Related links
Cyber security is one of the University's highest priorities, and crucial to our core mission – to excel as a world-renowned research and teaching institution.
We have invested in a significant program of activities and safeguards to ensure your data, our data and our information and communications technology (ICT) are safe and secure – whether you are a member of our community or you work or partner with us.
Our standards-based approach to managing cyber security risks is supported by aÌýÌýand substantial resources. The University is continually improving our cyber control measures, to enhance our ability to rapidly identify and respond to any cyber threat.
Technological control measures are vital, but they are not enough. All members of our community have a shared responsibility to protect ourselves and the University against cyber security threats. For example, the University provides mandatory cyber security training to all staff. We urge you to report any suspicious activity or potential cyber security threats, byÌýcontacting us.
Cyber Security Awareness Month is a reminder that even the smallest online habits can make a big difference in staying safe from cyber threats.
This October, we’re focusing on simple, everyday actions that help keep your information secure.Ìý
Cybersecurity is a shared responsibility and together, we can create a safer digital environmentÌý
for everyone.
Make these three simple changes to strengthen your online safetyÌý
Tip 1: Use strong passphrases and a password manager. Make each passphrase long (at least 14 characters), mixing uppercase and lowercase letters with a number and special character for complexity (Blue KoalaSunshine99!)
Tip 2: Enable multi-factor authentication (MFA). We use Okta MFA when accessing University applications. It’s critical to also enable MFA on personal accounts too wherever it’s available. MFA provides an extra layer of security making it harder for an intruder to access your information. It requires something you know (your passphrase) combined with something you have (a code on your phone) or something you are (a facial scan).
Tip 3: Keep your software up to date. Install updates to protect your devices against vulnerabilities and cyber threats. Software updates are one of the strongest defences you can have in your toolkit and enabling automatic updates means you’ll receive the latest security patches and features as soon as they’re available.Ìý
Learn about the growing threat of information stealer malware and how to secure your devices with ID Support NSW. .
Case studies from eSafety’s investigation teams to help staff improve their understanding of cyber abuse risks impacting students. .
Discover the latest scam and fraud trends impacting Australians, especially students, and how to get help if you need it. .
Understand how attackers are using AI and how we are using AI to protect us. .
In-person lecture for cybersecurity students, hosted by Dr Suranga Seneviratne, with insights from Google and Mandiant. H70.1130, Belinda Hutchinson Building. ABS Lecture Theatre 1130.
In-person full-day secure code training for software developers. Choose from nine full-day sessions.
If you are interested in attending this specialist event, please contact our team at ict.cyber-program@sydney.edu.au.
In-person developer event with real-world cyber-attack scenarios to test secure code knowledge. D18.02.207, Susan Wakil Health Building. SWHB Lecture Theatre 207.
If you are interested in attending this specialist event, please contact our team atÌýict.cyber-program@sydney.edu.au.
Our Cyber Security team will be visiting buildings on campus with a sweet treat to say thank you for practicing cyber-safe habits.
A fraudulent website recently impersonated the University of Sydney, hosting a fake offer letter and attempting to mislead individuals. The site, which was registered overseas, was taken down following swift action by the University.Ìý
Scam websites like this are a known risk and continue to target trusted institutions- including universities– particularly around key times such as student application, enrolment and assessment periods.Ìý
Impersonation sites often mimic the University’s name and branding. Links to the sites may appear in phishing emails, social media posts, or misleading ads. They typically target students, staff and prospective applicants with fake offers, login pages or payment requests.Ìý
Similar tactics are also used to create fake online stores or tutoring services. In some cases, these sites may be linked to blackmail attempts or other forms of online fraud such as contract cheating (paying someone to complete your university work) which is a serious breach of academic integrity, and money muling (being recruited to transfer illegally obtained funds through your bank account) which is a criminal offence.Ìý
Many of these sites use look-alike domains which seem convincing at a glance:
Others use domain extensions from other countries, such as:Ìý
These are real country domains but are often used in impersonation scams. If a ‘University of Sydney’ website doesn’t end in ‘.edu.au’, research the site and organisation before deciding to engage with it.Ìý
Cybercriminals rely on people missing the small details, so a few extra seconds to check could make all the difference.Ìý
Learn more about common scams and how to avoid them.ÌýÌý
If you've been targeted by a scam on your personal accounts,  to prevent further attacks. If your University account has been impacted by a scam,  and immediately contact the ICT Helpdesk on 1800 SYD UNI (1800 793 864). You can also connect with University support if needed.Ìý
Cybercriminals are using fake CAPTCHAs to trick you into executing malicious code on your device.Ìý A legitimate CAPTCHA is a security challenge designed to verify you are human and not an automated bot. This may involve:
Fake CAPTCHAs prompt you to follow additional steps that install and run malware such as the Lumma Stealer and Amadey TrojanÌýon your device. Once executed, the malware can steal passwords, cookies and sensitive data, allowing attackers to access your accounts and bypass security controls.ÌýThey appear when you access an infected website, ad or popup.
A fake CAPTCHA looks like a standard verification prompt, however clicking the ‘I’m not a robot’ button copies a malicious script to the clipboard and displays the following additional instructions:
Press Win + R (this opens the Windows 'Run' dialog box)
Press CTRL + V (this pastes the script from the clipboard into the dialog box)
Press Enter (this runs the script).
Do not follow these instructions. A legitimate CAPTCHA will never ask you to run commands like this.
Be cautious of suspicious CAPTCHAs and remember:
Legitimate CAPTCHAs are usually found on websites requiring user verification, such as login or account creation pages.
Be cautious of CAPTCHA pages that appear unexpectedly on sites that shouldn’t require them.
Legitimate CAPTCHAs only ask you to verify you’re not a robot or to click on certain images to confirm this. They will never prompt you to copy or run code.
These steps only apply if you followed the CAPTCHA instructions.  Simply seeing the fake CAPTCHA does not install malware. 
Disconnect your device from any network/Wi-Fi to prevent further spread.
Change any passwords you may have entered after interacting with the fake CAPTCHA, as these may have been solen. Use a safe uninfected device to do this, such as your mobile phone. 
If you use a University-managed device, immediately report it to the Shared Service Centre on +61 2 9351 2000 (follow the prompts for the ICT). 
If you use a personal device, run a full antivirus scan and remove the malware. The Australian Cyber Security Centre has useful instructions on how to Consider taking your device to a local IT repair store if you're unsure about malware removal.Ìý
If you lost money as result of this malware, contact your bank, the local police and  for further support.
If you see a CAPTCHA that looks or behaves unusually:Ìý
Do not interact with it.
Close the webpage.Ìý
We understand the importance of responding quickly to prevent or defuse any cyber threats before they compromise our data security or ICT security.
If you are a member of the University community (staff, students,ÌýalumniÌýetc), or work or partner with us in any capacity (industry partners,Ìýaffiliates,Ìýcontractors, government, vendors etc) we strongly encourage you to report any cyber security incidents in a timely manner.Ìý
Incidents you should report include:
Members of the public can contact theÌýCyber Security TeamÌýand staff and students can emailÌýict.support@sydney.edu.au.Ìý
The University follows best-practice cyber security standards and has established a clear policy framework and invested substantial resources in its cyber security program. Read our policies on theÌý.
TheÌýÌý(pdf, 216KB) defines the responsibilities and principles required within the University to protect the confidentiality, integrity and availability of ICT resources and digital information.
TheÌýÌý(pdf, 240KB) applies to all users of the University's ICT resources, and outlines user rights and responsibilities, the conditions of use of University ICT services, and penalties for misuse.