Only Four Suspects In Australia's High Level Attack

Suspicion is falling on Chinese spies for targeting the computer systems of Australia's three major political parties, with intelligence officials acknowledging the skilled cyber hackers were the most sophisticated to confront Australia in years. 

Australia’s Prime Minister Scott Morrison has revealed Australia's political parties suffered cyber-attacks alongside the Parliament House computer network several weeks ago by a "sophisticated state actor".

The announcement is likely to intensify speculation that China was behind the attacks, which come just three months before the federal election, though Mr Morrison said there was no evidence of election interference.

Sources are describing the level of sophistication as "unprecedented" but are unable to say yet which foreign government is behind the attack.

The attacks are understood to carry the digital fingerprints of China, though authorities are concerned that another state could be replicating the hallmarks of Chinese intelligence to deflect blame towards them.

Mr Morrison told Parliament on Monday 18th February that while investigating the parliamentary hack, cybersecurity authorities "also became aware that the networks of some political parties, Liberal, Labor and Nationals, have also been affected". Security agencies "acted decisively to confront it", Mr Morrison said.

"Our cyber experts believe that a sophisticated state actor is responsible for this malicious activity."

Only four nations are thought to be capable of such a high-level attack: China, Russia, Israel and the United States. The theft of any party or political material has echoes of the 2016 election interference campaign against the United States by Russia when the Democratic National Committee was hacked by Russia, and damaging information was released during the presidential campaign.

Mr Morrison said the government had "put in place a number of measures to ensure the integrity of our electoral system".
"I have instructed the Australian Cyber Security Centre to be ready to provide any political party or electoral body in Australia with immediate support, including making their technical experts available," he said.

"They have already briefed the electoral commissions and those responsible for cyber security for all states and territories. They have also worked with global anti-virus companies to ensure Australia's friends and allies have the capacity to detect this malicious activity. We have acted decisively to protect our national interests."

The attack occurred just a few months before an election in May, raising fears that any theft of MPs’ and staffers’ private correspondence could be used for the purposes of election interference.

The Department of Parliamentary Services, which runs the parliamentary computer network used by MPs and their staff, has significantly upgraded its cyber security since the system was breached in 2011, reportedly by Chinese intelligence agencies. In that breach, Chinese agents are understood to have potentially been reading MPs’ emails for months.

House Speaker Tony Smith and Senate President Scott Ryan issued a joint statement immediately after the cyber-attack on Parliament earlier this month, saying there was no evidence any data had been accessed or taken.

SMH.com       AFR.com

You Might Also Read: 

Cyber Attacks On Australia Reveal A Pattern:

« Your Employees Are The Major Risk To Cyber Security
Top Six Cyber Secure Countries »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Intruder

Intruder

Intruder is a cloud-based vulnerability scanner that finds cyber security weaknesses in your digital infrastructure, to avoid costly data breaches.

European Business Reliance Centre (EBRC)

European Business Reliance Centre (EBRC)

EBRC is a leader in integrated Data Center, Cloud and Managed Services and a Centre of Excellence in Europe in the Management of Sensitive Information.

Salient CRGT

Salient CRGT

Salient CRGT is a leading provider of health, data analytics, cloud, agile software development, mobility, cyber security, and infrastructure solutions.

BrainChip

BrainChip

BrainChip is the leading provider of neuromorphic computing solutions, a type of artificial intelligence that is inspired by the biology of the human neuron - spiking neural networks.

Devel

Devel

Devel is a LATAM cybersecurity company specialized in providing red, blue and purple team services for the financial sector.

Sergeant Laboratories

Sergeant Laboratories

Sergeant Laboratories builds advanced technologies to prove compliance in complex IT security and regulatory compliance situations.

Phakamo Tech

Phakamo Tech

Phakamo Tech offers a full set of governance, risk, compliance, cybersecurity and Microsoft Cloud services that include consulting, planning, implementation and cyber incident response.

Horizon3.ai

Horizon3.ai

Horizon3.ai is a leader in security assessment and validation enabling continuous security overwatch from an attacker’s perspective through our NodeZero SaaS solution.

Pacific Cyber Security Operational Network (PaCSON)

Pacific Cyber Security Operational Network (PaCSON)

PaCSON is an operational cyber security network of regional working-level cyber security experts in the Pacific.

Cyral

Cyral

Easily observe, control, and protect your data endpoints in a cloud and DevOps-first world. Discover Data Mesh Security with Cyral.

Support Link Technologies (SLT)

Support Link Technologies (SLT)

Support Link Technologies are an IT Solutions Company committed to achieving customer satisfaction through excellent customer service.

Accops Systems

Accops Systems

Accops enables secure and instant remote access to business applications from any device and network, ensuring compliant enterprise mobility.

Siren

Siren

Siren provides the leading Investigative Intelligence Platform to some of the world’s leading Law Enforcement, National Security and Cyber threat investigators.

GoodAccess

GoodAccess

GoodAccess is the cybersecurity platform that gives your business the security benefits of zero trust without the complexities so your users can securely access digital resources anytime, anywhere.

OSP Cyber Academy

OSP Cyber Academy

OSP Cyber Academy are a managed service provider of cyber, information security and data protection training.

Sababa Security

Sababa Security

Sababa Security is the first Italian innovation cyber security vendor, that provides security products, training, and managed services to protect diverse IT and OT environments.