logo
ANU investigates possible hack after vice-chancellor's account liked ‘highly offensive' LinkedIn posts

ANU investigates possible hack after vice-chancellor's account liked ‘highly offensive' LinkedIn posts

The Guardiana day ago

The Australian National University (ANU) has contacted authorities about a possible hacking incident after its vice-chancellor's account liked a number of 'highly offensive' LinkedIn posts about Gaza and Julie Bishop.
One of the posts liked by Genevieve Bell's account was an inflammatory post about Gaza, while another made negative comments about Bishop, the ANU chancellor and a former foreign minister.
A spokesperson for ANU said it was made aware on Wednesday morning that Bell's LinkedIn account had been 'compromised'.
'The LinkedIn account had 'liked' certain posts that the VC had never seen,' the spokesperson said.
'Some of the liked content was highly offensive and objectionable to the VC and which are also inconsistent with the values set by the Council for ANU.
'We take this type of behaviour seriously.'
Sign up for Guardian Australia's breaking news email
An internal investigation was under way, and the matter had been referred to the Australian Cyber Security Centre.
The senior reporter for the Saturday Paper, Rick Morton, posted to Bluesky on Wednesday afternoon that he had notified ANU about a series of questionable posts liked by Bell's account.
'The 'likes' were in among normal posts the VC account had liked or reacted to about the work of the university and her former and beloved school, Cybernetics, so it's a very strange one,' he wrote.
'I look forward to what the investigation finds.'
The incident comes amid a restructure at ANU to cut about $100m from staff costs via its Renew ANU plan with the goal for a break-even operating result for 2026.
Sign up to Breaking News Australia
Get the most important news as it breaks
after newsletter promotion
It also follows a damning report on the institution's culture released late last month.
The independent review into ANU's former College of Health and Medicine, led by Prof Christine Nixon, outlined allegations of sexism, racism and entrenched disrespect in the now defunct college, described as sobering reading by Bell.
In a statement on Tuesday updating staff on the university's finances, Bell acknowledged it had been a 'really hard period' for the community.
'I know that each of us cares for this place and for our colleagues and students,' she wrote.
'And I know we are trying to have conversations as respectfully and as empathetically as we can because every conversation has ripples to the people and teams they impact.
'And I know we have so much work ahead of us – with the Nixon report, with the changes we are making, with the complexity of the world changing around us that we have to keep navigating.'

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Revealed: Gloating message sent by hackers 'from China' to M&S boss after devastating cyber-attack on British retailer
Revealed: Gloating message sent by hackers 'from China' to M&S boss after devastating cyber-attack on British retailer

Daily Mail​

timean hour ago

  • Daily Mail​

Revealed: Gloating message sent by hackers 'from China' to M&S boss after devastating cyber-attack on British retailer

