Only Four Suspects In Australia's High Level Attack

Suspicion is falling on Chinese spies for targeting the computer systems of Australia's three major political parties, with intelligence officials acknowledging the skilled cyber hackers were the most sophisticated to confront Australia in years. 

Australia’s Prime Minister Scott Morrison has revealed Australia's political parties suffered cyber-attacks alongside the Parliament House computer network several weeks ago by a "sophisticated state actor".

The announcement is likely to intensify speculation that China was behind the attacks, which come just three months before the federal election, though Mr Morrison said there was no evidence of election interference.

Sources are describing the level of sophistication as "unprecedented" but are unable to say yet which foreign government is behind the attack.

The attacks are understood to carry the digital fingerprints of China, though authorities are concerned that another state could be replicating the hallmarks of Chinese intelligence to deflect blame towards them.

Mr Morrison told Parliament on Monday 18th February that while investigating the parliamentary hack, cybersecurity authorities "also became aware that the networks of some political parties, Liberal, Labor and Nationals, have also been affected". Security agencies "acted decisively to confront it", Mr Morrison said.

"Our cyber experts believe that a sophisticated state actor is responsible for this malicious activity."

Only four nations are thought to be capable of such a high-level attack: China, Russia, Israel and the United States. The theft of any party or political material has echoes of the 2016 election interference campaign against the United States by Russia when the Democratic National Committee was hacked by Russia, and damaging information was released during the presidential campaign.

Mr Morrison said the government had "put in place a number of measures to ensure the integrity of our electoral system".
"I have instructed the Australian Cyber Security Centre to be ready to provide any political party or electoral body in Australia with immediate support, including making their technical experts available," he said.

"They have already briefed the electoral commissions and those responsible for cyber security for all states and territories. They have also worked with global anti-virus companies to ensure Australia's friends and allies have the capacity to detect this malicious activity. We have acted decisively to protect our national interests."

The attack occurred just a few months before an election in May, raising fears that any theft of MPs’ and staffers’ private correspondence could be used for the purposes of election interference.

The Department of Parliamentary Services, which runs the parliamentary computer network used by MPs and their staff, has significantly upgraded its cyber security since the system was breached in 2011, reportedly by Chinese intelligence agencies. In that breach, Chinese agents are understood to have potentially been reading MPs’ emails for months.

House Speaker Tony Smith and Senate President Scott Ryan issued a joint statement immediately after the cyber-attack on Parliament earlier this month, saying there was no evidence any data had been accessed or taken.

SMH.com       AFR.com

You Might Also Read: 

Cyber Attacks On Australia Reveal A Pattern:

« Your Employees Are The Major Risk To Cyber Security
Top Six Cyber Secure Countries »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Centripetal Networks

Centripetal Networks

Centripetal Networks was founded with one vision - to protect networks from advanced threats by simplifying intelligence-driven security.

Fastpath Solutions

Fastpath Solutions

Fastpath deliver software solutions that enable you to take control of your security, compliance and risk management initiatives.

Viavi Solutions

Viavi Solutions

Viavi Solutions is a global leader in both network and service enablement and optical security performance products and solutions.

Span

Span

Span designs, develops and maintains information systems based on advanced technological solutions of global IT leaders.

Entel CyberSecure

Entel CyberSecure

Entel CyberSecure is a portfolio of Cybersecurity solutions and services for the protection, defense, risk management and regulatory compliance of ICT Systems for corporations and Government.

Accertify

Accertify

Accertify is a leading provider of fraud prevention, chargeback management, and payment gateway solutions.

Dual Layer IT Solutions

Dual Layer IT Solutions

Dual Layer offer a full range of IT Services and Solutions for businesses from IT infrastructure design to cloud/hosted solutions, cybersecurity, disaster recovery and IT training.

SmartCyber

SmartCyber

SmartCyber is a company specializing in custom IT projects and Cybersecurity.

Cloudsine

Cloudsine

Cloudsine (formerly Banff Cyber Technologies) is a cloud technology company specializing in cloud adoption, security and innovation.

Network Intelligence

Network Intelligence

Network Intelligence delivers a comprehensive suite of AI-powered cybersecurity solutions built on the ADVISE framework.

Uptycs

Uptycs

Uptycs combines the open source universal agent, osquery, with a scalable security analytics platform for fleet visibility, intrusion detection, vulnerability monitoring and compliance.

Have I Been Pwned (HIBP)

Have I Been Pwned (HIBP)

Have I Been Pwned is a free resource for anyone to quickly assess if they may have been put at risk due to an online account of theirs having been compromised or "pwned" in a data breach.

SecureData

SecureData

SecureData provide professional data recovery services, digital forensics, data recovery software and FIPS 140-2 Level 3 Validated hardware encrypted drives.

KSOC Labs

KSOC Labs

KSOC is an event-driven SaaS platform built to automatically remediate Kubernetes security risks.

Imprivata

Imprivata

Imprivata is the digital identity company for life- and mission-critical industries, redefining how organizations solve complex workflow, security, and compliance challenges.

TDi Technologies

TDi Technologies

TDI Technologies' flagship solution ConsoleWorks, is an IT/OT cybersecurity and operations platform for Privileged Access Users.