Viw Magazine

Business Coach

.

  • Written by Nicholas Patterson, Lecturer, Deakin University
It's been reported that names, addresses, dates of birth, phone numbers, personal email addresses and emergency contact details, tax file numbers, payroll information, bank account details, passport details and student academic records were accessed. www.shutterstock.com

Today it was revealed the Australian National University (ANU) fell victim to a cyber security attack two weeks ago. Stolen was a substantial amount of data dating back 19 years relating to staff, students and visitors.

We don’t know for sure how long the cyber attackers were inside the ANU systems in this case. However, the university revealed details of other attempted attacks last year.


Read more: Hackers cause most data breaches, but accidents by normal people aren't far behind


The ABC reported that the types of data stolen were “names, addresses, dates of birth, phone numbers, personal email addresses and emergency contact details, tax file numbers, payroll information, bank account details, and passport details. Student academic records were also accessed.”

These are very critical data. Privacy and security are at risk when this sort of information, especially people’s personal and financial details, are hacked.

The question now is what will happen with the stolen data.

There are three likely outcomes:

1. Invitation to pay a ransom

The hackers who stole the data might ask ANU to pay a ransom and they will “erase” the data they stole (or at least say they will). If the ransom is not paid, they will probably release it to the public.

We have seen cases like this before around the world. A recent example involved stolen coding tools.

Another example is an attack on a German IT company, Citycomp, where hackers broke into its systems and stole a lot of critical data. Citycomp was asked to pay a ransom of $5,000 – but did not. The hackers published the data.

2. Free public release of data

The hackers may release the stolen data to the public without asking for any payment. This might happen as a show of strength, to provide evidence of their capabilities, or to cause chaos.

The consequences are still very serious in this case. It could lead to serious breaches of personal privacy, fake identities being created and important intellectual property becoming available to competitors or other hackers.

More broadly, the university may attract fines from the government if it was later found that correct data protection practices were not followed. That said, there is no evidence this is the case here.

3. Sell for profit on the dark web

The hackers may sell the data on the dark web to make a profit. Others could buy the data to create fake identities and as a result fake credit cards.

An example where hackers have stolen data involving up to 150 million users and sold it on the dark web involved Under Armour’s MyFitnessPal app.

The entire stolen data set is reportedly available for an asking price of less than $20,000 in bitcoin – around one year after the breach occurred.

Hackers are hard to stop

What makes this ANU case very interesting is that in 2018 The Guardian reported that ANU had spent many months fighting off a threat to its systems. There were unverified reports this might have come from hackers based in China.

This means the ANU has known it was being targeted for a while now, and was still not able to fend off the data breach revealed today.

You might ask why the university hadn’t bolstered its cyber defences in response. The answer is the ANU probably did, to the best of its abilities.

However, when you are dealing with elite hackers and those using “zero day exploits”, it means your chances of preventing a hack are quite limited. Zero day-based exploits focus on vulnerabilities that are not yet known to anti-malware companies or for which no targeted solutions are available, such as patches or updates.


Read more: From botnet to malware: a guide to decoding cybersecurity buzzwords


This is still a dangerous situation

There are still aspects of this situation that will present concerns to the ANU and its stakeholders.

For example, it’s possible the hackers could still be in the systems, but hidden. They may have user names and passwords for student accounts or hidden backdoors the university has not yet discovered.

It could be worse than we know

Another issue is whether the hackers have stolen even more data than is being reported.

It currently appears data not stolen includes “credit card details, travel information, medical records, police checks, workers’ compensation information, vehicle registration numbers, and some performance records”.

ANU vice-chancellor Brian Schmidt has said: “We have no evidence that research work has been affected. But the university may not yet know for sure. A very concerning aspect for the university will be the potential for intellectual property and unpublished academic works to be accessed. This could be very valuable to sell off online or even to other universities.”

This has happened before: Iranian hackers targeted 76 universities across 14 countries to steal intellectual property from research projects in 2018.

Only time will reveal what happens next. The bad news is that hackers have stolen critical data and it’s in the wind. The outcomes could be minimal or they could be disastrous, depending on the hackers’ intentions.

