Skip to main content

Student H4cking Grades over 90 times!

This past Thursday, a former University of Iowa student appeared in court on charges of hacking his school and professors and changing grades for himself and a few other fellow students.

The FBI arrested the suspect — Trevor Graves, age 22 — at the end of October, in Denver, his hometown. According to an FBI arrest warrant, the teenager planted hardware keyloggers on several school computers.

Student used hardware keylogger

Graves had help from other students. One would plant the keylogger, while the other would attend class and confirm a teacher had logged into his school account.

They would then retrieve the keylogger and extract the login credentials. University of Iowa did not implement two-factor authentication for its student management system, so the login credentials allowed Graves access to teachers' accounts.
This took place for a period of 21 months, between March of 2015 to November of 2016.
The scheme unfolded when a teacher noticed in mid-December 2016 that some of Graves' grades had changed without her knowledge. The professor informed the University's IT staff, who investigated and found the keyloggers. The FBI was called in to aid the investigation.

Graves changed grades over 90 times in 21 months

All in all, they found that Graves changed grades more than 90 times, for him and five classmates. They also found that he regularly stole exams and shared tests with other students.
On December 29, 2016, the FBI and University of Iowa Police executed a search warrant at Graves' home, an off-campus apartment in Iowa City.
Investigators found keyloggers, phones, and thumb drives with compromising information. The phones contained records of past conversations between graves and his co-conspirators, while the thumb drives contained copies of stolen exams. Graves referred to the keyloggers using the term "pineapple."
Graves conversations
The FBI investigated and searched other students' houses, but only charged Graves.

Similar incident happened at Kansas University

In conversations with co-conspirators, Graves told them he could not change grades too significantly. Last spring, Kansas University expelled a student for a similar scheme. The unnamed student — not charged — used a similar hardware keylogger to steal teachers' login credentials and modify grades. That student changed F grades to A grades and was caught almost immediately, a reason why Graves' scheme lasted for 21 months.
Because the damage of Graves' actions was over a $5,000 limit (investigation into the hack cost $67,500), authorities filed charges against Graves. If found guilty, he'll probably face probation and hours of community work, as most cases like these have concluded in the past.
Graves was also a member of the University's wrestling team.



Popular posts from this blog

NanoCore developper busted and senteced for 33 months

A hacker who was arrested and pleaded guilty last year—not because he hacked someone, but for creating and selling a remote access trojan that helped cyber criminals—has finally been sentenced to serve almost three years in prison.

Taylor Huddleston, 26, of Hot Springs, Arkansas, pleaded guilty in July 2017 to one charge of aiding and abetting computer intrusions by building and intentionally selling a remote access trojan (RAT), called NanoCore, to hackers for $25.

Huddleston was arrested in March, almost two months before the FBI raided his house in Hot Springs, Arkansas and left with his computers after 90 minutes, only to return eight weeks later with handcuffs.
This case is a rare example of the US Department of Justice (DOJ) charging someone not for actively using malware to hack victims' computers, but for developing and selling it to other cybercriminals.
Huddleston admitted to the court that he created his software knowing it would be used by other cybercrimina…

ICEMAN : Infecting Crystal Finance Millennium

Iceman gang member confirms that they are behind the introduction and spreading of malwares that have affected Crystal Finance Millennium, a Ukraine-based accounting software firm. Was this a political based attack? Read more to find out.
I’ve had a chance to speak to one of the gang member on XMMP and he confirmed that the Iceman group is behind this attack. They started by a simple web attack (SQLI which lead to web shell upload, no privilege escalation was needed) in order to gain access to the web servers of the company. He confirmed that the math was simple, the Ukrainian company had many clients in the financial and medical sector which facilitated the propagation of their malware. From the archived web page, it becomes apparent they provide accounting software, personalization of medical records, blood service and "full automation of the doctor's office" - contrary to what their company name suggests, it appears they are (mostly) focused on medical software.

KillaMuvz: Undercovered british hacker

The Briton Goncalo Esteves (24), also known as KillaMuvz, has pleaded guilty to charges related to creating and running malware services. The Briton Goncalo Esteves (24) has pleaded guilty to charges related to creating and running malware services.
Such kind of platforms allows crooks to improve the development of their malicious codes. The malware created with the Esteves’ malware services would not be detected by antivirus software.
Esteves that was used the moniker ‘KillaMuvz’ is the creator of Cryptex tool commonly used by vxers to encrypt their files in an effort to avoid the detection. The first version of Cryptex was released in October 2011 and was continuously improved.
According to the NCA, Esteves has pleaded guilty to two computer misuse charges and one count of money laundering, the sentence is planned for February 12. “A cyber criminal has admitted running a product-testing service for hackers following a joint investigation by the National Crime Agency (NCA) a…