China Accused Of A Cyber-Attack On Australia's Parliament

Australia's security agencies are investigating a cyber breach of the Federal Parliament's computer network that ABC, the Australian Broadcasting Corporation, understands is likely the result of a foreign government attack. The agencies are looking into whether China is behind the incident.

In a statement, Federal Parliament's presiding officers said authorities were yet to detect any evidence data had been stolen in the breach.

One source said the response to the attack had been swift but the hackers were "sophisticated this time around". Computer passwords have been reset as a precaution as the investigations continue.

"We have no evidence that this is an attempt to influence the outcome of parliamentary processes or to disrupt or influence electoral or political processes," the Parliament's presiding officers said in a statement.

"Accurate attribution of a cyber incident takes time and investigations are being undertaken in conjunction with the relevant security agencies."

The Australian Signals Directorate (ASD) is working to secure the network and says action was taken as soon as the breach was detected.

"The necessary steps are being taken to mitigate the compromise and minimise any harm," ASD said in a statement.
A cyber security expert warned about the seriousness of the breach.

"If you look at what goes on in Parliament House, you've got politicians, you've got staffers, you've got government departments that are moving in and out of the organisation and a lot of that is through electronic means," adjunct professor Nigel Phair, from the University of Canberra, said.

"If I was a nation state, or dare I say any hacker looking for state secrets, this is the crown jewels."

Hackers caught in early stages, ABC told
Sources have told the ABC that the hackers were caught in the early stages of gaining access to the computer network.
The incident has been compared to a robber breaking into a house, whereby authorities know the front door has been broken but are yet to find out if anything else has been taken, or if there is another way to break in.

The attack does not affect the computer systems of government ministers and their staff, however it does affect government backbenchers, the Opposition and crossbenchers. Labor politicians and staff said access to their emails had been intermittent since the attack. Opposition Leader Bill Shorten said he was satisfied with the response so far.

"I've had some briefings on it. I'm satisfied from what I've heard initially that our security agencies and the president [of the Senate] and the Speaker [of the House] have moved in the right way to make sure that our parliamentary networks are secure," he said.

Mr Shorten described the breach as a "wake-up call", saying while Parliament had the resources to respond to a cyber-attack, many small and medium-sized businesses did not.

"They don't have the budget of the Parliament of Australia. If I'm p rime minister I'm going to invest a lot more in the cyber security of our small and medium sized enterprises."

RadioNZ:

You Might Also Read:

Cyber Attacks On Australia Reveal A Pattern:

 

 

« Cyberwar Vs. Traditional Conflict
Russia May Disconnect From The Internet »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

PlaxidityX

PlaxidityX

PlaxidityX (formerly Argus Cyber Security) is a global leader in mobility cyber security, provides DevSecOps, vehicle protection and fleet protection technologies and services.

Menlo Security

Menlo Security

Menlo Security protects organizations from cyberattacks by eliminating the threat of malware from the web, documents, and email.

mnemonic

mnemonic

mnemonic helps businesses manage their security risks, protect their data and defend against cyber threats.

Rogue Wave Software

Rogue Wave Software

At Rogue Wave, our mission is to simplify your hardest problems, improve software quality and security, and shorten the time it takes to deliver value.

Sternum

Sternum

Sternum provides reliable and effective endpoint security for any IoT device, using robust technology and seamless integration.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

SecureThings

SecureThings

SecureThings focus is to provide guidance and technology to secure connected vehicles in order to build end-to-end security for the automotive industry.

ST Engineering Antycip

ST Engineering Antycip

ST Engineering Antycip (formerly Antycip Simulation) is Europe’s leading provider of professional grade COTS simulation software, projection & display systems, and related engineering services.

Abacus Group

Abacus Group

Abacus Group is a global IT services firm for alternative investment firms, providing an enterprise technology platform specifically designed to meet the unique needs of financial services.

S2W

S2W

S2W is a data intelligence company specialized in cyber threat intelligence, brand/digital abuse, and blockchain.

Kolide

Kolide

Kolide ensures that if a device isn't secure, it can't access your apps.

Center for Cyber Security Studies & Research (CFCS2R)

Center for Cyber Security Studies & Research (CFCS2R)

CFCS2R's mission is to empower individuals, organizations, and governments with the knowledge and tools necessary to protect against cyber threats.

Triskele Labs

Triskele Labs

Triskele Labs deliver services including Penetration Testing, Compliance and Risk Management through to 24*7*365 Security Operations and outsourced Cybersecurity Managers.

Defence Labs

Defence Labs

Defence Labs is a cybersecurity company specialising in cost effective penetration testing for small-to-medium sized enterprises.

Panasonic Automotive Systems

Panasonic Automotive Systems

Panasonic Automotive Systems brings together security technologies and human resources cultivated across an extensive range of businesses into the automotive field.

Lyvoc

Lyvoc

Lyvoc is a premier cybersecurity integration partner renowned for its expertise in supporting its clients to accelerate and secure their digital transformation.