Varying and escalating their attack sophistication to overcome each new barrier.<\/li>\n<\/ul>\n\n\n\nMcPherson has worked with governments and organisations internationally to improve their security, including universities and financial institutions. He became involved with Cryptoloc after realising the company\u2019s encryption technology would help to ensure data privacy for individuals and organisations worldwide.<\/p>\n\n\n\n
Based on the public incident report, McPherson says that the success of the ANU attack hinged on human vulnerabilities as well as technical vulnerabilities.<\/p>\n\n\n\n
McPherson says cyber attacks on institutions like ANU often exploit the trust that exists between colleagues \u2013 as in this case, where another staff member had access to their colleague\u2019s account and previewed the malicious email.<\/p>\n\n\n\n
\u201cDue to the collegial nature of educational institutions, internal cyber security is often necessarily soft-centred with a hard shell protecting the perimeter,\u201d he says.<\/p>\n\n\n\n
\u201cIt is possible that part of the success attackers enjoy in these environments relies on exploiting the model of internal trust between colleagues and the systems they use to communicate and store their data.<\/p>\n\n\n\n
\u201cHowever, the major impact of data theft may have been reduced \u2013 or possibly even eliminated entirely \u2013 if a Cryptoloc-based solution was protecting the data that was targeted.\u201d<\/p>\n\n\n\n
That\u2019s because the primary focus of a Cryptoloc-based solution is to secure valuable data against unauthorised access. It accomplishes this by requiring an exchange of digital keys between an authorised user and the data storage system prior to releasing the contents of a data file.<\/p>\n\n\n\n
McPherson says this exchange can only work if the user possesses not only the correct login name and password, but also has access to their part of the digital key needed to access each specific data file.<\/p>\n\n\n\n
\u201cIn any normal multi-user environment, systems administrators \u2013 also known as super users \u2013 have unlimited access to all the data files stored on that system,\u201d he says.<\/p>\n\n\n\n
\u201cBut the data in files stored using a Cryptoloc-based solution remain encrypted and inaccessible, even to systems administrators. A systems administrator can move, copy and delete any file on a system they control, but they cannot read the contents of a Cryptoloc-encrypted data file without the correct digital key for that specific file.<\/p>\n\n\n\n
\u201cIn a Cryptoloc-based solution, the complete digital key is not stored on the same system as the data file itself. The file can only be unlocked \u2013 decrypted \u2013 for reading using the complete key, which can only be assembled by the deliberate action of an authorised user who brings their part of the digital key along with them at the time of access.\u201d<\/p>\n\n\n\n
McPherson says that if ANU had taken these sorts of precautions, their data may not have been vulnerable to hackers \u2013 assuming they didn\u2019t commit another basic human error.<\/p>\n\n\n\n
\u201cHad ANU protected their important or sensitive data with a Cryptoloc-based solution, they may not have lost control of any files securely encrypted on their servers,\u201d he says.<\/p>\n\n\n\n
\u201cThis, of course, presupposes that unencrypted copies of important files were not otherwise also stored elsewhere on their systems.\u201d<\/p>\n\n\n\n
When it comes to cybersecurity, humans are the weakest link \u2013 and no matter how secure your software is, every member of your organisation should be on their guard to reduce the risk of a cyber attack.<\/p>\n","protected":false},"excerpt":{"rendered":"
In a cyber attack so sophisticated that it shocked even the most experienced Australian experts, hackers gained access to the computer system of the Australian National University (ANU) in 2018. Here\u2019s what the attack can teach us about how we can protect ourselves today. According to a public incident report released by the University in 2019, […]<\/p>\n","protected":false},"author":3,"featured_media":1115,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/posts\/848"}],"collection":[{"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/comments?post=848"}],"version-history":[{"count":1,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/posts\/848\/revisions"}],"predecessor-version":[{"id":849,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/posts\/848\/revisions\/849"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/media\/1115"}],"wp:attachment":[{"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/media?parent=848"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/categories?post=848"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/tags?post=848"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}