Security Market Segment LS
Tuesday, 18 June 2019 08:50

Attackers use phishing to gain access to ACU staff data Featured

Attackers use phishing to gain access to ACU staff data Image by Nikolay Georgiev from Pixabay

The Australian Catholic University has been hit by a data breach, with the attacker(s) using a phishing email to trick users into revealing their credentials on a fake ACU login page.

The ACU has three public websites, with the main one running on Linux, while two others, which allow staff to log in, run on Windows Server 2008.

The breach was discovered on 22 May, the university's acting vice-chancellor, Dr Stephen Weller, said in a statement, adding that a number of staff email accounts and some University systems had been compromised.

iTWire asked the ACU for further details on which systems were compromised and also pointed out that two systems — and — appeared to be running on Windows Server 2008 which has stopped receiving service packs from Microsoft.

In a response on Tuesday evening, an ACU spokesperson said: "All of our servers are operating within service agreements and are in support from Microsoft as per our internal audits. Processes are well in hand to ensure that any legacy servers are migrated before that support and security updates come to an end.”

Emails, calendar details and bank account details of the staff in question were stolen by the attacker(s).

The ACU is the second university to report a breach this month. On 4 June, the Australian National University announced a massive data breach with personal details of staff, students and visitors over the past 19 years exposed. That infiltration took place in 2018.

Dr Weller said the ACU had taken the following actions after the breach was discovered:

  • contacted each person identified as being directly affected;
  • reset the accounts of those whose accounts had been breached;
  • notified ACU’s bank about potentially fraudulent activity;
  • notified the Tertiary Education Quality and Standards Agency (TEQSA);
  • notified the Office of the Australian Information Commissioner (OAIC); and
  • alerted the Australian Cybercrime Online Reporting Network (ACORN).

The ACU has about 35,000 students in seven campuses locally and an international campus in Rome. There is one campus in Melbourne on Victoria Parade and two campuses in Sydney at Strathfield and North Sydney.

Commenting on the incident, Adam Biviano, senior manager for solution architecture at identity and access management software company ForgeRock, said: "Once again, the education sector finds itself in the crosshairs of determined cyber criminals. Universities are an alluring target, given the sheer amount of data records they store and manage.

"In this instance, the data breach originated from a phishing attack and comes a mere fortnight after the Australian National University revealed it also fell victim to a hack where a significant amount of student and staff data was accessed.

"With today’s threat landscape in constant evolution, organisations need to consider context aware intelligent authentication options which are stronger than passwords without the additional friction of conventional multi-factor systems."

Alvin Rodrigues, senior cyber strategist at security outfit Forcepoint, said: “This is the second data breach attack on a top Australian education institute in this month alone, and highlights the fallibility of employees when it comes to safeguarding against vicious cyber attacks.

"Organisations today need to rethink their security posture, and look at it from an inside-out approach. In today’s mobile and cloud-first business environment users and data must be at the centre of security-by-design thinking.

"By taking a behaviour-centric approach to security and creating a baseline understanding of all 'normal' behaviour of digital identities on a network, it can show when a user isn’t who they pretend to be, thus enabling faster identification and classification of outlier and risky behaviour.

"If a digital identity is compromised, human-centric security can help identify deviation from its 'normal' behavioural patterns and trigger an alert that security administrators can react to quickly, as well as a create relevant automated enforcement response based on that identity’s elevated risk score.”

Another security professional, Tyler Moffitt, a senior threat research analyst at Webroot, said the education sector was a hotspot for attacks, for the simple reason that cyber security budgets and IT staff strength tended to be lacking in numbers.

"The ACU breach reflects how phishing remains the simplest and most effective means of infiltration," he said. "User education should never be under-estimated and is arguably the most cost-effective approach to improving the security posture of any organisation - especially against phishing attacks.

"Employees and users of a university’s IT systems must be educated on the risks associated with phishing, with regular training and phishing simulations essential to ensuring robust security.

"Fundamentally, organisations must realise that cyber criminals only need to find one hole in their defences to do serious damage, and that usually lands on the weakest link – the uneducated end user.”

Read 3385 times

Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here


The past year has seen a meteoric rise in ransomware incidents worldwide.

Over the past 12 months, SonicWall Capture Labs threat researchers have diligently tracked the meteoric rise in cyberattacks, as well as trends and activity across all threat vectors, including:

Encrypted threats
IoT malware
Zero-day attacks and more

These exclusive findings are now available via the 2022 SonicWall Cyber Threat Report, which ensures SMBs, government agencies, enterprises and other organizations have the actionable threat intelligence needed to combat the rising tide of cybercrime.

Click the button below to get the report.



It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site and prominent Newsletter promotion and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.


Sam Varghese

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

Share News tips for the iTWire Journalists? Your tip will be anonymous




Guest Opinion

Guest Interviews

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News