A big concern will be if the hackers still have access to the university systems, via an established backdoor, and are siphoning off critical data as it emerges.

Nicholas Patterson does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

Authors: Nicholas Patterson, Lecturer, Deakin University

Read more http://theconversation.com/19-years-of-personal-data-was-stolen-from-anu-it-could-show-up-on-the-dark-web-118265

Comprehensive Visitor Parking Solutions for Efficient Traffic Management

Ensure swift and smooth traffic with comprehensive visitor parking solutions! Optimize efficiency and manage traffic successfully.  Park...

Elevating Your Online Presence with Professional Web Design

A professional online presence is vital in today's digital age. It enables individuals to display their skills and accomplishments, promot...

High-Quality Wooden Tables: Add Elegance and Durability to Your Home Decor

Selecting the right furniture is pivotal in home decor. It helps to set your style, creates a comfort niche, and significantly impacts fun...

Architectural Panels: Transforming Spaces with Quality Suppliers

Architectural panels are a new addition to the buildings. They bring personality, aesthetic and functionality to the architectural proje...

Australia’s Weekend Gold Rush – Influencers Finding Fortune Inspire Travelers

More than half a million Australians watch Aussie blokes like Vo-Gus Prospecting or Sluice Box Karl pan for gold and precious finds in rem...

How to Style Your Living Room Around a Leather Sofa: Design Ideas and Inspiration

A leather sofa is not just a piece of furniture; it's a statement of sophistication and timeless elegance. Whether you've recently invest...

The Importance of Choosing Suitable Packing Tape for Your Application

When it comes to securing packages, whether for personal shipping or within a commercial setting, the selection of the right packing tape...

Enhancing Living and Working Conditions: The Role of Heating and Cooling Systems

Heating and cooling solutions are integral for both residential and commercial properties, ensuring optimal indoor temperature for comfort...

Navigating Regulatory Waters: Compliance Challenges in Banking Website Development

In the ever-evolving landscape of banking, where digital transformation is at the forefront, the development of banking websites presents ...

The Invisible Heroes: Recognizing the Impact of Facilities Management on Customer Experience

In the busy world of business, there are unsung stars who work hard behind the scenes to make sure everything runs smoothly, and people ha...

Exploring Removify Jobs: Understanding the Role and Impact of Content Removal Specialists

In today's digital world, online reputation management has become increasingly important for individuals and businesses alike. As the inte...

Pakistan FinMin Interested in Cryptocurrencies

Pakistan's stance on cryptocurrencies and the potential introduction of a central bank digital currency (CBDC) have garnered significant a...

Across Continents: USA to Australia Car Shipping Routes

Transporting Automobiles from the USA to Australia captures the lengthy ocean voyage that cars take from the American coast to the some ...

Exploring the Beauty and Benefits of the Indoor Plant Peperomia

In the world of indoor gardening, the peperomia plant stands out as a popular choice for its stunning foliage and easy-care nature. With...

Why You Should Choose Gourmet Catering in Sydney Over Cheap Catering

Catering can make or break an event. Whether it's a corporate function, a wedding, a birthday party, or a casual get-together, the quality...

Why are Hybrid Caravans Gaining in Popularity?

If you’re an avid outdoor adventurer or a beginner learning more about recreational vehicles, you’ll probably hear people often talk a...

The Key to Cleanliness: A Comprehensive Guide to Grease Trap Maintenance

Health is the top priority even in a city where hospitality is top characteristic. Here in the bustling kitchens, maintaining safety and h...

Revolutionizing Manufacturing: Unleashing the Full Potential of Stereolithography SLA 3D Printing

3D printing is changing how we make things, and Stereolithography (SLA) 3D printing is at the center of this change. Making models or prot...

Impact of Early Intervention on Hearing-Impaired Children

Early intervention plays a crucial role in shaping the lives of children with hearing impairments, providing them with the necessary suppo...

The Role of a Mortgage Broker in Handling Your Reverse Mortgage

Choosing the right reverse mortgage can be a daunting task, especially given the multitude of options and complex terms involved. A mortga...

Tomorrow Business Growth