{"id":29454,"date":"2019-10-02T23:56:00","date_gmt":"2019-10-02T23:56:00","guid":{"rendered":"http:\/\/afceca01-ec8a-4891-8f35-8e9d19b210b6"},"modified":"2019-10-02T23:56:00","modified_gmt":"2019-10-02T23:56:00","slug":"anu-incident-report-on-massive-data-breach-is-a-must-read","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/anu-incident-report-on-massive-data-breach-is-a-must-read\/","title":{"rendered":"ANU incident report on massive data breach is a must-read"},"content":{"rendered":"<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/2019\/06\/04\/3e8f4544-211c-4df3-91b9-b629cadb8c75\/62f1d8da92edd1e82ba0f63b97fabf1e\/anu-campus-web.jpg\" class alt=\"anu-campus-web.jpg\"><\/span><span class=\"credit\">Image: ANU<\/span><\/p>\n<p>&#8220;This report from ANU is an example to everyone else of how to deal with cyberattacks,&#8221; <a href=\"https:\/\/twitter.com\/VTeagueAus\/status\/1179297071943360512\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">tweeted Vanessa Teague<\/a>, associate professor in cybersecurity at the University of Melbourne, on Wednesday.<\/p>\n<p>&#8220;Honest, technical, detailed, and full of good advice for protecting data. Attacks will keep happening. This is the way to understand them and learn to improve our defences.&#8221;<\/p>\n<p>She&#8217;s right.<\/p>\n<p>The report in question is a <a href=\"https:\/\/imagedepot.anu.edu.au\/scapa\/Website\/SCAPA190209_Public_report_web_2.pdf\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">detailed incident report [PDF]<\/a>&nbsp;of the <a href=\"https:\/\/www.zdnet.com\/article\/australian-national-university-breached-with-19-years-of-data-accessed\/\">massive data breach<\/a> suffered by Australian National University (ANU) in late 2018, discovered in May 2019, and revealed two weeks later in June.<\/p>\n<p>The hackers had gained access to up to 19 years&#8217; worth of data in the university&#8217;s Enterprise Systems Domain (ESD), which houses its human resources, financial management, student administration, and &#8220;enterprise e-forms systems&#8221;.<\/p>\n<p>ANU&#8217;s vice-chancellor and president, Professor Brian Schmidt, had committed to making the breach investigation public. This report more than delivers on that promise. It&#8217;s a must-read.<\/p>\n<p>&#8220;The perpetrators of our data breach were extremely sophisticated. This report details the level of sophistication, the likes of which has shocked even the most experienced Australian security experts,&#8221; Schmidt wrote this week.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>The report details how the attackers organised four separate spearphishing campaigns and built their data exfiltration infrastructure on compromised web servers and legacy systems.<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/anu-incident-report-on-massive-data-breach-a-must-read\/\" class=\"lazy\" alt=\"anu-hack-diagram.png\" data-original=\" https:\/\/zdnet4.cbsistatic.com\/hub\/i\/2019\/10\/02\/354118fe-1f10-440a-83ad-3b68a82ea60e\/c91474d7f6c83c0dfb2bd3021f11fccd\/anu-hack-diagram.png\"><\/span><noscript><\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/2019\/10\/02\/354118fe-1f10-440a-83ad-3b68a82ea60e\/c91474d7f6c83c0dfb2bd3021f11fccd\/anu-hack-diagram.png\" class alt=\"anu-hack-diagram.png\"><\/span><\/p>\n<p><\/noscript> <span class=\"credit\">Image: ANU<\/span><\/p>\n<p>&#8220;In addition to their efficiency and precision, the actor evaded detection systems, evolved their techniques during the campaign, used custom malware, and demonstrated an exceptional degree of operational security that left few traces of their activities,&#8221; the report said.<\/p>\n<p><strong>The attacker&#8217;s tradecraft included:<\/strong><\/p>\n<ul>\n<li>Altering the signatures of more common malware to avoid detection<\/li>\n<li>Assembling malware and some tools inside the ANU network after a foothold had been established. Individual components did not trigger endpoint protection<\/li>\n<li>Downloading &#8220;several types of virtualisation software before selecting one&#8221;<\/li>\n<li>Downloading disk images for Windows XP and Kali Linux, although &#8220;there is little evidence to suggest much use of Kali Linux&#8221;<\/li>\n<li>Compiling bespoke malware within the ANU network to gain access to ESD. &#8220;The purpose of this code remains unknown, and no forensic traces of it or the executable file which was compiled from the code have been found at the time of this report,&#8221; the report said<\/li>\n<\/ul>\n<p>&#8220;The actor&#8217;s use of a third-party tool to extract data directly from the underlying databases of our administrative systems effectively bypassed application-level logging. Safeguards against this happening again have been implemented,&#8221; the report said.<\/p>\n<p>The attackers even tried to maximise the effectiveness of their spearphishing efforts by attempting to disable the university&#8217;s email spam filters, although &#8220;there is no forensic evidence to suggest that they were successful in this attempt&#8221;.<\/p>\n<p>ANU&#8217;s analysis shows that the attackers exfiltrated much less data than the 19 years&#8217; worth that was originally feared, but does not show exactly what was taken.