University of Sydney reports data breach affecting over 20,000 staff, affiliates

The University of Sydney disclosed a data breach that exposed personal data on tens of thousands of staff, students and alumni after hackers accessed one of its internal code libraries.

The university said it detected the incident last week in an online code repository used by its IT teams and quickly secured the system. While the platform was primarily used for software development, it also contained historical data from a retired system with names, dates of birth, phone numbers, home addresses and job-related details for employees at the university as of September 2018.

There is so far no evidence the data has been misused or published, according to Vice-President Nicole Gower.

“We are actively monitoring for any signs of use or publication and, should this occur, we will update you immediately,” he said.

An internal investigation is ongoing and is expected to continue into the new year. The university has also notified relevant government authorities. Officials said the breach was limited to a single platform and did not affect other university systems. The identity of the hackers remains unknown.

Preliminary findings indicate the compromised data includes personal information on around 20,500 current and former staff and affiliates, as well as historical datasets from 2010–2019 containing information on about 5,000 students and alumni, and six university supporters.

The University of Sydney is one of Australia’s oldest public research institutions, with more than 70,000 students and roughly 8,000 staff. It previously reported a cyber incident in 2023 involving a third-party service provider that exposed data on recently enrolled international applicants.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

DOJ charges gang for ATM hacks using Ploutus malware

Next Post

U.S. DOJ Charges 54 in ATM Jackpotting Scheme Using Ploutus Malware

Related Posts

Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001)

A recently disclosed security flaw impacting 7-Zip has come under active exploitation in the wild, according to an advisory issued by the U.K. NHS England Digital on Tuesday. The vulnerability in question is CVE-2025-11001 (CVSS score: 7.0), which allows remote attackers to execute arbitrary code. It has been addressed in 7-Zip version 25.00 released in July 2025. "The specific flaw exists
Read More

Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks

Israeli entities spanning academia, engineering, local government, manufacturing, technology, transportation, and utilities sectors have emerged as the target of a new set of attacks undertaken by Iranian nation-state actors that have delivered a previously undocumented backdoor called MuddyViper. The activity has been attributed by ESET to a hacking group known as MuddyWater (aka Mango
Read More