false

/content/dam/people/students-in-situ/group-of-students-studying.jpg

50%

Cyber security

Safeguarding our people, information and technology

m-hero--style-1

800.534.2x.jpeg 1600w, 1280.1280.jpeg 1280w, 220.147.2x.jpeg 440w, 440.294.2x.jpeg 880w

false

The University of Sydney takes a rigorous, standards-based approach to managing cyber risks across our teaching, research and operations. This is supported by ongoing investment in the technology and capability needed to keep our community safe.

Our cyber security commitment

Strong cyber security underpins the University’s ability to deliver world-class teaching and research.

We continue to invest in measures that help keep University data and information and communications technology (ICT) systems secure for all members of our community and those who work or partner with us.

Our standards-based approach is supported by a clear policy framework and dedicated resources. The University continues to strengthen its cyber security controls to improve our ability to identify and respond to potential threats.

_self

Report an incident or concern

h2

cmp-call-to-action--ochre

Change your UniKey password
_blank
Change your UniKey password and immediately contact the ICT Helpdesk on 1800 SYD UNI (1800 793 864).

When your University account has been impacted

h3

cmp-callout--warning-red

Title : Stop

Description : Pause and take a breath before responding to unexpected messages or requests, especially if they create urgency or pressure you to act quickly.

Link URL:

Icon: /content/dam/icons/approved-icons/hand-stop.svg

Title : Check

Description : Verify the message through an official source or a trusted contact before clicking links, scanning codes or giving away information.

Link URL:

Icon: /content/dam/icons/approved-icons/checklist.svg

Title : Protect

Description : Report it, even if you did not fall for it or only suspect it, and take steps to secure your account or device, such as changing passwords and enabling multi-factor authentication.

Link URL:

Icon: /content/dam/icons/approved-icons/padlock-lock-secure.svg

Cyber security at the University: essentials

50

automatic

Link

A shared responsibility

Cyber security relies on strong technology and informed people. It is a shared responsibility and every member of our community has a role to play in protecting information, systems and the broader University environment. We urge you to report any suspicious activity or potential cyber security threats.

Maintaining good security habits is an important part of this. Using strong, unique passphrases, enabling multi-factor authentication and keeping software up to date are simple steps that help protect personal and University information from common cyber threats.

50

automatic

Link

Scam and threat advisories

Universities are high-value targets for cyber criminals due to the volume of personal, financial and research data they hold. The following advisories highlight scams and cyber threats targeting Australian universities, with practical guidance on how to recognise and respond.

A fraudulent website recently impersonated the University of Sydney, hosting a fake offer letter and attempting to mislead individuals. The site, which was registered overseas, was taken down following swift action by the University. 

Scam websites like this are a known risk and continue to target trusted institutions- including universities– particularly around key times such as student application, enrolment and assessment periods. 

How they work

Impersonation sites often mimic the University’s name and branding. Links to the sites may appear in phishing emails, social media posts, or misleading ads. They typically target students, staff and prospective applicants with fake offers, login pages or payment requests. 

Similar tactics are also used to create fake online stores or tutoring services. In some cases, these sites may be linked to blackmail attempts or other forms of online fraud such as contract cheating (paying someone to complete your university work) which is a serious breach of academic integrity, and money muling (being recruited to transfer illegally obtained funds through your bank account) which is a criminal offence. 

Many fake sites use look-alike domains which seem convincing at a glance:

  • sydney-university.org, or 
  • uni-sydney.com

Others use domain extensions from other countries, such as: 

  • .st (São Tomé and Príncipe) 
  • .co (Colombia)
  • .io (British Indian Ocean Territory) 
  • .me (Montenegro) 

These are real country domains but are often used in impersonation scams. If a ‘University of Sydney’ website doesn’t end in ‘.edu.au’, research the site and organisation before deciding to engage with it. 

Cybercriminals rely on people missing the small details, so a few extra seconds to check could make all the difference. 

  • Look closely at the URL - is it really the University? 
  • Be cautious with unexpected messages, offers or ads. 
  • Verify University communications by directly contacting the University. 
  • Report sites impersonating the University to the ICT Helpdesk, so we can investigate and take action.

