Matthew Miller, Author at Techbest - Top Tech Reviews In Australia - Page 78 of 85

HUAWEI FreeBuds 5i Wireless Earphone Review


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

HUAWEI FreeBuds 5i Wireless Earphone, Bluetooth Earbuds, Hi-Res sound, 42dB multi-mode noise cancellation, 28hr battery life, Dual device connect, Water resistance, Nebula Black (Official AU Store)

Cyber Intruders Infiltrate Western Sydney Uni: Isilon Storage Affected for Eight Months


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

“`html

Data Compromise at Western Sydney University: Isilon Storage Affected

Data Compromise at Western Sydney University: Isilon Storage Affected

Quick Overview

  • Western Sydney University faced a breach lasting more than eight months.
  • Intruders gained access to 83 out of the 400 Isilon storage directories.
  • A total of 580TB of data was compromised, including personal and confidential information.
  • The breach originated from an initial attack on the Microsoft 365 platform.
  • Investigations are actively being conducted by federal and state bodies.
Western Sydney Uni intruders accessed Isilon storage directories over eight months

Western Sydney University has disclosed a substantial data compromise that persisted for over eight months, impacting 580TB of data within its Isilon storage framework. The incident led to the exposure of personally identifiable and sensitive details from 83 of the 400 directories contained in the Isilon system.

Insights into the Breach

Isilon, a network-attached storage solution originally created by a company bearing the same name and later taken over by EMC (currently a part of Dell), was the core target. The breached storage included My Documents entries, departmental shared directories, and various forms of backup and archived files.

The university indicated that students and staff utilize centralized network storage to access their personal My Documents, which includes desktop content, downloads, favorites, and internet browsing history. This allows for an individual’s My Documents to be retrievable on any computer connected to the Western network.

Chronology and Extent of the Breach

Investigative findings suggest that unauthorized entry into the Isilon storage took place from July 9, 2023, until March 16, 2024. The preliminary analysis uncovered that sensitive data such as names, contact information, birth dates, health data, workplace behavior data, and financial information had been accessed.

Fortunately, since remediation efforts began on March 16, the university has not observed any additional unauthorized access. Furthermore, there have been no threats regarding the disclosing or publishing of the compromised data, nor has any information surfaced on the dark web.

Initial Breach and Ongoing Investigations

The security vulnerabilities at Western Sydney University trace back to an initial breach of its Microsoft 365 environment in May of the previous year. While there is no evidence of intruder access beyond the Microsoft Office 365 and Isilon environments, the specifics regarding how lateral movement transpired have not been made public.

Authorities at both federal and state levels, including the Cybercrime Squad of the NSW Police Force operating under Strike Force GIRRAKOOL, are currently investigating the matter.

University’s Reaction and Alerts

Western Sydney University has pledged to inform all individuals affected by the Isilon breach. However, it has noted that it may not be feasible to identify every individual impacted.

The university stated that the attackers gained access to “83 of the 400 directories in Isilon,” along with a cache of personally identifiable and sensitive information.

Conclusion

The data compromise at Western Sydney University underscores the essential necessity for robust cybersecurity practices. The extended breach of the Isilon storage system has exposed significant volumes of personal and confidential information, highlighting the urgency for heightened vigilance and advanced security measures. The university is collaborating with authorities to investigate and alleviate the situation, ensuring that similar incidents are prevented in the future.

FAQ: Essential Questions Addressed

Q: What type of data was compromised during the breach?

A:

The breach revealed personally identifiable information, including names, contact details, birth dates, health-related information, workplace behavior data, government identification numbers, tax file IDs, superannuation information, and bank account details.

Q: How long did the intruders have access to the Isilon storage?

A:

Intruders had unauthorized access to the Isilon storage system for a duration exceeding eight months, from July 9, 2023, to March 16, 2024.

Q: What measures has the university taken since the breach was identified?

A:

Following the detection of the breach, the university implemented remediation measures on March 16, and no further unauthorized access has since been recorded. They are also making efforts to notify all affected individuals and are cooperating with authorities for a comprehensive investigation.

Q: Has any of the compromised data been leaked or threatened with release?

A:

To date, there have been no threats to disclose or publish the compromised data, nor has any of the information appeared on the dark web.

Q: What was the initial cause of the data breach?

A:

The data breach originates from an initial compromise within the university’s Microsoft 365 environment in May of the previous year.

Q: Which storage system was the target of the breach?

A:

The compromised system was Isilon, a network-attached storage solution originally developed by Isilon Systems, later acquired by EMC and now part of Dell.

Q: Are any investigations still in progress?

A:

Yes, both federal and state authorities, including the Cybercrime Squad of the NSW Police Force, are conducting an inquiry under Strike Force GIRRAKOOL.

