Cyber Attacks On Australia Reveal A Pattern

China's leading security agency has directed a surge in cyber-attacks on Australian companies over the past year, breaching an agreement struck between Premier Li Keqiang and former Prime Minister Malcolm Turnbull to not steal each other's commercial secrets.

An investgation by journalists for  Fairfax Media and Nine News says it has confirmation that China's Ministry of State Security has been increasing its cyber-attacks on Australian businesses.

The attack operation is known in cyber circles as "Operation Cloud Hopper" and was first described in detail by the international consultancy PwC in a 2017 report, though it fell short of blaming China outright. The Chinese Foreign Ministry has denied the reports.

The attacks breach an agreement between Premier Li Keqiang and former Prime Minister Malcolm Turnbull not to steal each other's commercial secrets.

Head of cyber security at PwC New Zealand Adrian van Hest, who was part of the investigation, told reporteres there was no evidence to suggest New Zealand had been targeted in the attacks. He said he passed the information from the investigation onto the New Zealand Government Communications Security Bureau (GCSB) to look into it further.

"They (GCSB) have looked out for, the fingerprint if you will, of this activity, but as far as a definitive smoking gun of a New Zealand organisation being affected, I don't have any visibility on that," he said. Mr van Hest said Japan businesses that provide IT services to other companies were particularly targeted in the attacks. He said by targeting those businesses, the attackers had a back door entrance to the intellectual property of their clients.

"It's perceived as getting information that helps the nation state of China, or whoever, build up their capability in an industrial domain.

"They effectively skip the whole research and investment cycle and just take how you do something."

Mr van Hest said the theory behind China's attacks is that it's systematic and that they're going after industries the country competes with.

RadioOnz:      AFR:

You Might Also Read:

Staying One Step Ahead Of The Cyber Spies:

 

« From Machine Learning To Machine Reasoning
British Parliament Seizes Facebook Documents »

Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

eBook: Practical Guide to Security in the AWS Cloud

eBook: Practical Guide to Security in the AWS Cloud

AWS Marketplace would like to present you with a digital copy of the new book, Practical Guide to Security in the AWS Cloud, by the SANS Institute.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Bugsec Group

Bugsec Group

BugSec is revolutionizing the field of cybersecurity by providing attack-oriented defensive strategies, delivered by the leading cyber experts.

Logscape

Logscape

Logscape provides a big data analytical tool for log file analysis and operational analytics.

2Secure

2Secure

2Secure is one of Sweden's largest private security companies. Service inlcude personal security, corporate security, information and cyber security.

Identify Security Software

Identify Security Software

Our mission is to bring in a new age of autonomous human authentication in the security and identity space.

Telelogos

Telelogos

Telelogos is a European provider of Enterprise Mobility Management software, Digital Signage software and Data Transfer and Synchronization software.

Ashley Page

Ashley Page

Ashley Page offer a unique cyber insurance and risk management solution - Cyber+Insure.

ReFirm Labs

ReFirm Labs

ReFirm Labs provides the tools you need for firmware security, vetting, analysis and continuous IoT security monitoring.

Avertium

Avertium

Avertium is the managed security and consulting provider that companies turn to when they want more than check-the-box cybersecurity.