Security Market Segment LS
Thursday, 01 October 2020 10:57

DFAT shows its digital skills by leaking stranded Aussies' email addresses Featured

DFAT shows its digital skills by leaking stranded Aussies' email addresses Image by Tumisu from Pixabay

The Department of Foreign Affairs and Trade has demonstrated how adept it is at digital operations by leaking the private email addresses of about 1000 Australians who are stranded overseas due to the coronavirus pandemic.

The addresses of these people were included in an email that was sent to a number of people by DFAT's consular operations section that deals with COVID-19.

The Guardian quoted the message as saying that interest-free loans were available to those who had been stranded.

The email went out to batches of travellers with about 500 email addresses visible in the cc field.

DFAT reacted more than three hours later, admitting it had screwed up and asking those who had received the mail to delete it.

Commenting on the screw-up, Nick Lennon, country manager for email security provider Mimecast ANZ, said: "With Cybersecurity Awareness Month kicking off today, this is a timely reminder that more than 90% breaches are the result of human error.

"In most cases, when an organisation’s employees are part of a security incident or breach it is because they have been compromised by a malicious outsider without their knowledge or they have made an honest mistake and leaked sensitive information accidentally.

dfat leak

"Technology as one layer of defence is great, but it’s only one coat of paint. Organisations need to increasingly adopt a left hand, right hand approach. Technology in one hand, regular awareness training in the other.

"People will always make mistakes, but a couple of steps can help minimise these mistakes, damage to organisations and stress on the individual."

Jacqueline Jayne, security awareness advocate for KnowBe4 APAC, said: “For those of us in the cyber security world, the DFAT email bungle is not a surprise. Human error accounts for approximately 90% of successful cyber attacks.

"In this situation, while the matter was completely unintentional, it is still a serious incident that can have serious ramifications for the email recipients."

She said cyber criminals would now get their hands on the list of addresses through social engineering, adding that there were now more than a thousand opportunities to find it with dark web contacts.

"Then they would develop a well-crafted email to send out to these people with a seemingly legitimate offer on how they could get back home for a fraction of the current prices (which by the way are ridiculously high), ensuring the call to action is compelling and seemingly legitimate," Jayne said.

"While not everyone on the email list will fall for this trickery, there will be some that will because they always do."

She said criminals would then register a fake domain name and put up a very official looking Web site to support criminal endeavours and maximise returns and include this link in the email.

The next step would be to cross-check all the emails on their database for already compromised email, send their email and sit back and wait for the bait to catch the fish and look for victims on social media platforms to plan an approach there as well (as many people probably use this email to log into their social media accounts).

Subscribe to ITWIRE UPDATE Newsletter here


The much awaited iTWire Shop is now open to our readers.

Visit the iTWire Shop, a leading destination for stylish accessories, gear & gadgets, lifestyle products and everyday portable office essentials, drones, zoom lenses for smartphones, software and online training.

PLUS Big Brands include: Apple, Lenovo, LG, Samsung, Sennheiser and many more.

Products available for any country.

We hope you enjoy and find value in the much anticipated iTWire Shop.



iTWire TV offers a unique value to the Tech Sector by providing a range of video interviews, news, views and reviews, and also provides the opportunity for vendors to promote your company and your marketing messages.

We work with you to develop the message and conduct the interview or product review in a safe and collaborative way. Unlike other Tech YouTube channels, we create a story around your message and post that on the homepage of ITWire, linking to your message.

In addition, your interview post message can be displayed in up to 7 different post displays on our the site to drive traffic and readers to your video content and downloads. This can be a significant Lead Generation opportunity for your business.

We also provide 3 videos in one recording/sitting if you require so that you have a series of videos to promote to your customers. Your sales team can add your emails to sales collateral and to the footer of their sales and marketing emails.

See the latest in Tech News, Views, Interviews, Reviews, Product Promos and Events. Plus funny videos from our readers and customers.


Sam Varghese

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

Share News tips for the iTWire Journalists? Your tip will be anonymous




Guest Opinion

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News