Hackers who crippled Marks & Spencer during a devastating cyber-attack sent the retailer's boss an abusive email gloating about what they had done. Shameless digital fraudsters from the DragonForce hacking group reportedly sent the message to M&S chief executive, Stuart Machin using an employee email account. The email, sent in broken English on April 23, appears to confirm for the first time that M&S was hacked by the notorious ransomware group - something the retailer has so far refused to acknowledge. 'We have marched the ways from China all the way to the UK and have mercilessly raped your company and encrypted all the servers,' the hackers wrote, the BBC reported. 'The dragon wants to speak to you so please head over to [our darknet website].' A darknet link shared in the email connected to a portal for DragonForce victims to negotiate a ransom fee. The crime syndicate added: 'Let's get the party started. Message us, we will make this fast and easy for us.' The cyber hack over the Easter break has been hugely damaging for British high street staple, M&S, costing an estimated £300million. Six months on from the digital blitz, and the retailer is still unable to take online orders. The hack has cause mayhem for Marks & Spencer meaning it was unable to process online orders. The retailer later warned some customers' personal details had been stolen According to the BBC, the extortion email was sent to Mr Machin and seven other top executives. The blackmail message reportedly included a racist term. It was reportedly ended with an image of a fire-breathing dragon. As well as boasting about installing ransomware to cripple M&S's IT systems, the hackers said they had also stolen the private data of millions of customers. M&S informed customers three weeks later that contact details and dates of births from some shoppers had been snatched by a suspected cyber cartel. And the retailer also admitted other personal details had also been pilfered by digital crooks, including customers' order histories. However, bosses at the chain have insisted no data relating to shoppers' payment or card details, or account passwords, had been taken. It's unclear exactly how many shoppers have been affected by the major data breach. However, the group had 9.4 million active online customers in the year to March 30, according to its last full-year results. DragonForce's bragging email was apparently sent using the account of an employee from IT company Tata Consultancy Services (TCS), which has provided IT services to M&S for over a decade. What is DragonForce? DragonForce reportedly offers cyber-criminal partners various services on their darknet site in exchange for a 20 per cent cut of any ransoms collected. It's thought the group operates globally, with hackers operating out of China. Researchers also believe the group also has links to Russia. DragonForce Malaysia - thought to be an offshoot of the main group - is thought to be made up of pro-Palestine 'hacktivists'. They have reportedly been behind several campaigns targeting government agencies and organisations across the Middle East and Asia, filling a void left by hacking collective, Anonymous. Speculation has been mounting that hacking collective, Scattered Spider, may also have been involved in the recent spate of retail cyber attacks. The group, thought to be made up of young English-speaking hackers from the West, might be one of DragonForce's affiliates. The Indian IT worker had an M&S email address, but is a paid TCS employee and based in London. It is believed that he was among the victims hacked during the devastating digital blitzkrieg that has ravaged M&S online systems. The IT company has previously said it is investigating whether it was a gateway for the cyberattack. It has since told the BBC the email was not sent from its system and has nothing to do with the breach. M&S has declined to comment on the latest revelations in the hacking crisis. As well as claiming responsibility for the M&S hack, DragonForce also says it is behind the ongoing cyber-attack against the Co-op. The two hacks took place in April and have wrought chaos for both retailers. Empty shelves in some stores were reported by customers of both businesses, while M&S fears disruption to its services will continue into next month. However, experts believe it could take 'months' for M&S to fully recover from the hack, which wiped a staggering £1billion off the retailer's market value in the weeks after the mayhem. Matt Hull, head of threat intelligence at global cyber security company NCC Group, said the M&S meltdown could potentially have massive ramifications for shoppers. Warning of the impact, Mr Hull told MailOnline: 'The data breach at M&S is a stark reminder that no organisation is completely immune from cyber threats, and that all forms of customer data requires stringent protection.' He added cyber crooks could seek to use the data they have allegedly obtained to launch a fresh wave of attack on countless unsuspecting victims. 'Despite the absence of financial data or passwords, threat actors could potentially use the stolen information to launch targeted social engineering attacks,' he warned. It is unclear who the actual hackers involved in the DragonForce's alleged cyber assault actually are. The incident is being probed digital experts from Britain's own 'FBI', the National Crime Agency. DragonForce reportedly offers cyber-criminal partners various services on their darknet site in exchange for a 20 per cent cut of any ransoms collected. It's believed the group operates worldwide, with connections to countries across Asia, with some operating in China. Researchers believe the group has links to Russia. DragonForce Malaysia - thought to be an offshoot of the main group - is thought to be made up of pro-Palestine 'hacktivists'. They have reportedly been behind several campaigns targeting government agencies and organisations across the Middle East and Asia, filling a void left by hacking collective, Anonymous. Speculation has been mounting that hacking collective, Scattered Spider, may also have been involved in the recent spate of retail cyber attacks. The group, thought to be made up of young English-speaking hackers from the West, might be one of DragonForce's affiliates. Members are known to include teenagers and young adults from the UK and US. A spokeswoman for M&S told MailOnline: 'We cannot comment on details of or speculation on the cyber incident, and we have been advised not to.'

How to generate £500,000+ from a client event
How to generate £500,000+ from a client event

