Only Four Suspects In Australia's High Level Attack

Suspicion is falling on Chinese spies for targeting the computer systems of Australia's three major political parties, with intelligence officials acknowledging the skilled cyber hackers were the most sophisticated to confront Australia in years. 

Australia’s Prime Minister Scott Morrison has revealed Australia's political parties suffered cyber-attacks alongside the Parliament House computer network several weeks ago by a "sophisticated state actor".

The announcement is likely to intensify speculation that China was behind the attacks, which come just three months before the federal election, though Mr Morrison said there was no evidence of election interference.

Sources are describing the level of sophistication as "unprecedented" but are unable to say yet which foreign government is behind the attack.

The attacks are understood to carry the digital fingerprints of China, though authorities are concerned that another state could be replicating the hallmarks of Chinese intelligence to deflect blame towards them.

Mr Morrison told Parliament on Monday 18th February that while investigating the parliamentary hack, cybersecurity authorities "also became aware that the networks of some political parties, Liberal, Labor and Nationals, have also been affected". Security agencies "acted decisively to confront it", Mr Morrison said.

"Our cyber experts believe that a sophisticated state actor is responsible for this malicious activity."

Only four nations are thought to be capable of such a high-level attack: China, Russia, Israel and the United States. The theft of any party or political material has echoes of the 2016 election interference campaign against the United States by Russia when the Democratic National Committee was hacked by Russia, and damaging information was released during the presidential campaign.

Mr Morrison said the government had "put in place a number of measures to ensure the integrity of our electoral system".
"I have instructed the Australian Cyber Security Centre to be ready to provide any political party or electoral body in Australia with immediate support, including making their technical experts available," he said.

"They have already briefed the electoral commissions and those responsible for cyber security for all states and territories. They have also worked with global anti-virus companies to ensure Australia's friends and allies have the capacity to detect this malicious activity. We have acted decisively to protect our national interests."

The attack occurred just a few months before an election in May, raising fears that any theft of MPs’ and staffers’ private correspondence could be used for the purposes of election interference.

The Department of Parliamentary Services, which runs the parliamentary computer network used by MPs and their staff, has significantly upgraded its cyber security since the system was breached in 2011, reportedly by Chinese intelligence agencies. In that breach, Chinese agents are understood to have potentially been reading MPs’ emails for months.

House Speaker Tony Smith and Senate President Scott Ryan issued a joint statement immediately after the cyber-attack on Parliament earlier this month, saying there was no evidence any data had been accessed or taken.

SMH.com       AFR.com

You Might Also Read: 

Cyber Attacks On Australia Reveal A Pattern:

« Your Employees Are The Major Risk To Cyber Security
Top Six Cyber Secure Countries »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Secure-NOK

Secure-NOK

Secure-NOK provides products and solutions that detect and remove security attacks and harmful events in industrial networks and control systems.

Cybernance

Cybernance

Cybernance provide an enterprise-wide, web-based software solution for managing and mitigating cyber risk based on key compliance frameworks.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Fluency Security

Fluency Security

Fluency is the only Security Analytics & Orchestration (SAO) solution that automates correlation, detection, validation and ongoing tracking.

Center for Applied Cybersecurity Research (CACR) - University of Indiana

Center for Applied Cybersecurity Research (CACR) - University of Indiana

CACR serves Indiana and the nation by tackling cyber risk in research and other unusual environments through agile, holistic, principle-based cybersecurity.

Bureau Veritas

Bureau Veritas

Bureau Veritas are a world leader in Testing, Inspection and Certification. We provide certification and training services in areas including cybersecurity and data protection.

Irish National Accreditation Board (INAB)

Irish National Accreditation Board (INAB)

INAB is the national accreditation body for Ireland. The directory of members provides details of organisations offering certification services for ISO 27001.

At-Bay

At-Bay

At-Bay offer an end-to-end solution to cyber risk with comprehensive risk assessment, a tailored cyber insurance policy and year-long, active, risk-management service.

Sayata Labs

Sayata Labs

Sayata delivers a streamlined solution for processing cyber policies. Increase profitability with an easy and intuitive platform.

Scythe

Scythe

SCYTHE is a next generation red team platform for continuous and realistic enterprise risk assessments.

CounterFind

CounterFind

CounterFind is turnkey technology that allows brands to find and remove counterfeit and infringing merchandise from online marketplaces and social media sites.

Cympire

Cympire

Cympire significantly increases an organisation’s Cyber Resilience through continuous Training and Assessment. Cyber Security Training Platform. Cloud-based and fully customizable Cyber Range.

Cyber Lockout

Cyber Lockout

Comprehensive ransomware insurance and preventative cybersecurity technology solution, working together to help protect businesses 24/7/365.

Myota

Myota

Myota intelligently equips each file to be resilient and achieve Zero Trust-grade protection. Withstand ransomware and data breach attacks. Reduce data restoration time and effort.

SignalFire

SignalFire

SignalFire invest across both enterprise and consumer sectors at the seed and early growth stages.

Trustack

Trustack

Trustack services cover connectivity, infrastructure services, security, unified comms, agile working and more. Our team of consultants deliver customised solutions tailored to your needs.