University of Sydney reports data breach affecting over 20,000 staff, affiliates

The University of Sydney disclosed a data breach that exposed personal data on tens of thousands of staff, students and alumni after hackers accessed one of its internal code libraries.

The university said it detected the incident last week in an online code repository used by its IT teams and quickly secured the system. While the platform was primarily used for software development, it also contained historical data from a retired system with names, dates of birth, phone numbers, home addresses and job-related details for employees at the university as of September 2018.

There is so far no evidence the data has been misused or published, according to Vice-President Nicole Gower.

“We are actively monitoring for any signs of use or publication and, should this occur, we will update you immediately,” he said.

An internal investigation is ongoing and is expected to continue into the new year. The university has also notified relevant government authorities. Officials said the breach was limited to a single platform and did not affect other university systems. The identity of the hackers remains unknown.

Preliminary findings indicate the compromised data includes personal information on around 20,500 current and former staff and affiliates, as well as historical datasets from 2010–2019 containing information on about 5,000 students and alumni, and six university supporters.

The University of Sydney is one of Australia’s oldest public research institutions, with more than 70,000 students and roughly 8,000 staff. It previously reported a cyber incident in 2023 involving a third-party service provider that exposed data on recently enrolled international applicants.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

DOJ charges gang for ATM hacks using Ploutus malware

Related Posts

Ukraine Aid Groups Targeted Through Fake Zoom Meetings and Weaponized PDF Files

Cybersecurity researchers have disclosed details of a coordinated spear-phishing campaign dubbed PhantomCaptcha targeting organizations associated with Ukraine's war relief efforts to deliver a remote access trojan that uses a WebSocket for command-and-control (C2). The activity, which took place on October 8, 2025, targeted individual members of the International Red Cross, Norwegian Refugee
Read More

New ChatGPT Atlas Browser Exploit Lets Attackers Plant Persistent Hidden Commands

Cybersecurity researchers have discovered a new vulnerability in OpenAI's ChatGPT Atlas web browser that could allow malicious actors to inject nefarious instructions into the artificial intelligence (AI)-powered assistant's memory and run arbitrary code. "This exploit can allow attackers to infect systems with malicious code, grant themselves access privileges, or deploy malware," LayerX
Read More