Australia’s Critical Infrastructure Is Under Constant Attack

A cyber attack is being reported in Australia every 7.8 minutes as sophisticated hackers, including foreign governments, target the nation’s critical infrastructure and essential services such as hospitals, food distribution and electricity systems. 

Australia has reported a 13% jump in cyber crime in the past year, with about one incident in four targeting critical infrastructure and services as working from home during the pandemic made more people vulnerable to online attacks. 

The Australian Cyber Security Centre (ACSC) says that malicious actors have pivoted to exploit the those working from home and targeting vulnerable people and health services to conduct espionage, and steal money and sensitive data. The wave of hacks last financial year included a significant ransomware attack against a Victorian public health service in March, which affected four hospitals and aged care homes and resulted in the postponement of elective surgeries.

These incidents have “underscored the vulnerability of critical infrastructure to significant disruption in essential services, lost revenue and the potential of harm or loss of life”.

The ACSC, which is part of the Australian Signals Directorate spy agency, received more than 67,500 reports of cyber crime of all types in 2020-21, or one every eight minute compared with one every 10 minutes the previous year  The ACSC also report  ransomware attacks disclosed to the ACSC increased 15% in the 2020-21 financial year, when compared with the previous financial year. The report found cyber criminals exploited the Coronavirus situation in Australia, with more than 18,000 cybercrimes related to the pandemic.

The ACSC report, which covers the period from July 2020 to June 2021, says businesses, individuals and other entities had incurred more than $33bn in total losses from cyber crime throughout the year.

Cyber criminals sought to exploit the pandemic by encouraging recipients to enter personal credentials to access Covid-related information or services, while unnamed foreign governments targeted the health sector seeking “access to intellectual property or sensitive information about Australia’s response to Covid”.

The ACSC responded to about 1,630 cybersecurity incidents in 2020-21, or an average of 31 cybersecurity incidents a week.
“Approximately one quarter of reported cybersecurity incidents affected critical infrastructure organisations, including essential services such as education, health, communications, electricity, water and transport,” the report says. A breakdown of the severity of cyber incidents in 2020-21 shows there were 14 cases in which federal government entities or nationally significant infrastructure suffered the removal or damage of sensitive data or intellectual property.

The Australian government has been growing increasingly concerned about the threat of “grey zone” attacks from countries such as China and Russia. The “grey zone” refers to a growing area of political warfare that falls somewhere between war and peace and includes cyber attacks, disinformation campaigns, intellectual property theft, coercion and propaganda.

ACSC:     Reuters:    7News:    Bloomberg:    SMH:      The Age:     Guardian

You Might Also Read: 

Australia To Spend Another A$1billion On Cyber Security:

 

« Industrial Companies At Risk As Attacks Double
Everything You Need To Know About Business Password Safety »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Securezoo

Securezoo

Securezoo's mission is to simplify and enhance information security by providing trusted security guidance, products, and information to small and mid-sized businesses and security professionals.

Cloud Credential Council (CCC)

Cloud Credential Council (CCC)

The CCC is a leading provider of vendor-neutral certification programs that empower IT and business professionals in their digital transformation journey.

Cross Identity

Cross Identity

Cross Identity (formerly Ilantus Technologies) is a complete IAM solution that is deep, comprehensive, and can be implemented even by non-IT persons.

Lutech

Lutech

Lutech is an Italian ICT engineering and services company. Business solution areas include cyber security.

IDnext

IDnext

IDnext is the open and independent platform to support innovative approaches in the world of the Digital identity.

Cybernetic Global Intelligence (CGI)

Cybernetic Global Intelligence (CGI)

CGI is a global IT Security firm that helps companies protect their data and minimize their vulnerability to cyber threats through a range of services such as Security Audits and Managed Services.

Pentagon Group

Pentagon Group

Pentagon Group is a provider of security services in high-risk environments, remote areas and emerging markets in support of land-based, aviation, maritime and cyber operations.

Webtotem

Webtotem

Webtotem's mission is to prevent the global epidemic of website infection and provide every website owner with basic security rights.

ReFirm Labs

ReFirm Labs

ReFirm Labs provides the tools you need for firmware security, vetting, analysis and continuous IoT security monitoring.

Conference Index

Conference Index

Conference Index provides an indexed listing of upcoming meetings, seminars, congresses, workshops, summits and symposiums across a wide range of subjects including Cybersecurity.

Sentinel

Sentinel

Sentinel works with governments, media and defence agencies to help protect democracies from disinformation campaigns by developing a state-of-the-art AI detection platform.

C3i Hub

C3i Hub

C3i Hub aims to address the issue of cyber security of cyber physical systems in its entirety, from analysing security vulnerabilities to developing tools and technologies.

DEFENTEK - National Security Informatics

DEFENTEK - National Security Informatics

Defentek (aka National Security Informatics) is a technology consortium covering a broad spectrum of intelligence computing solutions and interception technologies.

Torq

Torq

Torq's no-code automation modernizes how security & operations teams work with easy workflow building, limitless integrations and numerous pre-built templates.

Lucata

Lucata

Lucata solutions support groundbreaking graph analytics and improved machine learning for organizations in financial services, cybersecurity, healthcare, pharmaceuticals, telecommunications and more.

Mage Data

Mage Data

Mage (formerly Mentis Software) is a leading solutions provider for data security and data privacy software for global enterprises.