Cyber Attacks On Australia Reveal A Pattern

China's leading security agency has directed a surge in cyber-attacks on Australian companies over the past year, breaching an agreement struck between Premier Li Keqiang and former Prime Minister Malcolm Turnbull to not steal each other's commercial secrets.

An investgation by journalists for  Fairfax Media and Nine News says it has confirmation that China's Ministry of State Security has been increasing its cyber-attacks on Australian businesses.

The attack operation is known in cyber circles as "Operation Cloud Hopper" and was first described in detail by the international consultancy PwC in a 2017 report, though it fell short of blaming China outright. The Chinese Foreign Ministry has denied the reports.

The attacks breach an agreement between Premier Li Keqiang and former Prime Minister Malcolm Turnbull not to steal each other's commercial secrets.

Head of cyber security at PwC New Zealand Adrian van Hest, who was part of the investigation, told reporteres there was no evidence to suggest New Zealand had been targeted in the attacks. He said he passed the information from the investigation onto the New Zealand Government Communications Security Bureau (GCSB) to look into it further.

"They (GCSB) have looked out for, the fingerprint if you will, of this activity, but as far as a definitive smoking gun of a New Zealand organisation being affected, I don't have any visibility on that," he said. Mr van Hest said Japan businesses that provide IT services to other companies were particularly targeted in the attacks. He said by targeting those businesses, the attackers had a back door entrance to the intellectual property of their clients.

"It's perceived as getting information that helps the nation state of China, or whoever, build up their capability in an industrial domain.

"They effectively skip the whole research and investment cycle and just take how you do something."

Mr van Hest said the theory behind China's attacks is that it's systematic and that they're going after industries the country competes with.

RadioOnz:      AFR:

You Might Also Read:

Staying One Step Ahead Of The Cyber Spies:

 

« From Machine Learning To Machine Reasoning
British Parliament Seizes Facebook Documents »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Get Cyber Safe

Get Cyber Safe

Get Cyber Safe is a national public awareness campaign created to educate Canadians about Internet security and the simple steps they can take to protect themselves online.

Cybraics

Cybraics

Cybraics nLighten platform implements a unique and sophisticated artificial intelligence engine that rapidly learns your environment and alerts security teams to threats and vulnerabilities.

UM Labs

UM Labs

UM Labs is a developer of security products for Voice over IP (VoIP), protecting SIP trunk connections, safeguarding mobile phone communications and enabling BYOD.

Watchdata Technologies

Watchdata Technologies

Watchdata Technologies is a pioneer in digital authentication and transaction security.

Swisscom Blockchain

Swisscom Blockchain

Swisscom Blockchain is focused on supporting the implementation and adaption of Blockchain-based platforms in enterprises across diverse industries.

DAtAnchor

DAtAnchor

Anchor is simply a better way to protect and control sensitive data. Zero-trust, data-centric security. Simplified.

Deeper Network

Deeper Network

Deeper Network represents the world's first decentralized blockchain network for building a truly private, secure and fair Internet.

PlexTrac

PlexTrac

PlexTrac is a cybersecurity reporting and workflow management platform that supercharges security programs, making them more effective, efficient, and proactive.

Cryptr

Cryptr

Cryptr provides plug and play authentication to manage all your authentication strategies in one place with just a few lines of code.

ADNET Technologies

ADNET Technologies

ADNET Technologies is a SOC 2, Type II Compliant IT management and cybersecurity firm.

Ultima

Ultima

Ultima are on a mission to help businesses unlock their true potential by using the right IT to protect your company’s revenue and reputation – 24/7.

Custom Computer Specialist (CCS)

Custom Computer Specialist (CCS)

CCS offers an extensive range of services including cybersecurity solutions, consulting, implementation, and support to help our clients maximize the value derived from IT investments.

Internet Initiative Japan (IIJ)

Internet Initiative Japan (IIJ)

IIJ is one of Japan's leading Internet-access and comprehensive network solutions providers.

Emagine IT

Emagine IT

Emagine IT supports federal agencies and enterprises by leveraging a data-first approach to delivering cutting-edge IT, cybersecurity, and digital transformation services.

Ekinops

Ekinops

Ekinops is a leading provider of open, trusted and innovative network connectivity solutions to service providers around the world.

Sourcepoint

Sourcepoint

Sourcepoint offers enterprise-grade privacy automation for complex, dynamic compliance challenges.