Cybercriminals are using fake CAPTCHAs to trick you into executing malicious code on your device.  A legitimate CAPTCHA is a security challenge designed to verify you are human and not an automated bot. This may involve:

  • Clicking a checkbox (‘I am not a robot’)
  • Selecting images based on a prompt (‘identify all traffic lights’)


How they work

Fake CAPTCHAs prompt you to follow additional steps that install and run malware such as the Lumma Stealer and Amadey Trojan on your device. Once executed, the malware can steal passwords, cookies and sensitive data, allowing attackers to access your accounts and bypass security controls. They appear when you access an infected website, ad or popup.

Be cautious of suspicious CAPTCHAs and remember:

  • Legitimate CAPTCHAs are usually found on websites requiring user verification, such as login or account creation pages.
  • Be cautious of CAPTCHA pages that appear unexpectedly on sites that shouldn’t require them.
  • Legitimate CAPTCHAs only ask you to verify you’re not a robot or to click on certain images to confirm this. They will never prompt you to copy or run code.

Simply seeing the fake CAPTCHA does not install malware. 

If you see a CAPTCHA that looks or behaves unusually:

  • Do not interact with it
  • Close the webpage

Apply these steps ONLY if you followed the fake CAPTCHA instructions.  

  • Disconnect your device from any network/Wi-Fi to prevent further spread.
  • Change any passwords you may have entered after interacting with the fake CAPTCHA, as these may have been solen. Use a safe uninfected device to do this, such as your mobile phone. 
  • If you use a University-managed device, immediately report it to the Shared Service Centre on +61 2 9351 2000 (follow the prompts for the ICT). 
  • If you use a personal device, run a full antivirus scan and remove the malware. The Australian Cyber Security Centre has useful instructions on how to report and recover from malware. Consider taking your device to a local IT repair store if you're unsure about malware removal.
  • If you lost money as result of this malware, contact your bank, the local police and IDCARE for further support.
Learn more
_self

Common scams and how to avoid them

h3

cmp-callout--warning-red

80

manual

Link

Reporting something suspicious

Timely reporting helps limit the impact of cyber attacks and reduces risk to the University and the wider community. Anyone who becomes aware of a potential cyber security issue affecting the University is encouraged to report it as soon as possible.

Report issues that affect the University or could pose a risk to our people, systems or information. These include:

  • suspected or confirmed compromise of a University account, device or online service
  • suspicious emails, calls or websites that impact a University account or device, or claim to be connected to the University
  • unauthorised or inappropriate access to University systems or information
  • loss, theft or discovery of a University-issued or University-branded device
  • accidental or unauthorised disclosure of sensitive University information
  • disruption or unexpected behaviour affecting a University account, device or service

Report these issues to us, even if they're just suspicions, via these email addresses.

Report personal scams, fraud or cybercrime that do not involve the University to the appropriate organisation. These include:

  • scams targeting your personal bank accounts, identity, email, phone, or social media accounts

  • fraud involving personal purchases, payments or deliveries

  • any cybercrime unrelated to the University

For these issues, the following organisations can help. If money has been lost, contact your bank immediately and consider reporting the matter to your local police station.

Personal scams or fraud
ScamWatch
Report scams involving personal email, banking, shopping or payments to help authorities warn others and disrupt scam activity.
Website: https://www.scamwatch.gov.au/report-a-scam

Cybercrime or serious online fraud
Australian Cyber Security Centre
Use this service to report hacking, identity crime, ransomware, or other cybercrime.
Website: https://www.cyber.gov.au/report-and-recover/report
Phone: 1300 292 371

Identity theft or compromised personal information
IDCARE
Provides expert, free support, including a case manager, if your identity, personal accounts or data have been stolen or misused.
Website: https://www.idcare.org
Phone: 1800 595 160

Online abuse, cyberbullying or harmful content
eSafety Commissioner
For issues such as image-based abuse, cyberbullying, threats, harassment, illegal content or unsafe online behaviour.
Website: https://www.esafety.gov.au/report

If you're a student impacted by a scam, support is available from our Student Wellbeing Team.

50

automatic

Link

Our framework

Our approach is supported by a policy framework aligned with recognised international industry standards. These policies define responsibilities and minimum security practices for staff, students and partners.

The Cyber Security Policy (pdf, 216KB) defines the responsibilities and principles required within the University to protect the confidentiality, integrity and availability of ICT resources and digital information.

The Acceptable Use of ICT Resources Policy (pdf, 240KB) applies to all users of the University's ICT resources, and outlines user rights and responsibilities, the conditions of use of University ICT services, and penalties for misuse.

Useful links

Contact us

University staff and students:
ict.support@sydney.edu.au

Members of the public:
ict.askcyber@sydney.edu.au