Australia Assaulted By Severe State-Backed Cyber Attacks

Australia's government and institutions are subject to a continued attacked by sophisticated state-based cyber hackers, Prime Minister Scott Morrison has said.

Amongst other issues, the attack forced a password reset of all Australian Parliament House network users, affecting politicians and all of their staff in a repeat of events in 2019. 

Cyber intelligence experts from the Australian Strategic Policy Institute (ASPI) have linked some of the hacks to China backed hackers. China has rejected the accusations that it was involved in these major cyber-attack on Australian institutions with a government spokesman claiming that China country is in fact a major victim of cyber-attacks.

The Prime Minister  is reported saying that the cyber-attacks are continuing and are covering all levels of government as well as essential services, private sector and businesses and being directed and carried out by a sophisticated state based actor. It is understood that the attacks have been happening over a number of months and are increasing.

The attack has been identified it as a nation-state hack due to its scale, the nature of the targeting and the signature methods used.  Although the Australian government has not directly accused China, it is one of the few states not allied with Australia, which has the capacity for such attacks.

Australia is likely seeking co-operation from it's Five Eyes intelligence partners, the United States, Canada, New Zealand as well as Britain

Relations between the countries have been growing difficult recent years and have significantly worsened after Australia echoed the US in calling for an inquiry into the origins of the Coronavirus, first detected in China last year. China subsequently imposed tariffs on Australian exports and warned its citizens not to travel to Australia. 

ASPI:           BBC:     Guardian:        SMH:            ZDNet:         Australian Finanacial Review

You Might Also Read:

Cyber Security Experts Needed in Australia

 

« Beware Trojan Mobile Banking Apps
Fake Qantas Facebook Page Promises Free Flights »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Perkins Coie LLP

Perkins Coie LLP

Perkins Coie LLP is an internationalk law firm with offices across the USA and Asia. Practice areas include Privacy and Data Security.

Scale Computing

Scale Computing

Scale Computing is an industry leading application platform for EDGE computing environments covering retail, manufacturing, financial services and government.

Bromium

Bromium

Bromium deliver a new technology called micro-virtualization to address the enterprise security problem and provide protection for end users against advanced malware.

Surrey Centre for Cyber Security (SCCS)

Surrey Centre for Cyber Security (SCCS)

The Centre focuses on three main research directions - Privacy and Data Protection, Secure Communications, and Human-Centred Security.

Cloud53

Cloud53

Cloud53 specialise in improving operational IT through strategic use of Cloud technologies and services.

Global Cyber Security Capacity Centre (GCSCC) - Oxford University

Global Cyber Security Capacity Centre (GCSCC) - Oxford University

GCSCC's work is focused on developing a framework for understanding what works, what doesn’t work and why – across all areas of cybersecurity capacity.

Servian

Servian

Servian is one of Australia's leading IT consultancies, with expertise in cloud, data, machine learning, DevOps and cybersecurity.

DataExpert Singapore

DataExpert Singapore

DataExpert Singapore provide solutions and services in the areas of Digital Forensics, Data Recovery, Data Duplication, Data Degaussing & Wiping, Data Destruction, and IT Disposal.

Cythereal

Cythereal

Cythereal is the leader in predicting and preventing advanced malware attacks. Security Automation for the Overwhelmed Administrator.

Blok Cyber Security

Blok Cyber Security

Blok provide small businesses and sole traders, with affordable, managed Cyber Security Packages that offer immediate protection and peace of mind.

CoreStack

CoreStack

CoreStack helps enterprises overcome cloud challenges such as ever growing security risks, stringent regulatory compliance needs and operational complexities.

Babble

Babble

Babble is a Unified Comms, Contact Centre and Cyber Solutions provider. We believe in making next-generation technology simple to use, deploy and manage.

CampusGuard

CampusGuard

CampusGuard focuses on the cybersecurity and compliance needs of campus-based organizations including higher education, healthcare, and state and local government.

Assetnote

Assetnote

The Assetnote platform enables organizations to effectively map and continuously monitor their external attack surface.

InfoTrust

InfoTrust

InfoTrust is a leading specialised cybersecurity practice that combines a customer-first consulting approach with next-generation security solutions.

Athena7

Athena7

Athena7 is a dedicated assessment practice committed to helping organizations understand how their infrastructure, backups, and security controls will withstand the latest threat actor tactics.