University of Sydney reports data breach affecting over 20,000 staff, affiliates

The University of Sydney disclosed a data breach that exposed personal data on tens of thousands of staff, students and alumni after hackers accessed one of its internal code libraries.

The university said it detected the incident last week in an online code repository used by its IT teams and quickly secured the system. While the platform was primarily used for software development, it also contained historical data from a retired system with names, dates of birth, phone numbers, home addresses and job-related details for employees at the university as of September 2018.

There is so far no evidence the data has been misused or published, according to Vice-President Nicole Gower.

“We are actively monitoring for any signs of use or publication and, should this occur, we will update you immediately,” he said.

An internal investigation is ongoing and is expected to continue into the new year. The university has also notified relevant government authorities. Officials said the breach was limited to a single platform and did not affect other university systems. The identity of the hackers remains unknown.

Preliminary findings indicate the compromised data includes personal information on around 20,500 current and former staff and affiliates, as well as historical datasets from 2010–2019 containing information on about 5,000 students and alumni, and six university supporters.

The University of Sydney is one of Australia’s oldest public research institutions, with more than 70,000 students and roughly 8,000 staff. It previously reported a cyber incident in 2023 involving a third-party service provider that exposed data on recently enrolled international applicants.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

DOJ charges gang for ATM hacks using Ploutus malware

Next Post

U.S. DOJ Charges 54 in ATM Jackpotting Scheme Using Ploutus Malware

Related Posts

MS Teams Guest Access Can Remove Defender Protection When Users Join External Tenants

Cybersecurity researchers have shed light on a cross-tenant blind spot that allows attackers to bypass Microsoft Defender for Office 365 protections via the guest access feature in Teams. "When users operate as guests in another tenant, their protections are determined entirely by that hosting environment, not by their home organization," Ontinue security researcher Rhys Downing said in a report
Read More