UNSW targeted by hackers
- 21 January, 2013 16:14
The University of NSW (UNSW) has confirmed that it was subjected to a number of intrusion attacks against its servers by unidentified hackers during December 2012 and January 2013.
According to a UNSW spokesperson, the hacking commenced with scanning of the university’s network on 19 December.
“The first successful intrusion occurred on Christmas Day and that server was shut down on Boxing Day,” the spokesperson said.
Further attacks occurred during December and early January 2013. These were detected by staff on 3 January who shut down 25 affected servers and suspended a number of user accounts on 5 January.
“Staff directly affected by those  servers were advised immediately.
“Since then all staff have been notified. UNSW is progressively changing all staff passwords, including those for email accounts.”
According to the spokesperson, most of the affected servers were brought back online during the week beginning 14 January. UNSW operates a total of 1600 servers.
The spokesperson added that there is no indication the hackers succeeded in causing loss or damage to UNSW.
While no groups have claimed responsibility for the attacks, the university has engaged external experts to assist in the forensic investigation.
“We will await the conclusion of the forensic analysis before forming a view on the source,” said the spokesperson.
The attack follows an incident which occurred against the Australian Defence Force Academy (ADFA) in November last year where a hacker known as Darwinare managed to steal passwords stored in plain text.
Students at ADFA apply to the Defence Force and to UNSW Canberra, which runs the academic side of ADFA's operations in Canberra.
According to the UNSW spokesperson, there is “no evidence” that the attack on UNSW Canberra in 2012 was related to these new incidents.
Follow Hamish Barwick on Twitter: @HamishBarwick
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
CSO Spotlight: Security-as-a-Service Gaining Popularity
Organizations that are looking for security features including identity management, encryption and access control — and at the same time want to take advantage of the cost and flexibility benefits of the cloud —might check into security-as-a-service offerings available now from several vendors. Download now to find out more.
The SPARC Difference - Reduce Risks, Cut Costs, Power Innovation
Despite current economic factors, IT investment continues to be fueled by the need for better and more agile IT capabilities to support an enterprise’s business strategy, as well as to keep up with the rapidly changing demands of the ‘always-on’ user. However, budgets are squeezed and executives are under pressure to reduce capital expenditure and streamline administrative costs. A key strategy is to consolidate and refresh existing IT infrastructures. Download now to find out what technology can add value and enable you to change the shape of your IT budget and, to transform IT into a force for change and innovation.
How the Cloud Changes the Game for Line of Business Managers in Midsize Companies
It can be argued that what distinguishes midsize businesses most from large and small companies is not size, but attitude. While attitude alone cannot mitigate the challenges faced by midsize businesses, technology can help. And no technology offers more promise than the cloud. This paper, explores midsize business challenges from the perspective, not of the IT department, but of the line of business managers they support. Read on.