical center's server in a class.

Syrian Malware Team makes use of enhanced BlackWorm RAT

Syrian Malware Team makes use of enhanced BlackWorm ...

FireEye analyzed the hacking group's use of the malware, dubbed the "Dark Edition" of BlackWorm.