Insights into Deakin University’s Data Breach

By Dushyant Sattiraju on 10 May 2023 @ Auscert
πŸ“Ή Video πŸ”— Link
#incident-management #data-leak #digital-forensics
Focus Areas: πŸ”’ Data Privacy & Protection , 🚨 Incident Response

Presentation Material

AI Generated Summary

This presentation details a data breach incident at a large university, where a compromised third-party SMS gateway exposed the contact information of approximately 46,000 students. The breach originated from a staff member’s reused password, which allowed an attacker to access the vendor’s platform and export a user list, subsequently sending spam messages.

The incident response was characterized by rapid containment. The security team, part of a pre-established Critical Incident Management Team (CIMT) that included legal, communications, and business units, froze the vendor account, reset all related passwords, and notified impacted users within 48 hours. Forensic analysis confirmed the attacker’s access was limited to the single compromised third-party system, with no lateral movement detected within the university’s network. The data was not found on dark web forums, though it was confirmed exfiltrated.

Post-incident, the university undertook significant corrective actions. These included consolidating six previously unknown SMS gateway services into a centrally managed, single sign-on (SSO) integrated platform. A major initiative was launched to proactively discover “shadow IT” by analyzing network traffic, endpoint logs (using Microsoft tools to identify OAuth applications), and email logs for registration confirmations from unauthorized services like Dropbox and Monday.com. This led to the assessment and onboarding of over 70 critical third-party applications.

Furthermore, the university enhanced its data protection strategy. This involved implementing a granular data labeling system within Microsoft 365 with encryption and access controls, deploying exact data match for sensitive information (PII, financial data) to generate alerts on risky sharing, and enforcing strong password policies for shared credentials stored in the enterprise password manager, with proactive monitoring for weak passwords.

Key practical takeaways emphasize the importance of a pre-defined, cross-functional incident response team for coordinated action, transparent and timely communication with all stakeholders (including partners and media) to control the narrative, and the strategic value of leveraging a crisis to drive long-overdue security improvements in third-party risk management and shadow IT discovery. The presentation concludes that proactive user engagement and education on secure data handling channels are essential in a complex academic environment.

Disclaimer: This summary was auto-generated from the video transcript using AI and may contain inaccuracies. It is intended as a quick overview β€” always refer to the original talk for authoritative content. Learn more about our AI experiments.