“`

Denon PerL in-Ear True Wireless Earbuds Review


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Denon PerL in-Ear True Wireless Earbuds with Personalised Sound

Samsung Galaxy Buds2 Pro, Bora Purple Review


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Samsung Galaxy Buds2 Pro, Bora Purple

Wireless Running Headphones Review


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Bluetooth Headphones, Deep Bass Wireless Running Headphones w/16 Hrs Playtime, Bluetooth Earbuds in-Ear w/Earhooks, IPX7 Waterproof Sports Earphones with Microphone for Calls

Realme Buds Air 5 Pro Wireless Earbuds Review


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Realme Buds Air 5 Pro Wireless Earbuds with 50 dB Active Noise Cancelling (Sunrise Beige)

Skullcandy Grind Wireless Earbuds Review


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Skullcandy Grind in-Ear Wireless Earbuds, 40 Hr Battery, Skull-iQ, Alexa Enabled, Microphone, Works with iPhone Android and Bluetooth Devices – Dark Blue/Green

Yamaha TW-E3B True Wireless Earphones Review


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Yamaha TW-E3B True Wireless Earphones with Listening Care, Black

North Korean Cybercriminals Charged with Illegally Obtaining Military Intelligence by the United States and Partner Countries


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

“`html

US and Allied Nations Accuse North Korean Hackers of Military Secrets Theft – TechBest

US and Allied Nations Accuse North Korean Hackers of Military Secrets Theft

North Korean hackers accused of stealing military secrets by US and allies

Quick Summary

  • Hackers from North Korea, referred to as Anadriel or APT45, targeted global military intelligence.
  • This group is thought to be connected to North Korea’s Reconnaissance General Bureau.
  • Their cyberattacks hit NASA, US Air Force Bases, and other defense companies.
  • Ransomware was utilized to finance their activities, including attacks on US hospitals.
  • Rim Jong Hyok, one of the hackers, has been charged by the US Justice Department.
  • The FBI offers a reward of $15.3 million for information leading to Rim’s capture.
  • Ongoing cyber espionage efforts remain a global risk.

Overview of North Korean Cyber Espionage

Cybersecurity analysts have identified North Korean hackers as Anadriel or APT45, believed to belong to the country’s Reconnaissance General Bureau, its intelligence arm. This organization has engaged in extensive global cyber espionage aimed at acquiring classified military information to bolster Pyongyang’s prohibited nuclear weapons development, per a collaborative alert from the US, UK, and South Korea.

Targeted Industries and Effects

The hackers have focused their efforts on a wide range of defense and engineering companies, including those developing tanks, submarines, naval vessels, fighter jets, missiles, and radar systems. Notable victims encompass NASA, Randolph Air Force Base in Texas, and Robins Air Force Base in Georgia. In February 2022, the hackers accessed NASA’s systems for three months, siphoning off over 17 gigabytes of unclassified data.

Global Risk and Techniques

The alert highlights that APT45 continues to present a considerable threat across multiple sectors globally, impacting organizations in Japan and India as well. North Korea, officially named the Democratic People’s Republic of Korea (DPRK), has a record of deploying covert hacking teams to exfiltrate sensitive military intelligence.

Their techniques include common phishing tactics and software exploits, manipulating officials into disclosing access to internal networks. This was demonstrated in a report from Reuters in August, detailing how North Korean hackers compromised systems at NPO Mashinostroyeniya, a rocket design organization situated near Moscow.

Ransomware as a Funding Mechanism

In order to finance their activities, the hackers implemented ransomware strategies targeting US hospitals and healthcare organizations. One notable occurrence involved a hospital in Kansas that paid a ransom in bitcoin, which was then laundered through a Chinese bank and subsequently withdrawn from an ATM in Dandong, China. The FBI has confiscated $600,000 in cryptocurrency from the hackers’ accounts, which will be returned to the affected parties.

Legal Charges and Rewards

The US Justice Department has implicated Rim Jong Hyok in connection with conspiracy to illegally access US computer systems and for money laundering. The FBI is promising a reward of up to $15.3 million for tips that could lead to Rim’s apprehension. It is believed he resides in North Korea.

Conclusion

North Korean hackers, known as Anadriel or APT45, face allegations of executing a worldwide cyber espionage initiative to steal classified military information. This operation supports Pyongyang’s illicit nuclear armament efforts. The group’s actions have targeted various prominent entities, including NASA and US Air Force installations. By leveraging ransomware for financial gains, they maintain an ongoing global threat. The US Justice Department has charged one individual, while the FBI presents a significant reward for information leading to his capture.

Frequently Asked Questions

Q: Who are the identified hackers in the cyber espionage initiative?

A:

The hackers, recognized as Anadriel or APT45, are linked to North Korea’s Reconnaissance General Bureau.

Q: What was the main goal of the hacking efforts?

A:

The goal was to secure classified military information to bolster North Korea’s unauthorized nuclear weapons initiatives.

Q: Which significant organizations were affected by the hackers?

A:

The hackers targeted NASA, Randolph Air Force Base in Texas, Robins Air Force Base in Georgia, as well as numerous defense and engineering firms.

Q: How did the hackers finance their operations?

A:

They utilized ransomware to target US hospitals and healthcare organizations, demanding ransom payments in bitcoin.

Q: What measures have been taken against the hackers?

A:

The US Justice Department has charged one individual, Rim Jong Hyok, while the FBI offers a $15.3 million reward for information leading to his capture.

Q: Do the hackers still pose a threat?

A:

Yes, the advisory cautions that the group and their methods continue to represent a significant risk across various global industry sectors.

“`

APEKX True Wireless Bluetooth 5.0 Sports Earbuds Review


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Sport Ergonomic Design Headphones APEKX True Wireless Bluetooth 5.0 Sports Earbuds, IPX7 Waterproof Stereo Sound, Built-in Mic Earphones,Supporting Wireless Charging(Black)