<\/p>\n<p>&#8220;Despite our considerable forensic work, we have not been able to determine, accurately, which records were taken &#8230; We also knew the stolen data has not been further misused,&#8221; Schmidt wrote.<\/p>\n<p>&#8220;Frustratingly this brings us no closer to the motivations of the actor.&#8221;<\/p>\n<p>Even though the attacker had gained broader access, ANU said it&#8217;s clear from the pathway taken that their sole aim was to penetrate ESD.<\/p>\n<p>&#8220;There is no forensic evidence to suggest the actor accessed or displayed any interest in files containing general administrative documents or research data; nor was the ANU Enterprise Records Management System (ERMS) affected,&#8221; the report said.<\/p>\n<p>&#8220;It is worth noting that ANU was subject to further intrusion attempts within one hour of the public announcement and on the following day, both of which were stopped.&#8221;<\/p>\n<p>ANU has declined to attribute the attack to any particular adversary.<\/p>\n<p>For years now, chief information security officers (CISOs) and others have been telling organisations to share cybersecurity information to improve their defences. But few do, except perhaps as secret squirrels within their own closed industry groups.<\/p>\n<p>In the past, I&#8217;ve been <a href=\"https:\/\/www.zdnet.com\/article\/cyber-cooperation-leads-to-cybersecurity-so-why-wont-australia-cyber-do-it\/\">highly sceptical<\/a> about whether all this cyber collaboration talk would ever become cyber action. ANU has now set the example. Who will follow?<\/p>\n<h3>Related Coverage<\/h3>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/anu-to-design-artificial-intelligence-framework-with-australian-values\/\">ANU to design artificial intelligence framework with Australian values<\/a><\/strong><\/p>\n<p>The researchers involved hope the design framework can be widely deployed.<\/p>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/anu-claims-australians-want-government-to-use-data-for-better-targeted-benefits\/\">ANU claims Australians want government to use data for better-targeted benefits<\/a><\/strong><\/p>\n<p>Respondents to its survey said they wanted the data to be used to make sure the right people were receiving the right benefits, the Australian National University has reported.<\/p>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/anu-applies-space-tech-to-predict-future-droughts-and-bushfires\/\">ANU applies space tech to predict future droughts and bushfires<\/a><\/strong><\/p>\n<p>The university used space technology to predict droughts and increased bushfire risk up to five months in advance.<\/p>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/cyberwars-strategic-value-unclear-hugh-white\/\">Cyberwar&#8217;s strategic value &#8216;unclear&#8217;: Hugh White<\/a><\/strong><\/p>\n<p>Cybers are a cheap and effective deterrent, says one of Australia&#8217;s leading strategic analysts. But wars will still be fought in the &#8220;boring old real world&#8221;, so let&#8217;s reconsider nukes.<\/p>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/anu-successfully-measures-light-for-quantum-internet-data-transfer\/\">ANU successfully measures light for quantum internet data transfer<\/a><\/strong><\/p>\n<p>The quantum internet will require fast-moving data and the Australian National University believes it has found a way to measure information stored in light particles which will pave the way for a safe &#8220;data superhighway&#8221;.<\/p>\n<p><strong><a href=\"https:\/\/www.techrepublic.com\/article\/how-to-quickly-deploy-a-honeypot-with-kali-linux\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">How to quickly deploy a honeypot with Kali Linux<\/a><\/strong> (TechRepublic)<\/p>\n<p>Lure possible attackers into a trap with a Kali Linux honeypot.<\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/anu-incident-report-on-massive-data-breach-a-must-read\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Australian National University has set a new standard for transparent data breach reporting. They didn&#8217;t lose all 19 years of data, but they&#8217;re no closer to understanding the attacker&#8217;s motives.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":29455,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-29454","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ANU incident report on massive data breach is a must-read 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/anu-incident-report-on-massive-data-breach-is-a-must-read\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ANU incident report on massive data breach is a must-read 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/anu-incident-report-on-massive-data-breach-is-a-must-read\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-02T23:56:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/anu-incident-report-on-massive-data-breach-is-a-must-read.