Cyber Attacks On Australia Reveal A Pattern

China's leading security agency has directed a surge in cyber-attacks on Australian companies over the past year, breaching an agreement struck between Premier Li Keqiang and former Prime Minister Malcolm Turnbull to not steal each other's commercial secrets.

An investgation by journalists for  Fairfax Media and Nine News says it has confirmation that China's Ministry of State Security has been increasing its cyber-attacks on Australian businesses.

The attack operation is known in cyber circles as "Operation Cloud Hopper" and was first described in detail by the international consultancy PwC in a 2017 report, though it fell short of blaming China outright. The Chinese Foreign Ministry has denied the reports.

The attacks breach an agreement between Premier Li Keqiang and former Prime Minister Malcolm Turnbull not to steal each other's commercial secrets.

Head of cyber security at PwC New Zealand Adrian van Hest, who was part of the investigation, told reporteres there was no evidence to suggest New Zealand had been targeted in the attacks. He said he passed the information from the investigation onto the New Zealand Government Communications Security Bureau (GCSB) to look into it further.

"They (GCSB) have looked out for, the fingerprint if you will, of this activity, but as far as a definitive smoking gun of a New Zealand organisation being affected, I don't have any visibility on that," he said. Mr van Hest said Japan businesses that provide IT services to other companies were particularly targeted in the attacks. He said by targeting those businesses, the attackers had a back door entrance to the intellectual property of their clients.

"It's perceived as getting information that helps the nation state of China, or whoever, build up their capability in an industrial domain.

"They effectively skip the whole research and investment cycle and just take how you do something."

Mr van Hest said the theory behind China's attacks is that it's systematic and that they're going after industries the country competes with.

RadioOnz:      AFR:

You Might Also Read:

Staying One Step Ahead Of The Cyber Spies:

 

« From Machine Learning To Machine Reasoning
British Parliament Seizes Facebook Documents »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Hewlett Packard Enterprise (HPE)

Hewlett Packard Enterprise (HPE)

HPE is an information technology company focused on Enterprise networking, Services and Support.

Axis Capital

Axis Capital

AXIS Insurance’s Professional Lines Division is a leading underwriter of technology/cyber coverage and other specialty products around the globe.

Solana Networks

Solana Networks

Solana Networks is a specialist in IT networking and security.

Eseye

Eseye

Eseye is a global specialist supplier of cellular internet connectivity for intelligent IoT (Internet of Things) devices.

Bangladesh Association of Software & Information Services (BASIS)

Bangladesh Association of Software & Information Services (BASIS)

BASIS is the national trade body for Software & IT Enabled Service industry of Bangladesh.

ThirdWatch

ThirdWatch

ThirdWatch is a Data Science company with real-time automated fraud prevention solutions.

PhishX

PhishX

PhishX is a SaaS platform for security awareness that simulates Cyberthreats, train people, while measure and analysis results, reducing Cybersecurity risks for People and Companies.

Cyber Resilience

Cyber Resilience

Cyber Resilience offer an intensive program designed to help you create strategies to quickly become cyber resilient and to manage cyber risks in a measurable and predictable way.

Huntress Labs

Huntress Labs

Huntress provides managed threat detection and response services to uncover and address malicious footholds that slip past your preventive defenses.

Forever Group

Forever Group

Forever Group is a Managed Services Provider specialising in Telecommunications, IT Support, and Cyber Security.

Coveware

Coveware

Coveware helps businesses remediate ransomware. We help companies recover after files have been encrypted, and our analytic, monitoring and alerting tools help companies prevent ransomware incidents.

SpeQtral

SpeQtral

SpeQtral offers commercial space-based Quantum Key Distribution (QKD) founded on technology developed at the National University of Singapore.

Vircom

Vircom

With a large majority of cyber attacks starting with email, Vircom provides protection against the worst email security threats to your business.

Avanade

Avanade

Avanade is a leading provider of innovative digital, cloud and advisory services, industry solutions and design-led experiences across the Microsoft ecosystem.

Convergence Networks

Convergence Networks

Convergence Networks is one of North America's leading Managed Services & Security Providers.

Symbiotic Security

Symbiotic Security

Symbiotic Security revolutionizes code security by integrating an AI-driven security coach directly within developers' IDEs.