Why cybersecurity continues to be a problem for industry

The recent MyDeal incident is the third major incident affecting Australians. We need the community’s confidence back in our cyber capabilities, say UNSW experts.

In the past three weeks, three cyber attacks resulted in identity leaks that have sent ripples around the nation.

Has the triple-A of cyber security (Authentication, Authorisation and Accounting) failed?

In the recent MyDeal.com.au incident, early reports suggest that a compromised credential, most likely related to elevated users, was used to access a database storing user information. The attack led to the scrambling of 2.2 million customers data, which included email addresses, full names, phone numbers, delivery addresses and some customers’ birthdates.

In an interview with Channel 9 News, Professor Sanjay Jha, Chief Scientist for UNSW Institute for Cybersecurity (IFCYBER), said: “… the breach raises serious concerns for the end user’s confidence in using online services and poses a serious challenge for the industry”.

“Compromised credentials should not provide easy access to malicious actors when multi-factor authentication (MFA) is in place,” he added.

“You would expect more stringent authorisation and access control and network partitioning to protect these critical assets.”

Safely navigating the digital world

Following basic practices on Cyber Security Guidelines listed by the Australian Cyber Security Centre can help a business protect their systems from cyber threats.

Dr Arash Shaghaghi, a Senior Lecturer in Cybersecurity from the UNSW School of Computer Science and Engineering and UNSW Institute for Cybersecurity, says it’s evident from the recent attacks that some industries are not adopting the latest research on cybersecurity fast enough.

“Users’ data is collected by various services without any control from the end user, and often the data collection to join these services is excessive – leaving end users vulnerable and with limited options when a serious breach occurs,” he says.

“Other parts of the world are investing heavily in technological measures such as Self-sovereign identity (SSI), where users would have better control over who has access to what part of user identity and other information.

“SSI gives individuals control over the information they use to prove who they are to websites, services and applications across the web.

“We need to enhance investment in practical research and think of measures that facilitate the adoption of the latest technologies to reinforce our resiliency against the growing number of attacks targeting Australia.”


Last month, 10 million Optus customers experienced a similar fate when cyber criminals hacked into the system, stealing personal details such as passport ID and licence numbers. It was reported the breach suggests that an open port without authentication for testing purposes was left in the production version.

Unfortunately, these problems are well-known to the industry, says Prof. Jha.

“About five years ago, we were white boxing early versions of Philip Hue bulbs and Phillip Hue Bridge. We found that you could control these devices through such open ports,” he says.

“This was reported to the company who fixed the problem in their future version.  A simple penetration testing of servers before deployment could have potentially made such attacks difficult, if not impossible.”

Prof. Jha is also concerned about the state of risk assessment and authorisation processes across the industry and says further stringent penalties for negligence would go a long way.

Often these processes are a box-ticking exercise in an Excel spreadsheet, and many conducting these tasks don’t have adequate background in cybersecurity, he says.

“This re-emphasises the need for quality education along with more research in quality tools to improve these processes,” says Prof. Jha.

“My team is working on such tools for a Distributed Energy Resource Management Security project at UNSW funded by Cyber Security Cooperative Research Centre.

“Cyber Security is a cat-and-mouse game. Researchers and industry experts need to come together in Australia and work closely to build stronger and more resilient capabilities that help safeguard businesses and users in today’s world of cyber war and cyber terrorism.

“We need to regain the community’s confidence in our cyber capabilities.”

Media contacts:

Cecilia Duong


(02) 9065 1740

New Media Releases

Verizon Threat Research Advisory Center (VTRAC) celebrates 20th anniversary

Cybersecurity Awareness Month kicks off next week, and with the continued rise in cyberthreats worldwide, for businesses to help protect their assets, they need a fail-proof security architecture, and the expert insights and partner to help stay ahead of bad actors. For the past two decades the Verizon Threat Research Center (VTRAC), a specialised division within the company’s cyber security consulting organisation, celebrating 20 years, has been at the forefront in the battle against cyberthreat actors.

Recent Podcast Episodes

The Production Team

The KBI Production Team write and hunt down the information security professionals need to know. They present news updates and thought-piece articles designed to provide educational content and insights for the industry. You can reach out with any ideas or requests for subject coverage to production@kbi.media with your message.

Share This