China Accused Of A Cyber-Attack On Australia's Parliament

Australia's security agencies are investigating a cyber breach of the Federal Parliament's computer network that ABC, the Australian Broadcasting Corporation, understands is likely the result of a foreign government attack. The agencies are looking into whether China is behind the incident.

In a statement, Federal Parliament's presiding officers said authorities were yet to detect any evidence data had been stolen in the breach.

One source said the response to the attack had been swift but the hackers were "sophisticated this time around". Computer passwords have been reset as a precaution as the investigations continue.

"We have no evidence that this is an attempt to influence the outcome of parliamentary processes or to disrupt or influence electoral or political processes," the Parliament's presiding officers said in a statement.

"Accurate attribution of a cyber incident takes time and investigations are being undertaken in conjunction with the relevant security agencies."

The Australian Signals Directorate (ASD) is working to secure the network and says action was taken as soon as the breach was detected.

"The necessary steps are being taken to mitigate the compromise and minimise any harm," ASD said in a statement.
A cyber security expert warned about the seriousness of the breach.

"If you look at what goes on in Parliament House, you've got politicians, you've got staffers, you've got government departments that are moving in and out of the organisation and a lot of that is through electronic means," adjunct professor Nigel Phair, from the University of Canberra, said.

"If I was a nation state, or dare I say any hacker looking for state secrets, this is the crown jewels."

Hackers caught in early stages, ABC told
Sources have told the ABC that the hackers were caught in the early stages of gaining access to the computer network.
The incident has been compared to a robber breaking into a house, whereby authorities know the front door has been broken but are yet to find out if anything else has been taken, or if there is another way to break in.

The attack does not affect the computer systems of government ministers and their staff, however it does affect government backbenchers, the Opposition and crossbenchers. Labor politicians and staff said access to their emails had been intermittent since the attack. Opposition Leader Bill Shorten said he was satisfied with the response so far.

"I've had some briefings on it. I'm satisfied from what I've heard initially that our security agencies and the president [of the Senate] and the Speaker [of the House] have moved in the right way to make sure that our parliamentary networks are secure," he said.

Mr Shorten described the breach as a "wake-up call", saying while Parliament had the resources to respond to a cyber-attack, many small and medium-sized businesses did not.

"They don't have the budget of the Parliament of Australia. If I'm p rime minister I'm going to invest a lot more in the cyber security of our small and medium sized enterprises."

RadioNZ:

You Might Also Read:

Cyber Attacks On Australia Reveal A Pattern:

 

 

« Cyberwar Vs. Traditional Conflict
Russia May Disconnect From The Internet »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Morgan Lewis Law

Morgan Lewis Law

Morgan Lewis is an international law firm with offices in North America, Europe, Asia, and the Middle East. Practice areas include Privacy and Cybersecurity.

Seclore

Seclore

Seclore is the most advanced, secure, and automated Enterprise Digital Rights Management (EDRM) solution available.

Swivel Secure

Swivel Secure

Swivel Secure is an award winning provider of multi-factor authentication solutions.

Centrify

Centrify

Centrify’s Next-Gen Access is an identity & access management solution that uniquely converges Identity-as-a-Service, enterprise mobility management and privileged access management.

Finnish Information Security Cluster (FISC)

Finnish Information Security Cluster (FISC)

FISC is an organization established by major Finnish information security companies to promote their activities nationally and internationally.

Myra Security

Myra Security

Myra technology monitors, analyzes, and filters malicious internet traffic before virtual attacks can do any real harm.

Quadron  Cybersecurity Services

Quadron Cybersecurity Services

Quadron Cybersecurity Services is a specialist in digital security, data and system protection.

Swiss Cyber Think Tank (SCTT)

Swiss Cyber Think Tank (SCTT)

The Swiss Cyber Think Tank is a business network for Cyber Risk & Insurability, providing an industry-wide networking platform for insurers, technology and security firms.

Gigacycle

Gigacycle

Gigacycle is one of the leading IT disposal and recycling providers in the UK. We specialise in IT asset disposal (ITAD) and data destruction.

Braintrace

Braintrace

Braintrace’s services include Managed Detection and Response (MDR), Managed SIEM, SIEM-as-a-Service, SOC-as-a-Service, Advisory Services, and Incident Response.

Contextual Security Solutions

Contextual Security Solutions

Contextual Security Solutions is a leading provider of penetration testing services and IT security & compliance audits.

CyberCatch

CyberCatch

CyberCatch provides an innovative cybersecurity Software-as-a-Service (SaaS) platform designed for SMBs.

Avalor

Avalor

Avalor are on a mission to help security teams make faster, more accurate decisions by making sense of their data. With Avalor you can bring in data from anywhere, normalize it and analyze it.

MiC Talent Solutions

MiC Talent Solutions

MiC Talent Solutions provides recruiting, direct hire, augmented staff, and professional service contracting solutions for organizations searching for minority cybersecurity talent.

Jot Digital

Jot Digital

Jot Digital is a full-service technology company specializing in digital engineering, application modernization and business transformation.

Seiber

Seiber

Seiber are a UK based Cyber Security company who provide consultancy and training services. Our objective is to stop bad things happening to good people.