A threat actor on the notorious BreachForums dark web platform is advertising unauthorized access to the University of the Witwatersrand’s (Wits) virtual private network (VPN) infrastructure for $100, according to a March 2025 post first flagged by cybersecurity watchdog CyberFeed Digest.
The listing claims the compromised staff credentials—linked to an Active Directory (AD) user account—could enable lateral movement across Wits’ network, potentially exposing research data, financial systems, and sensitive institutional assets valued at $25 million.
This incident follows a pattern of escalating attacks on South African academic institutions, which face unique vulnerabilities due to hybrid learning models and decentralized IT environments.
Technical Scope of the Breach
According to the post from Cyberfeeddigest, the advertised access leverages Cisco AnyConnect VPN credentials—a system Wits implemented to facilitate remote learning and administrative operations.

Threat actors could exploit these credentials to bypass network segmentation policies, as the VPN grants authenticated users entry to Wits’ internal resources, including AD-managed systems.
The university’s VPN infrastructure requires two-factor authentication (2FA) for staff, suggesting the compromised account may have been obtained through social engineering, credential stuffing, or insider threats.
Security analysts note that BreachForums—a successor to the seized RaidForums platform—has become a hub for trading academic network accesses since 2023.
The forum’s operators monetize leaked databases and privileged accesses, often procured via phishing campaigns targeting institutional email systems.
In Wits’ case, the AD linkage amplifies risks: attackers could escalate privileges to domain administrator accounts, exfiltrate research intellectual property, or deploy ransomware across connected systems.
Institutional Response and Mitigation Efforts
Wits’ cybersecurity team, in partnership with managed detection and response (MDR) provider KHIPU Networks, has implemented Cortex XDR and XSOAR platforms to monitor for anomalous VPN logins.
However, the breach highlights persistent challenges in securing legacy authentication protocols. University policies mandate 2FA for VPN access, but gaps remain in enforcing least-privilege principles for AD accounts.
In a 2025 interview, Hement Gopal, Wits’ Senior Security Engineer, emphasized the institution’s AI-driven threat prevention framework: “We’ve reduced mean time to detect (MTTD) to under 90 minutes using behavioral analytics, but human factors remain critical. Regular credential rotation and zero-trust segmentation are now priorities”.
The university has initiated a forensic audit of VPN access logs and suspended AD accounts linked to the exposed credentials.
Broader Implications for Academic Cybersecurity
This incident mirrors global trends in higher education targeting.
A 2024 CrowdStrike report found that 73% of ransomware attacks on universities originated via compromised VPN or remote desktop protocol (RDP) credentials.
South African institutions are particularly vulnerable due to high BYOD adoption and limited cybersecurity funding.
Cybersecurity firm Varutra warns that dark web markets increasingly specialize in academic network accesses, which sell for 300–500% premiums over corporate credentials due to weaker defenses.
Researchers attribute this to inconsistent patch management, as seen in Wits’ 2024 reliance on end-of-life firewalls before upgrading to Palo Alto Networks’ Next-Generation solutions.
Recommendations and Industry Response
KHIPU Networks advocates for adaptive multi-factor authentication (MFA) paired with continuous threat exposure management (CTEM) to mitigate credential-based attacks.
Meanwhile, Comparitech’s 2025 analysis of South African VPN vulnerabilities stresses the importance of certificate-based authentication over password-only logins—a measure Wits partially implements via SonicWall UTM devices.
As of March 5, 2025, Wits has not confirmed data exfiltration but advises all users to reset passwords and review login histories.
The incident underscores the critical need for academic institutions to adopt zero-trust architectures, particularly when securing hybrid learning infrastructures.
With dark web markets continuing to exploit human and technical vulnerabilities, proactive threat hunting—not just perimeter defense—will define cybersecurity success in the education sector.
Also Read: