Australia Assaulted By Severe State-Backed Cyber Attacks

Australia's government and institutions are subject to a continued attacked by sophisticated state-based cyber hackers, Prime Minister Scott Morrison has said.

Amongst other issues, the attack forced a password reset of all Australian Parliament House network users, affecting politicians and all of their staff in a repeat of events in 2019. 

Cyber intelligence experts from the Australian Strategic Policy Institute (ASPI) have linked some of the hacks to China backed hackers. China has rejected the accusations that it was involved in these major cyber-attack on Australian institutions with a government spokesman claiming that China country is in fact a major victim of cyber-attacks.

The Prime Minister  is reported saying that the cyber-attacks are continuing and are covering all levels of government as well as essential services, private sector and businesses and being directed and carried out by a sophisticated state based actor. It is understood that the attacks have been happening over a number of months and are increasing.

The attack has been identified it as a nation-state hack due to its scale, the nature of the targeting and the signature methods used.  Although the Australian government has not directly accused China, it is one of the few states not allied with Australia, which has the capacity for such attacks.

Australia is likely seeking co-operation from it's Five Eyes intelligence partners, the United States, Canada, New Zealand as well as Britain

Relations between the countries have been growing difficult recent years and have significantly worsened after Australia echoed the US in calling for an inquiry into the origins of the Coronavirus, first detected in China last year. China subsequently imposed tariffs on Australian exports and warned its citizens not to travel to Australia. 

ASPI:           BBC:     Guardian:        SMH:            ZDNet:         Australian Finanacial Review

You Might Also Read:

Cyber Security Experts Needed in Australia

 

« Beware Trojan Mobile Banking Apps
Fake Qantas Facebook Page Promises Free Flights »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Digitus Biometrics

Digitus Biometrics

Digitus Biometrics is a market leader in biometric access control. We can secure access to any entry point, from the front door to the server rack cabinet.

Intezer Labs

Intezer Labs

The only solution replicating the concepts of the biological immune system into cyber-security. Intezer provides enterprises with unparalleled Threat Detection and accelerates Incident Response.

SynerComm

SynerComm

SynerComm is an IT solution provider specializing in network and security infrastructure, enterprise mobility, remote access, wireless solutions, audit, pentesting and information assurance.

MASS

MASS

MASS provides world-class capabilities in electronic warfare operational support, cyber security, information management, support to military operations and law enforcement.

Arkose Labs

Arkose Labs

Arkose Labs' Fraud and Abuse Platform combines Telemetry and adaptive Enforcement Challenges to break down the ROI of fraudsters and protect digital businesses.

Energia Ventures

Energia Ventures

Energia Ventures is a three-month intensive accelerator for entrepreneurs with an innovative business in the energy, smart grid, cleantech, and cybersecurity sectors.

Cyway

Cyway

Cyway is a value-added cybersecurity distributor focusing on on-prem, cloud solutions and hybrid solutions, IoT, AI & machine learning IT security technologies.

TriagingX

TriagingX

TriagingX successfully created the first generation malware sandbox that is being used by many Fortune 500 companies for daily malware analysis.

United Network Technologies

United Network Technologies

United Network Technologies is a leading Managed Services Provider, distributor and developer of specialised cyber security components and technologies.

Two Six Technologies

Two Six Technologies

Two Six Technologies delivers R&D, innovation, productization and implementation expertise in cyber, data science, mobile, microelectronics and information operations.

Moviri

Moviri

Moviri combines security technology engineering, intelligence expertise and our data science DNA to help companies manage digital risk end-to-end.

Valency Networks

Valency Networks

Valency Networks provide cutting edge results in the areas of Vulnerability Assessment and Penetration Testing services for webapps, cloud apps, mobile apps and IT networks.

Raman Power Technologies

Raman Power Technologies

Raman Power Technologies focus on bringing value and solving business challenges through the delivery of modern IT services and solutions including cybersecurity.

Xmirror Security

Xmirror Security

Xmirror Security focuses on integrated detection and defense of the continuous threat to the DevSecops software supply-chain with artificial intelligence technology as the core.

GoPro Consultants

GoPro Consultants

GoPro Consultants is an IT Consultancy and IT Managed services provider Globally with immeasurable expertise of IT professionals in Hardware/Support & Consultancy and Project Planning.

Telesystem

Telesystem

Telesystem empowers businesses across the USA with a range of innovative network, communication and collaboration solutions.