Cyber Attacks On Australia Reveal A Pattern

China's leading security agency has directed a surge in cyber-attacks on Australian companies over the past year, breaching an agreement struck between Premier Li Keqiang and former Prime Minister Malcolm Turnbull to not steal each other's commercial secrets.

An investgation by journalists for  Fairfax Media and Nine News says it has confirmation that China's Ministry of State Security has been increasing its cyber-attacks on Australian businesses.

The attack operation is known in cyber circles as "Operation Cloud Hopper" and was first described in detail by the international consultancy PwC in a 2017 report, though it fell short of blaming China outright. The Chinese Foreign Ministry has denied the reports.

The attacks breach an agreement between Premier Li Keqiang and former Prime Minister Malcolm Turnbull not to steal each other's commercial secrets.

Head of cyber security at PwC New Zealand Adrian van Hest, who was part of the investigation, told reporteres there was no evidence to suggest New Zealand had been targeted in the attacks. He said he passed the information from the investigation onto the New Zealand Government Communications Security Bureau (GCSB) to look into it further.

"They (GCSB) have looked out for, the fingerprint if you will, of this activity, but as far as a definitive smoking gun of a New Zealand organisation being affected, I don't have any visibility on that," he said. Mr van Hest said Japan businesses that provide IT services to other companies were particularly targeted in the attacks. He said by targeting those businesses, the attackers had a back door entrance to the intellectual property of their clients.

"It's perceived as getting information that helps the nation state of China, or whoever, build up their capability in an industrial domain.

"They effectively skip the whole research and investment cycle and just take how you do something."

Mr van Hest said the theory behind China's attacks is that it's systematic and that they're going after industries the country competes with.

RadioOnz:      AFR:

You Might Also Read:

Staying One Step Ahead Of The Cyber Spies:

 

« From Machine Learning To Machine Reasoning
British Parliament Seizes Facebook Documents »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

HackerOne

HackerOne

HackerOne was started by hackers and security leaders who are driven by a passion to make the internet safer.

CloudDNA

CloudDNA

cloudDNA is the only dedicated Citrix NetScaler consultancy in EMEA. We can help your migration to NetScaler secure networking solutions.

360Logica

360Logica

360Logica is a software testing company offering numerous kinds of testing services to improve the quality and performance of your software and IT systems.

Wheel Systems

Wheel Systems

Wheel Systems specialize in privileged access management, user authentication and authorization and SSL/TLS encrypted traffic inspection.

InfoWatch

InfoWatch

InfoWatch solutions allow you to protect data and information assets that are critically important to your business.

Cyber Risk & Insurance Forum (CRIF)

Cyber Risk & Insurance Forum (CRIF)

CRIF helps organisations understand cyber risks and the damage that might occur by supporting the development of effective insurance solutions.

Paygilant

Paygilant

Paygilant’s disruptive technology is designed to protect mobile payment  financial transactions against fraudulent attacks, whether executed by NFC, QR code, P2P or in-app.

Governikus

Governikus

Governikus provides solutions for secure data transport, authentication, the use of electronic signatures and cryptography as well as for long-term storage.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Intel Capital

Intel Capital

Intel Capital, Intel's strategic investment organization, backs innovative technology startups and companies worldwide. We invest in a broad range of hardware, software, and services.

Sparrow

Sparrow

Sparrow specializes in application security testing solutions to cope with new technology trends such as cloud, mobile, and DevSecOps.

Smoothstack

Smoothstack

Smoothstack is a technology talent incubator whose immersive training program kick starts IT careers and delivers a fresh source of IT talent.

Deeper Network

Deeper Network

Deeper Network represents the world's first decentralized blockchain network for building a truly private, secure and fair Internet.

Tetrate.io

Tetrate.io

Tetrate Service Bridge provides enterprises with a consistent, unified way to connect and secure services across an entire mesh-managed environment.

Zaviant Consulting

Zaviant Consulting

Zaviant Consulting is a leading data security and privacy consulting firm assisting organizations comply with constantly evolving security frameworks and privacy regulations.

CFTS

CFTS

CFTS 'Computer Facilities Technical Services' is a Ugandan ICT Support Company that specialises in infrastructure and support services including network security.