Feeds

Nine year-old blamed for US school system hack

Youngster uses teacher's login to redraw Blackboard

Protecting users from Firesheep and other Sidejacking attacks with SSL

Police hunting a hacker who had attacked a US school's systems found themselves cornering a "very intelligent" 9 year old instead, it has emerged.

When passwords for teachers at Spring Hill Elementary, Virginia, were changed without authorisation the school board initially thought a hacker had broken into the school district's Blackboard system.

Police were called in to investigate in mid-March and were quickly able to trace the incident back to a PC at the home of a 9 year-old school student.

The youngster's mother was initially chief suspect in the hack but after speaking to her and and her son police came to the surprising conclusion that they were dealing with a 'kindergarden' hacker.

"He's a very intelligent 9-year-old,with no criminal intent," Officer Don Gotthardt, who investigated the case, told The Washington Post.

The precocious and mischievous youngster recorded login details to the Blackboard system from a teacher's desk before using the login credentials to modify class enrolment lists, change the password login details of teachers and modify homework assignments.

"This was a case where an individual ... got hold of a teacher's password, and the passwords had administrative rights," a Fairfax school board spokesman said. No action was taken against the unnamed student, at least by the authorities.

The Blackboard system provides an online forum to detail homework assignments and make class announcements. Blackboard downplayed the significance of the unauthorised access onto supervisor account by saying an intruder would not have been able to change grades or access more sensitive school resources.

The firm disputes local reports that the installation of its technology at the school was hacked. "It was actually not a hack, unless you consider the fact that the 9-year-old took the teacher's username and password from the desk a hack," said Michael Stanton, Blackboard's senior vice president of corporate affairs told IDG. ®

The next step in data security

More from The Register

next story
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
Infosec geniuses hack a Canon PRINTER and install DOOM
Internet of Stuff securo-cockups strike yet again
'Speargun' program is fantasy, says cable operator
We just might notice if you cut our cables
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.