University of Sydney reports data breach affecting over 20,000 staff, affiliates

The University of Sydney disclosed a data breach that exposed personal data on tens of thousands of staff, students and alumni after hackers accessed one of its internal code libraries.

The university said it detected the incident last week in an online code repository used by its IT teams and quickly secured the system. While the platform was primarily used for software development, it also contained historical data from a retired system with names, dates of birth, phone numbers, home addresses and job-related details for employees at the university as of September 2018.

There is so far no evidence the data has been misused or published, according to Vice-President Nicole Gower.

“We are actively monitoring for any signs of use or publication and, should this occur, we will update you immediately,” he said.

An internal investigation is ongoing and is expected to continue into the new year. The university has also notified relevant government authorities. Officials said the breach was limited to a single platform and did not affect other university systems. The identity of the hackers remains unknown.

Preliminary findings indicate the compromised data includes personal information on around 20,500 current and former staff and affiliates, as well as historical datasets from 2010–2019 containing information on about 5,000 students and alumni, and six university supporters.

The University of Sydney is one of Australia’s oldest public research institutions, with more than 70,000 students and roughly 8,000 staff. It previously reported a cyber incident in 2023 involving a third-party service provider that exposed data on recently enrolled international applicants.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

DOJ charges gang for ATM hacks using Ploutus malware

Related Posts

Experts Confirm JS#SMUGGLER Uses Compromised Sites to Deploy NetSupport RAT

Cybersecurity researchers are calling attention to a new campaign dubbed JS#SMUGGLER that has been observed leveraging compromised websites as a distribution vector for a remote access trojan named NetSupport RAT. The attack chain, analyzed by Securonix, involves three main moving parts: An obfuscated JavaScript loader injected into a website, an HTML Application (HTA) that runs encrypted
Read More

Enterprise Credentials at Risk – Same Old, Same Old?

Imagine this: Sarah from accounting gets what looks like a routine password reset email from your organization’s cloud provider. She clicks the link, types in her credentials, and goes back to her spreadsheet. But unknown to her, she’s just made a big mistake. Sarah just accidentally handed over her login details to cybercriminals who are laughing all the way to their dark web
Read More