Utah District Court
CMECF Updates
Thursday, October 19, 2006
  Are Keyloggers Watching You?
According to a letter sent to clerks of district and bankruptcy courts, the United States Computer Emergency Readiness Team (US-CERT), a part of Homeland Security, has notified the Administrative Office of the United States Courts (AOUSC) that a number of user accounts which access PACER and/or CM-ECF systems are infected with keystroke logging programs, also called keyloggers.
Keyloggers are a form of computer software designed to infiltrate or damage a computer system without the owner's knowledge. The software is installed when a user opens an infected e-mail file or through exploitation of a security vulnerability on a system. Keyloggers are usually configured to capture account names and passwords and pass the captured information to a drop-site owned by a hacker. Keyloggers are usually after financial account access.
The AOUSC has notified the affected users of the detected infection on their machines, and the fact that their PACER and/or CM/ECF names and passwords (and quite likely their banking and client communications accounts) have been compromised. Even if you have not received such a notification, it is prudent for all computer users to check all computers which are used for access to accounts of any kind, run an anti-spyware or anti-viral program and follow the advice it provides. To combat the return of a keylogger, the computers that you use should be running up-to-date detection programs and computer operating systems should be running with the latest versions released by the operating system vendor.
Once a computer is infected with malicious software (malware), the only sure method of removing it is to backup all data, and reinstall the operating system and all programs. Once a keyloggger has been removed users must change the PACER and CM/ECF filer passwords, along with all other passwords in use for financial account access, etc. Changing passwords before removing the keylogger or without installing anti-viral and anti-spyware software will not solve the problem.
The court’s PACER and CM/ECF systems are NOT compromised and keylogging has not infected any judiciary servers or client machines.
Comments: Post a Comment

<< Home
Unofficial information regarding Utah District Court CM/ECF Electronic Filing.

Official Information 
Log in to CM/ECF

Send any corrections to mj.nuffer@utd.uscourts.gov
Get a feed at http://utd-cmecf.blogspot.com/atom.xml

Location: Salt Lake City, Utah, United States
December 2004 / January 2005 / February 2005 / March 2005 / April 2005 / May 2005 / June 2005 / July 2005 / September 2005 / October 2005 / November 2005 / December 2005 / January 2006 / February 2006 / March 2006 / April 2006 / May 2006 / June 2006 / July 2006 / August 2006 / September 2006 / October 2006 / November 2006 / December 2006 / February 2007 / March 2007 / June 2007 / July 2007 / August 2007 / October 2007 / November 2007 / January 2008 / February 2008 / March 2008 / April 2008 / May 2008 / July 2008 / September 2008 / October 2008 / November 2008 / December 2008 / January 2009 / March 2009 / April 2009 / July 2009 / September 2009 / October 2009 / January 2010 /

Powered by Blogger