Cyber Attacks On Australia Reveal A Pattern

China's leading security agency has directed a surge in cyber-attacks on Australian companies over the past year, breaching an agreement struck between Premier Li Keqiang and former Prime Minister Malcolm Turnbull to not steal each other's commercial secrets.

An investgation by journalists for  Fairfax Media and Nine News says it has confirmation that China's Ministry of State Security has been increasing its cyber-attacks on Australian businesses.

The attack operation is known in cyber circles as "Operation Cloud Hopper" and was first described in detail by the international consultancy PwC in a 2017 report, though it fell short of blaming China outright. The Chinese Foreign Ministry has denied the reports.

The attacks breach an agreement between Premier Li Keqiang and former Prime Minister Malcolm Turnbull not to steal each other's commercial secrets.

Head of cyber security at PwC New Zealand Adrian van Hest, who was part of the investigation, told reporteres there was no evidence to suggest New Zealand had been targeted in the attacks. He said he passed the information from the investigation onto the New Zealand Government Communications Security Bureau (GCSB) to look into it further.

"They (GCSB) have looked out for, the fingerprint if you will, of this activity, but as far as a definitive smoking gun of a New Zealand organisation being affected, I don't have any visibility on that," he said. Mr van Hest said Japan businesses that provide IT services to other companies were particularly targeted in the attacks. He said by targeting those businesses, the attackers had a back door entrance to the intellectual property of their clients.

"It's perceived as getting information that helps the nation state of China, or whoever, build up their capability in an industrial domain.

"They effectively skip the whole research and investment cycle and just take how you do something."

Mr van Hest said the theory behind China's attacks is that it's systematic and that they're going after industries the country competes with.

RadioOnz:      AFR:

You Might Also Read:

Staying One Step Ahead Of The Cyber Spies:

 

« From Machine Learning To Machine Reasoning
British Parliament Seizes Facebook Documents »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

American International Group (AIG)

American International Group (AIG)

AIG, is an American multinational insurance corporation. Commercial services include cyber risk insurance.

Logscape

Logscape

Logscape provides a big data analytical tool for log file analysis and operational analytics.

CS Group

CS Group

CS Group offers a complete range of security solutions from consultancy to security maintenance and from secure infrastructure design to security governance.

KLC Consulting

KLC Consulting

KLC Consulting offers information assurance / Security, IT Audit, and Information Technology products and services to government and Fortune 1000 companies.

Hellenic Accreditation System (ESYD)

Hellenic Accreditation System (ESYD)

ESYD is the national accreditation body for Greece. The directory of members provides details of organisations offering certification services for ISO 27001.

Council of Europe Convention on Cybercrime

Council of Europe Convention on Cybercrime

The Council of Europe helps to protect societies worldwide from the threat of cybercrime through the Convention on Cybercrime.

Ten Eleven Ventures

Ten Eleven Ventures

Ten Eleven is a specialized venture capital firm exclusively dedicated to helping cybersecurity companies thrive.

Option3

Option3

Option3 (formerly Option3Ventures - O3V) primarily seek control investments in the growing cybersecurity mid-market, seeking to build champions with the scale to bring cutting-edge products to market.

Aries Security

Aries Security

Aries Security provides a premiere cyber training range and skills assessment suite and develops content for all levels of ability.

InfusionPoints

InfusionPoints

InfusionPoints is your independent trusted partner dedicated to assisting you in building your secure and compliant business solutions.

RMRF Tech

RMRF Tech

RMRF is a team of cybersecurity engineers and penetration testers which specializes in the development of solutions for early cyber threat detection and prevention.

Protectt.ai Labs

Protectt.ai Labs

Protectt.ai Labs is India’s first mobile security start up building awareness & providing solutions for mobile app, device & transaction security.

The Security Bulldog

The Security Bulldog

The Security Bulldog distills and assimilates open source cyber intelligence to enable security teams to understand threats more quickly, make better decisions, and accelerate detection and response.

Laneden

Laneden

Laneden specialise in helping organisations identify security concerns and quantify the risks you may have across your assets, using Penetration Testing, Threat Simulation and Compliance Testing.

Astute Technology Management

Astute Technology Management

Astute Technology Management helps businesses take control of their technology and work with greater confidence.

Cypheria

Cypheria

Cypheria harness the expertise of elite military units and combine it with extensive digital combat experience to deliver unparalleled security solutions for organizations.