School District Still Using Default Login For Admin Account Surprised To Learn Its Site Has Been Hacked

from the the-password-is-'password'-but-with-a-1 dept

A Texas school district is learning the hard way about website security basics. If you’d like to keep your site from being compromised, the very least you can do is reset the default login. According to a post at Hackforums, the Round Rock Independent School District of Austin, TX was using the following name and password for its admin account. (h/t to Techdirt reader Vidiot)

hacked – idiots used default login/pass

u; admin
p; admin1

Once compromised, the hacker(s) dropped sexual terminology, racist statements and a few memes all over the Round Rock ISD site. The “Welcome” splash screen was altered to deliver the following “warning:”

ATTENTION PARENTS AND STAFF: REDDIT HAS BEEN RAIDING ALL OF THE WEBSITES IN ROUND ROCK ISD AND POSTING PORNOGRAPHIC IMAGES. PLEASE REFRAIN FROM USING ANY ROUND ROCK ISD WEBSITES UNTIL FURTHER NOTICE. THANKS

Needless to say, this wasn’t an official message from the school. Additional text next to the principal’s photo noted that Caldwell Heights Elementary was a “Jewish Internet Defense Force (JIDF) World School” and that the school’s goal was to “develop strong partnerships” with parents and “touch every child — especially the littler ones.” The “statement” was signed by “moot.”

Another page features an apology from the principal (“Sorry for the AIDS”) and a copy-pasta spinoff of the Navy SEAL rant meme that takes the memorable posturing and sweary proto-military threats and spins them into a defense of every slighted non-white male ever.

The district’s reaction to this hacking has been particularly hilarious and prone to over-sensitive overstatements, especially if its hands-off approach to security provided the hole for the hackers to waltz on through.

“We have a third party managing the site (SharpSchool) and we have instructed them to take their time getting everything back up and running,” said JoyLynn Occhiuzzi from the Round Rock ISD. “We want them to pull everything together and protect as much information as possible about how this happened so we can make sure it doesn’t happen again.”

Well, I would assume changing the login and password was at the top of the To Do list. This may not entirely be the district’s fault. SharpSchool likely bears some of the blame here, especially if it never bothered to ensure the admin login was something stronger than admin/admin1.

“It’s disappointing that someone would take the time to hack into our websites…”

Yes, it’s “disappointing” that someone would have to try more than a handful of variations of the World’s Dumbest Passwords before being granted access to the back end.

The site remained down for a few days, replaced with a placeholder image and a somewhat cheery apology. Local police say they will press charges if they manage to find the hacker(s) behind the defacement. The school district has also made statements along the same lines, but finding who’s responsible will be a considerably harder than accessing the site without permission.

The altered message on the welcome screen pinned the blame on Reddit, but considering its obviously fake origin, it probably shouldn’t be trusted.

The Houston Chronicle article contains this sentence which strains credulity to its breaking point.

Many of the pages can’t be printed but one did name a group “9gag” as being behind the “raid” that came from their “mother’s basement.”

Given Reddit’s antipathy towards 9gag, this would seem to swing the finger of blame back on the Front Page of the Internet. Of course, the internet is filled with people and groups who hate 9gag, so that’s hardly conclusive. The faux signature appended to the principal’s photo (“moot”) would seem to implicate 4chan, but Not Your Personal Army doesn’t really sign its work. And the fact that the actual principal (Barbara Bergman) wasn’t doxed and scattered across the internet would seem to indicate that the Internet Hate Machine didn’t perform this particular defacement.

The details that have been made public indicate a rather amateurish job. There’s a lot of namedropping going on, but a school site with an unfortunate login/password combination is hardly the sort of target these “groups” would expend much energy hassling.

Considering no real damage was done (other than a few people being offended), perhaps the district should just count its blessings and change the damn password. No data was lost and whatever downtime resulted from the defacement should be borne cost-wise by the third party paid to run the site(s). Prosecuting some low-level vandal for this temporary inconvenience won’t prevent anyone from doing this sort of thing in the future. The easiest way to dissuade bored hackers is to put up at least a tiny bit of resistance in the security department — something a simple login/password change months ago would have ensured.

Filed Under: , , , ,

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “School District Still Using Default Login For Admin Account Surprised To Learn Its Site Has Been Hacked”

Subscribe: RSS Leave a comment
40 Comments
Anonymous Coward says:

Re: Re:

Can this even be called hacking?

Yes, it can. Password guessing is a well-known hacking technique.

If there was no password, or if the password was exposed (like on a password prompt which says “the password is hunter2”, or visible with “view source” on the page), or if simple and obvious URL manipulation were enough to get in, THEN you could rightfully ask whether it could be considered hacking.

Bengie says:

Re: Re: Re: Re:

Depends on if they even used a dictionary attack. If all they did was port scan systems until they found a hit, then checked what app it was running, then tried the default password, then they did not do a dictionary attack.

This would not be “hacking” in the typical sense of the word, it would just be “probing”, then using publicly known information.

Kind of like walking past a bunch of cars and trying the door in each one to see if it’s locked. You wouldn’t say someone “broke into” the car, but “entered” the car.

Anonymous Coward says:

Re: Re: Re:2 Re:

I have no idea whether these guys used a dictionary attack; I was just pointing out that the commenter’s description: “Can this even be called hacking? For me, this is like finding a keyring with a bunch of keys and trying them all on a door. Eventually one would work and the door would open.” is the definition of a dictionary attack, commonly used for password cracking. To be pedantic, the term “hacking” is not specific to the act of gaining unauthorized access to systems, though it commonly carries that connotation.

To sum up:

The keyring with a bunch of keys is the dictionary.
The door on which the keys are tried is the password hash.
When a “key” from the “keyring” is found to work with the door, i.e., hasing a word from the dictionary creates the same hash that the cracker is trying to crack, “the door would open”.

John Fenderson (profile) says:

Re: Re: Re:2 Re:

Technically, if you open an unlocked car (or house) door without authorization, you’ve “broken into” it. Entering is a separate crime.

If you leave your house unlocked (but the door closed) and someone comes in, they’ve committed the crime of breaking & entering. If you left your door open so that they don’t need to open it, then no “breaking” has occurred. The crime is “trespassing”.

S. T. Stone says:

Naw, 4chan didn’t do this.

I’ve posted to 4chan for years. I remember when you could follow /b/ by the front page alone. 4chan didn’t do this.

How do I know this?

Well, look at the clues. You have the Angry Marine Rant meme, but someone modified it; 4chan would’ve posted the real thing. You have porn, but no guro images; 4chan would’ve posted some of the nastier stuff /b/’s ever seen. You have an apology to parents; 4chan would’ve gotten scared and gone to live with their aunt and uncle in Bel-Air.

Anonymous Coward says:

Re: Re:

The Navy SEAL rant has many well-known derivatives; 4chan’s users frequently make spinoffs to these copypastas that evolve over time.

The biggest smoking gun towards 4chan here (other than casting the blame on 9gag and Reddit, two sites that aren’t held in high regard by the 4chan userbase) is the reference to the Jewish Internet Defense Force. I don’t think I’ve seen that mentioned anywhere online other than the 4chan /pol/ board.

Max Edwards says:

The real scoop

As a witness, I can firmly confirm that one of the mentioned websites was behind the attack but due to my loyalty it’s name will remain secret.
However, I can tell you all that there was no hacking involved in this little escapade, just merely some student (probably given permission to help his teacher out or something) posting the username and password to my site.
I hope this will remind all to use an actual password and not give full access to dozens of sites to kids.

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...