{"id":848,"date":"2021-02-15T11:37:00","date_gmt":"2021-02-15T11:37:00","guid":{"rendered":"https:\/\/dev.cryptoloc.au\/?p=848"},"modified":"2023-10-03T06:22:34","modified_gmt":"2023-10-03T06:22:34","slug":"hacks-in-history-what-businesses-can-learn-from-the-anu-cyber-attack","status":"publish","type":"post","link":"https:\/\/127.0.0.1\/hacks-in-history-what-businesses-can-learn-from-the-anu-cyber-attack\/","title":{"rendered":"Hacks in history: What businesses can learn from the ANU cyber attack"},"content":{"rendered":"\n

In a cyber attack so sophisticated that it shocked even the most experienced Australian experts, hackers gained access to the computer system of the Australian National University (ANU) in 2018. Here\u2019s what the attack can teach us about how we can protect ourselves today.<\/strong><\/p>\n\n\n\n

According to a public incident report released by the University in 2019<\/a>, hackers spent weeks quietly trawling through data stored in ANU\u2019s system. It was months before anyone at the institution even realised there had been a breach.<\/p>\n\n\n\n

The report traces the hack back to an email sent by a senior ANU staff member in November 2018. The email was previewed, but never clicked on, by another staff member who had access to their colleague\u2019s account.<\/p>\n\n\n\n

Although the email was swiftly deleted, the hackers had already gained access to the senior staff member\u2019s username, password and calendar. From there, they were able to access and compromise the ANU computer network.<\/p>\n\n\n\n

Despite a forensic investigation, the full extent of the attack and the motivation behind it is still unknown, because the hackers were so meticulous in clearing their tracks. However, investigators say names, addresses, phone numbers, dates of birth, payroll information, tax file numbers, bank account details and student academic records were stolen.<\/p>\n\n\n\n

Cyber security expert Mark McPherson, a member of Cryptoloc\u2019s advisory board, says the breach of ANU\u2019s administrative systems appears to have been accomplished by determined hackers. He says they acted systematically, and with a sophistication of forethought indicating they were:<\/p>\n\n\n\n