TTG

time2 hours ago

  • TTG

How to generate £500,000+ from a client event

SHOWCASING SPECIALISMS Homing in on one destination has worked well for Sam Smith Travel. The Welsh agency, part of Ocky White Travel, netted £200,000 worth of bookings from a Japan-themed client dinner, then around £500,000 from an in-agency Australasia weekend. The Japan evening saw VIP bookers and customers who'd expressed an interest in the destination treated to a meal at Ivy Asia Cardiff. It was sponsored, at the agency's request, by Japan National Tourism Organisation, which even sent its Tokyo head. A Wendy Wu representative also attended. After some 'short, sharp and sweet presentations, the vibe was prosecco and talk about Japan', says sales and commercial manager Suzanne Cumpston. Knowing there would be a buzz around Australia thanks to the British and Irish Lions rugby tour this year, Sam Smith later held three fizz-fuelled social drop-in days to talk holidays down under. A BBC radio interview on the topic helped alert listeners to the agency's tailor-made expertise. Ahead of the event, Sam Smith staff updated their knowledge of products and trends by completing Aussie Specialist Program modules. They also primed Australasia experts at several operators to take enquiries during the weekend, with Prestige proving particularly helpful. 'It's not just about the event and it's not just about the revenue you do on that day or the halo effect within a week or two; you become famous for a destination. Maybe months down the line they remember us as an Australia specialist,' explains Cumpston. Sam Smith deliberately showcases destinations that suit the tailor-made strengths of independent agencies. Similar events highlight how it can book individual cruise lines face-to-face. Results from a Celebrity Cruises event included a group booking. 'I think people need more hand-holding with cruise,' Cumpston points out. To further raise the agency's profile, the venue for next year's key event will be a castle. Analysing favourite and trending holidays is important for picking a theme, Cumpston advises. 'Know your audience, know your market, and go in heavy with the marketing side of things. Be switched on inviting the right people to the event.' Sam Smith Travel builds events around single destinations INCENTIVISING BOOKERS Magic Vacations in Kinsale, Ireland is in the sixth year of its Big 10 travel event. Each September more than 1,000 attendees meet 10 of its core tour operator, theme park and cruise line suppliers. Prizes are up for grabs and upgrades are given to those booking within a certain time window. The event now generates around €250,000 worth of sales in the following fortnight alone. Codes for Big 10 sales help the team track what's working and what can be built on for the following year. The agency also gains marketing opt-ins from those who reserve free tickets to the event. 'Really, September for us is as big as January,' says managing director John Barrett. Keeping the event 'tight and relevant' is the key to its success, he explains. 'We're actually turning suppliers away – we need them to tie in with our core product.' The theme park and cruise specialist knew it was originally a big ask to get suppliers such as Disney, Universal and Legoland to an event beyond Dublin, but its close relationships helped and now 'they have the belief that the event is going to be a success'. In a similarly ambitious move, Magic Vacations spent a year-and-a-half negotiating a significant cruise embarkation from Cobh (Cork) which it was able to sell at its 2024 Big 10 event. The agency had an allocation of 50 cabins on MSC Virtuosa, which sold out in 48 hours. 'We could have sold 200!' says Barrett, who now has his sights set on having a major ex-Cork cruise to sell at each Big 10. It comes down to 'thinking outside of the box', he says.

Australian Robert Pether released from Iraqi prison four years after being arbitrarily detained
Australian Robert Pether released from Iraqi prison four years after being arbitrarily detained

The Guardian

time5 hours ago

  • The Guardian

Australian Robert Pether released from Iraqi prison four years after being arbitrarily detained

Australian engineer Robert Pether has been released from his Iraq jail cell more than four years after he was arbitrarily detained. Pether was working on a project to help build the new headquarters for the Central Bank of Iraq when he was detained in Baghdad in April 2021. He had flown in for a meeting with bank officials to resolve a dispute they were having with his engineering firm, CME Consulting, over the project. Pether was later sentenced and fined over allegations that his firm spent money that should have gone to an architect and a subcontractor. Sign up for Guardian Australia's breaking news email In a report in March 2022, the United Nations working group on arbitrary detention found Pether had been arbitrarily detained in breach of international law. It also heard allegations that Pether and his Egyptian colleague's trials were compromised and that he had been subjected to torture-like practices. The body called for their immediate and unconditional release. After more than four years in prison, Pether has now been released. Pether's wife, Desree, welcomed the development and said her family were 'grateful to everyone who contributed to this happening'. But she also warned her husband remains trapped in Iraq due to a travel ban, and urgently needs medical care. 'He's unrecognisable,' she told Guardian Australia. 'So frail and weak. He needs urgent medical care and that's not possible in Iraq.' The foreign minister, Penny Wong, said the Australian government had raised the case with Iraqi authorities more than 200 times. 'I want to thank Australian officials for their tireless work on Mr Pether's case, including Australia's special envoy who travelled to Iraq in recent weeks to negotiate for this outcome,' she said. Sign up to Breaking News Australia Get the most important news as it breaks after newsletter promotion The case has prompted prime ministerial intervention, with Anthony Albanese raising Pether's detention with then Iraqi prime minister Mustafa al-Kadhimi in 2022. In 2022, the Guardian obtained an emotional letter from Pether to his family, penned from behind bars. The letter warned his family that his prognosis was 'bleak' and that he was facing a potential 'death sentence'. Pether also wrote of his daily torment about how he should break it to his children that he might not be coming home. 'How do you tell a little girl who loves unicorns and cats that her daddy will not be coming home? How do you tell your children that you are proud of them, but will not be sharing the accolades (and pitfalls) of their lives with them?,' Pether wrote. 'And toughest of all, how do you tell your wife, who is very much the other half of you, that you will not be keeping the promise you made to grow old together?'

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store