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"920\" \/>\n\t<meta property=\"og:image:height\" content=\"518\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/anu-incident-report-on-massive-data-breach-is-a-must-read\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/anu-incident-report-on-massive-data-breach-is-a-must-read\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"ANU incident report on massive data breach is a must-read\",\"datePublished\":\"2019-10-02T23:56:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/anu-incident-report-on-massive-data-breach-is-a-must-read\\\/\"},\"wordCount\":884,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/anu-incident-report-on-massive-data-breach-is-a-must-read\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/anu-incident-report-on-massive-data-breach-is-a-must-read.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/anu-incident-report-on-massive-data-breach-is-a-must-read\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/anu-incident-report-on-massive-data-breach-is-a-must-read\\\/\",\"name\":\"ANU incident report on massive data breach is a must-read 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/anu-incident-report-on-massive-data-breach-is-a-must-read\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/anu-incident-report-on-massive-data-breach-is-a-must-read\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/anu-incident-report-on-massive-data-breach-is-a-must-read.jpg\",\"datePublished\":\"2019-10-02T23:56:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/anu-incident-report-on-massive-data-breach-is-a-must-read\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/anu-incident-report-on-massive-data-breach-is-a-must-read\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/anu-incident-report-on-massive-data-breach-is-a-must-read\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/anu-incident-report-on-massive-data-breach-is-a-must-read.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/anu-incident-report-on-massive-data-breach-is-a-must-read.jpg\",\"width\":920,\"height\":518},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/anu-incident-report-on-massive-data-breach-is-a-must-read\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ANU incident report on massive data breach is a must-read\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ANU incident report on massive data breach is a must-read 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/anu-incident-report-on-massive-data-breach-is-a-must-read\/","og_locale":"en_US","og_type":"article","og_title":"ANU incident report on massive data breach is a must-read 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/anu-incident-report-on-massive-data-breach-is-a-must-read\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-10-02T23:56:00+00:00","og_image":[{"width":920,"height":518,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/anu-incident-report-on-massive-data-breach-is-a-must-read.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/anu-incident-report-on-massive-data-breach-is-a-must-read\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/anu-incident-report-on-massive-data-breach-is-a-must-read\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"ANU incident report on massive data breach is a must-read","datePublished":"2019-10-02T23:56:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/anu-incident-report-on-massive-data-breach-is-a-must-read\/"},"wordCount":884,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/anu-incident-report-on-massive-data-breach-is-a-must-read\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/anu-incident-report-on-massive-data-breach-is-a-must-read.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/anu-incident-report-on-massive-data-breach-is-a-must-read\/","url":"https:\/\/www.threatshub.org\/blog\/anu-incident-report-on-massive-data-breach-is-a-must-read\/","name":"ANU incident report on massive data breach is a must-read 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/anu-incident-report-on-massive-data-breach-is-a-must-read\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/anu-incident-report-on-massive-data-breach-is-a-must-read\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/anu-incident-report-on-massive-data-breach-is-a-must-read.jpg","datePublished":"2019-10-02T23:56:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/anu-incident-report-on-massive-data-breach-is-a-must-read\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/anu-incident-report-on-massive-data-breach-is-a-must-read\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/anu-incident-report-on-massive-data-breach-is-a-must-read\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/anu-incident-report-on-massive-data-breach-is-a-must-read.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/anu-incident-report-on-massive-data-breach-is-a-must-read.jpg","width":920,"height":518},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/anu-incident-report-on-massive-data-breach-is-a-must-read\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"ANU incident report on massive data breach is a must-read"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/29454","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=29454"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/29454\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/29455"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=29454"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=29454"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=29454"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}