Australia’s Critical Infrastructure Is Under Constant Attack

A cyber attack is being reported in Australia every 7.8 minutes as sophisticated hackers, including foreign governments, target the nation’s critical infrastructure and essential services such as hospitals, food distribution and electricity systems. 

Australia has reported a 13% jump in cyber crime in the past year, with about one incident in four targeting critical infrastructure and services as working from home during the pandemic made more people vulnerable to online attacks. 

The Australian Cyber Security Centre (ACSC) says that malicious actors have pivoted to exploit the those working from home and targeting vulnerable people and health services to conduct espionage, and steal money and sensitive data. The wave of hacks last financial year included a significant ransomware attack against a Victorian public health service in March, which affected four hospitals and aged care homes and resulted in the postponement of elective surgeries.

These incidents have “underscored the vulnerability of critical infrastructure to significant disruption in essential services, lost revenue and the potential of harm or loss of life”.

The ACSC, which is part of the Australian Signals Directorate spy agency, received more than 67,500 reports of cyber crime of all types in 2020-21, or one every eight minute compared with one every 10 minutes the previous year  The ACSC also report  ransomware attacks disclosed to the ACSC increased 15% in the 2020-21 financial year, when compared with the previous financial year. The report found cyber criminals exploited the Coronavirus situation in Australia, with more than 18,000 cybercrimes related to the pandemic.

The ACSC report, which covers the period from July 2020 to June 2021, says businesses, individuals and other entities had incurred more than $33bn in total losses from cyber crime throughout the year.

Cyber criminals sought to exploit the pandemic by encouraging recipients to enter personal credentials to access Covid-related information or services, while unnamed foreign governments targeted the health sector seeking “access to intellectual property or sensitive information about Australia’s response to Covid”.

The ACSC responded to about 1,630 cybersecurity incidents in 2020-21, or an average of 31 cybersecurity incidents a week.
“Approximately one quarter of reported cybersecurity incidents affected critical infrastructure organisations, including essential services such as education, health, communications, electricity, water and transport,” the report says. A breakdown of the severity of cyber incidents in 2020-21 shows there were 14 cases in which federal government entities or nationally significant infrastructure suffered the removal or damage of sensitive data or intellectual property.

The Australian government has been growing increasingly concerned about the threat of “grey zone” attacks from countries such as China and Russia. The “grey zone” refers to a growing area of political warfare that falls somewhere between war and peace and includes cyber attacks, disinformation campaigns, intellectual property theft, coercion and propaganda.

ACSC:     Reuters:    7News:    Bloomberg:    SMH:      The Age:     Guardian

You Might Also Read: 

Australia To Spend Another A$1billion On Cyber Security:

 

« Industrial Companies At Risk As Attacks Double
Everything You Need To Know About Business Password Safety »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Rackspace Technology

Rackspace Technology

Rackspace Technology is a leading provider of managed services across all major public and private cloud technologies. Secure your IT environments with powerful cloud security solutions and support.

FinalCode

FinalCode

FinalCode offers a file encryption and file-based enterprise digital rights management (eDRM) platform.

GreyCampus

GreyCampus

GreyCampus is a leading provider of training for working professionals in the areas of Project Management, Big Data, Data Science, Service Management, Quality Management and Information Security.

InstaSafe Technologies

InstaSafe Technologies

InstaSafe®, a Software Defined Perimeter based (SDP) one-stop Secure Access Solution for On-Premise and Cloud Applications.

IberLayer

IberLayer

IberLayer is the company behind the Email Guardian service, a cloud based Email Total Protection system that filters and blocks email threats.

Exponential-e

Exponential-e

Exponential-e provide Cloud and Unified Communications services and world-class Managed IT Services including Cybersecurity.

Wiser Market

Wiser Market

Wiser Market is a leading company in global online brand protection services, intellectual property protection, anti-Counterfeit & trademark infringements.

3i Infotech

3i Infotech

3i Infotech offers consulting & professional services to assess, design and build next gen IT infrastructure, and managed services to operate, optimize and continuously improve.

1Touch.io

1Touch.io

1touch.io Inventa is an AI-based, sustainable data discovery and classification platform that provides automated, near real-time discovery, mapping, and cataloging of all sensitive data.

Vectra AI

Vectra AI

Vectra threat detection & response - see and stop threats across hybrid and multi-cloud enterprises.

Probity

Probity

Probity Inc. is a certified software development and systems engineering company, providing support to federal government and national defense related clients.

Custodia Continuity

Custodia Continuity

Custodia Continuity manage your Security, Backup, Continuity and Compliance. You get on with your business.

Anjuna Security

Anjuna Security

Software from Anjuna Security effortlessly enables enterprises to safely run even their most sensitive workloads in the public cloud.

Alcatel-Lucent Enterprise (ALE)

Alcatel-Lucent Enterprise (ALE)

We are Alcatel-Lucent Enterprise. Our mission is to make everything connect with digital age networking, communications and cloud solutions.

Clango

Clango

Clango employs an identity-centric approach to optimizing your cybersecurity investment while minimizing risk.

XY Cyber

XY Cyber

XY Cyber enable Generative AI for Cyber Operations. We simplify the complex world of cyber threats into actionable strategies, empowering your defense with AI-powered solutions.