麻豆社madou

Media contact

Cecilia Duong
麻豆社madou News & Content
02 9065 1740
cecilia.duong@unsw.edu.au

In the past three weeks, three cyber attacks resulted in identity leaks that have sent ripples around the nation.聽

Has the triple-A of cyber security (Authentication, Authorisation and Accounting) failed?聽

In the recent MyDeal.com.au incident, early reports suggest that a compromised credential, most likely related to elevated users, was used to access a database storing user information. The attack led to the scrambling of 2.2 million customers聽data, which included email addresses, full names, phone numbers, delivery addresses and some customers鈥 birthdates.

, Professor聽Sanjay Jha, Chief Scientist for 麻豆社madou Institute for Cybersecurity (IFCYBER), said: "鈥 the breach raises serious concerns for the end user's confidence in using online services and poses a serious challenge for the industry鈥.

鈥淐ompromised credentials should not provide easy access to malicious actors when multi-factor authentication (MFA) is in place,鈥 he added.

鈥淵ou would expect more stringent authorisation and access control and network partitioning to protect these critical assets.鈥

Read more:聽

Safely navigating the digital world

Following basic practices聽on Cyber Security Guidelines聽listed by the Australian Cyber Security Centre can help a business protect their systems from cyber threats.

Dr Arash Shaghaghi, a Senior Lecturer in Cybersecurity from the 麻豆社madou School of Computer Science and Engineering and 麻豆社madou Institute for Cybersecurity, says it鈥檚 evident from the recent attacks that some industries are not adopting the latest research on cybersecurity fast enough.

鈥淯sers' data is collected by various services without any control from the end user, and often the data collection to join these services is excessive 鈥 leaving end users vulnerable and with limited options when a serious breach occurs,鈥 he says.

鈥淥ther parts of the world are investing heavily in technological measures such as Self-sovereign identity (SSI), where users would have better control over who has access to what part of user identity and other information.聽

鈥淪SI gives individuals control over the information they use to prove who they are to websites, services聽and applications across the web.聽

鈥淲e need to enhance investment in practical research and think of measures that facilitate the adoption of the latest technologies to reinforce our resiliency against the growing number of attacks targeting Australia.鈥

Read more:聽

Optus

Last month, 10 million Optus customers experienced a similar fate when cyber criminals hacked into the system, stealing personal details such as passport ID and licence numbers. It was reported the breach suggests that an open port without authentication for testing purposes was left in the production version.

Unfortunately, these problems are well-known聽to the industry, says Prof. Jha.

鈥淎bout five years ago, we were white boxing early versions of Philip Hue bulbs and Phillip Hue Bridge. We found that you could control these devices through such open ports,鈥 he says.

鈥淭his was reported to the company who fixed the problem聽in their future version.聽 A simple penetration testing of servers before deployment could have potentially made such attacks difficult, if not impossible.鈥澛

Prof. Jha is also concerned about the state of risk assessment and authorisation processes across the industry and says further stringent penalties for negligence would go a long way.

Often these processes are a box-ticking exercise in an Excel spreadsheet, and many conducting these tasks don鈥檛 have adequate background in cybersecurity, he says.

鈥淭his re-emphasises the need for quality education along with more research in quality tools to improve these processes,鈥 says Prof. Jha.

鈥淢y team is working on such tools for a Distributed Energy Resource Management Security project at 麻豆社madou funded by .

鈥淐yber Security is a cat-and-mouse game.聽Researchers and industry experts need to come together in Australia and work closely to build stronger and more resilient capabilities that help safeguard businesses and users in today鈥檚 world of cyber war and cyber terrorism.

"We need to regain the community's confidence in our cyber capabilities."聽