China Accused Of A Cyber-Attack On Australia's Parliament

Australia's security agencies are investigating a cyber breach of the Federal Parliament's computer network that ABC, the Australian Broadcasting Corporation, understands is likely the result of a foreign government attack. The agencies are looking into whether China is behind the incident.

In a statement, Federal Parliament's presiding officers said authorities were yet to detect any evidence data had been stolen in the breach.

One source said the response to the attack had been swift but the hackers were "sophisticated this time around". Computer passwords have been reset as a precaution as the investigations continue.

"We have no evidence that this is an attempt to influence the outcome of parliamentary processes or to disrupt or influence electoral or political processes," the Parliament's presiding officers said in a statement.

"Accurate attribution of a cyber incident takes time and investigations are being undertaken in conjunction with the relevant security agencies."

The Australian Signals Directorate (ASD) is working to secure the network and says action was taken as soon as the breach was detected.

"The necessary steps are being taken to mitigate the compromise and minimise any harm," ASD said in a statement.
A cyber security expert warned about the seriousness of the breach.

"If you look at what goes on in Parliament House, you've got politicians, you've got staffers, you've got government departments that are moving in and out of the organisation and a lot of that is through electronic means," adjunct professor Nigel Phair, from the University of Canberra, said.

"If I was a nation state, or dare I say any hacker looking for state secrets, this is the crown jewels."

Hackers caught in early stages, ABC told
Sources have told the ABC that the hackers were caught in the early stages of gaining access to the computer network.
The incident has been compared to a robber breaking into a house, whereby authorities know the front door has been broken but are yet to find out if anything else has been taken, or if there is another way to break in.

The attack does not affect the computer systems of government ministers and their staff, however it does affect government backbenchers, the Opposition and crossbenchers. Labor politicians and staff said access to their emails had been intermittent since the attack. Opposition Leader Bill Shorten said he was satisfied with the response so far.

"I've had some briefings on it. I'm satisfied from what I've heard initially that our security agencies and the president [of the Senate] and the Speaker [of the House] have moved in the right way to make sure that our parliamentary networks are secure," he said.

Mr Shorten described the breach as a "wake-up call", saying while Parliament had the resources to respond to a cyber-attack, many small and medium-sized businesses did not.

"They don't have the budget of the Parliament of Australia. If I'm p rime minister I'm going to invest a lot more in the cyber security of our small and medium sized enterprises."

RadioNZ:

You Might Also Read:

Cyber Attacks On Australia Reveal A Pattern:

 

 

« Cyberwar Vs. Traditional Conflict
Russia May Disconnect From The Internet »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Bob's Business

Bob's Business

Bob's Business adopts a fresh approach to information security awareness and compliance training, delivering key information through the use of short animated movies.

ESL Bangladesh

ESL Bangladesh

ESL is the Largest IT Infrastructure & Telecom Service Provider in Bangladesh.

SGBox

SGBox

SGBox is a highly flexible and scalable solution for IT security. Choose the modules which your company needs and implement it without any modification to your network infrastructure.

SevenShift

SevenShift

SevenShift is a security consulting firm with a wealth of experience in the worlds of Cybersecurity and Internet of Things (IoT).

Hassans International Law Firm

Hassans International Law Firm

Hassans is the largest law firm in Gibraltar, providing a full range of legal services across corporate and commercial law including Data Protection and GDPR compliance.

BaaSid

BaaSid

BaaSid is next generation security technology for data security & security authentication based on De-centralized & Blockchain.

Paragon Cyber Solutions

Paragon Cyber Solutions

Paragon Cyber Solutions provides specialized security risk management and IT solutions to protect the integrity of your business operations.

Port-IT

Port-IT

Port-IT is a leading partner in cybersecurity solutions tailored for the maritime industry.

Neosoft

Neosoft

Néosoft is an independent digital transformation consulting group with expertise in Consulting & Agility, Cybersecurity, Data, DevOps, Infrastructure & Cloud and Software Engineering.

Advanced IT

Advanced IT

Reliable managed IT Security & support services that will help you take your business operations to the next level without breaking the bank!

XBOW

XBOW

XBOW brings AI to offensive security, augmenting the work of bug hunters and security researchers.

Black Belt Secure

Black Belt Secure

We provide critical cybersecurity services such as managed security, ransomware mitigation, penetration testing, system auditing and compliance services to your organization.

Neptune Shield

Neptune Shield

Neptune Shield's mission is to deliver cutting edge Maritime focused Cyber Security & Threat Protection through our Hampton Roads based Tech & Cyber Security Hub.

ThreatMate

ThreatMate

ThreatMate empowers businesses with comprehensive tools to detect, protect, and remediate against cyber threats.

Securafy

Securafy

At Securafy, we understand how important it is to have the right IT partner by your side. For over 30 years, we’ve helped businesses stay secure, connected, and compliant.

Runtime Ventures

Runtime Ventures

Runtime Ventures focuses on seed and pre-seed stage cybersecurity investments. We love to work with ambitious founders building the future of the secure enterprise.