Austria's Foreign Ministry Hit By A Big Attack

The Austrian government has been hit by a cyber attack that is believed to be the work of another country. It hit the country's Foreign Ministry and began overnight on Saturday 4th January.  A spokesperson for the ministry described the incident as "serious" and said that experts had warned it could continue for several days and that they believe it was carried out by a foreign country.

On the same day the attack was launched, at a congress held in the city of Salzburg, Austria's Green Party said that it was in favor of forming a coalition with the conservative People's Party.

The ministry said that the attack had been caught early and countermeasures had immediately been put in place. The signatures and the pattern of the attack suggest that it could be the work of a state-sponsored threat actor. "Despite all intensive security measures, there is never 100 percent protection against cyber-attacks," the ministry said, adding that other European countries had been affected by similar incidents in the past. 

Hugo van den Toorn, manager of offensive security at Outpost24, said: "It is true that despite the precautions taken and all the controls in place, a motivated attacker can always find a way through an organisation’s defenses....Although we see an increase in politically motivated attacks over the past few years, we should remain vigilant in blaming certain threat actors or nation-states. 

This latest incident in Austria follows the serious cyber-attack on the German government's IT network, which was launched in March 2018. A group of Russian-backed threat actors known as APT28 or Fancy Bear was suspected to be behind not only that attack, but also an earlier cyber-hit on the German parliament carried out in 2015. 

APT28 are similarly suspected of waging cyber-warfare on entities in Eastern Europe and in the United States.
Last year the EU adopted powers to punish those outside the bloc who launch cyber-attacks that cripple hospitals and banks, sway elections and steal company secrets or funds.

CISO:           Infosecurity:        BBC

You Might Also Read: 

Meet The Fancy Bears:

 

« British National Cyber Security Chief Steps Down
Cyber Security’s New Workforce »

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Cyber Security Service Supplier Directory

Cyber Security Service Supplier Directory

Free Access: Cyber Security Service Supplier Directory listing 4,000+ specialist service providers.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

WEBINAR: How to prioritize security controls for sensitive AWS assets

WEBINAR: How to prioritize security controls for sensitive AWS assets

Thursday June 18, 2020: Join AWS Marketplace and Sounil Yu to learn best practices for tracking and protecting sensitive data in your Amazon Web Services (AWS) environment.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

DCT Associates

DCT Associates

DCT Associates is a strategic advisory services company providing analysis of critical strategic technology and communications industry issues.

Cloud Expo

Cloud Expo

Cloud Expo offers a vast selection technical and strategic Industry Keynotes, General Sessions, Breakout Sessions, and signature Power Panels.

Vaddy

Vaddy

Vaddy provide an automatic web vulnerability scanner for DevOps that performs robust security checks to ensure that web app code is secure.

Si Cyber

Si Cyber

Si is a leading Managed Security Services Provider and we are driven by a desire to offer our clients the highest degree of protection against today’s cyber threats.

Raz-Lee Security

Raz-Lee Security

Raz-Lee Security is the leading security solution provider for IBM Power i, otherwise known as iSeries or AS/400 servers.

StrongKey

StrongKey

StrongKey (formerly StrongAuth) is a leader in Enterprise Key Management Infrastructure, bringing new levels of capability and data security at a price point significantly lower than other solutions.

CSL Group

CSL Group

CSL solutions provide complete end-to-end connectivity services for Security, Fire, Telecare and other mission critical M2M/IoT applications.

Cybersecurity Tech Accord

Cybersecurity Tech Accord

The Cybersecurity Tech Accord promotes a safer online world by fostering collaboration among global technology companies.

German Accelerator

German Accelerator

German Accelerator supports high-potential German startups in successfully entering the U.S. and Southeast Asian markets.