This is a work in progress. While we strive for accuracy, some breach details may be incomplete or pending verification.

ANU Enterprise

Summary

ANU Enterprise (ANUE), a wholly-owned subsidiary of the Australian National University, confirmed a ransomware attack on October 31, 2024 after being listed on the ThreeAM ransomware gang's dark web leak site. The incident resulted in encryption and exfiltration of files from ANUE's IT systems.

Attack Vector

The ThreeAM ransomware group, a relatively new operation distinguished by its use of the Rust programming language, breached ANU Enterprise systems and encrypted files while exfiltrating data. ThreeAM ransomware appends the extension .threeamtime to encrypted files. The use of Rust enhances the malware's performance and complicates analysis by security researchers.

Consumer Impact

The attack affected ANU Enterprise, which is dedicated to enhancing the impact of ANU's research through consulting, contract research, and executive education initiatives. While the threat actor indicated that 0 percent of allegedly exfiltrated data had been published at the time of disclosure, the encryption and theft of files from the subsidiary's IT systems posed risks to research partnerships and consulting engagements.

Response

ANU Enterprise confirmed the ransomware incident on November 5, 2024. In conjunction with the ANU Information Security Office, the organization is actively reviewing the incident to recommend additional information security measures for future implementation. The response demonstrates coordination between the subsidiary and parent university's security resources.

Verification Source: View original statement