New Zealand Central Bank Cyber Attack

The Reserve Bank New Zealand has reported that it suffered a "malicious and illegal breach” of one of its third-party data sharing application systems used by the bank and apologised to customers for some problems that the cyber attack caused, ordering an immediate independent investigation. "We are working closely with domestic and international cyber security experts and other relevant authorities as part of our investigation and response to this malicious attack," Governor Adrian Orr said in a statement issued on January 15th.

It is unclear when the breach took place, who was responsible, and in what country the file-sharing service is based. It will take time to understand the full implications of the breach, according to the bank.

“In addition to the forensic cyber investigation currently underway, we have appointed an independent third party to undertake a comprehensive general review of this incident. We will be as transparent and clear as possible as this progresses, and will release the review’s terms of reference shortly... The nature and extent of information that has been potentially accessed is still being determined, but it may include some commercially and personally sensitive information," the Bank said.

A detailed forensic cyber investigation is underway and the Bank is working directly with affected stakeholders whose information may have been breached. In its 2019 Financial Stability report, the RBNZ warned that cyber attacks  were on the rise in New Zealand and that  "More extreme events have a low probability but are still plausible.”

Several other major organisations in New Zealand have been attacked in the past year, notably including the New Zealand Stock Exchange which was  targeted by sustained distributed denial of service (DDoS) attacks which halted trading for almost a week. In February of last year  the RBNZ reported that the expected cost of cyber incidents for the banking and insurance industry was between NZD80m ($58m) and NZD140m per year.

In its latest report, the New Zealand government agency CERT (Computer Emergency Response Team) said cyber attacks in the country had increased 33% year-on-year.

RBNZ:       Bloomberg:      DW:       NBC:         Yahoo:         StraitsTimes:       

You Might Also Read:

North Korean Hackers Specialise In Financial Theft:

 

« Spies In Cyberspace
Five Reasons Why Women Should Consider A Career In Cyber Security »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Information Security Media Group (ISMG)

Information Security Media Group (ISMG)

Information Security Media Group is the world’s largest media organization devoted solely to information security and risk management.

ProfitBricks

ProfitBricks

ProfitBricks is a secure cloud computing infrastructure-as-a-service (IaaS) solution.

Networkers

Networkers

Networkers is a global recruitment consultancy helping unite job-seekers and hiring companies across the technology industry.

Cobalt Strike

Cobalt Strike

Cobalt Strike is penetration testing software designed to execute targeted attacks.

BrainChip

BrainChip

BrainChip is the leading provider of neuromorphic computing solutions, a type of artificial intelligence that is inspired by the biology of the human neuron - spiking neural networks.

KOBIL

KOBIL

KOBIL is a pioneer in the fields of smart card, one-time password, authentication and cryptography.

OGiTiX

OGiTiX

OGiTiX Software AG is a German software manufacturer specializing in Identity and Access Management.

Valtori

Valtori

Government ICT Centre Valtori provides sector-independent ICT services for the central government, while taking into account the special requirements related to security and preparedness.

RHEA Group

RHEA Group

RHEA Group offers aerospace and security engineering services and solutions, system development, and technologies including cyber security.

AppOmni

AppOmni

AppOmni is the only SaaS CSPM solution that gives teams all the tools they need to be successful – from security posture management to monitoring and detection to continuous compliance.

doIT Solutions

doIT Solutions

doIT solutions specialize in IT security and infrastructure, security automation, data center, and cybersecurity.

Trusted Technologies and Solutions (TTS)

Trusted Technologies and Solutions (TTS)

TTS is a security consulting company specialised on business continuity and crisis management, information security management, information risk management and identity and access management.

Creative Destruction Lab (CDL)

Creative Destruction Lab (CDL)

Creative Destruction Lab is a nonprofit organization that delivers an objectives-based program for massively scalable, seed-stage, science- and technology-based companies.

IBM Security

IBM Security

IBM manufactures and markets computer hardware, middleware and software, and offers hosting and consulting services in areas ranging from mainframe computers to nanotechnology.

Infosec Ventures

Infosec Ventures

Infosec Ventures incubates and scales cyber security innovators that solve inefficiencies in cyber security.

Basalt

Basalt

Basalt provide qualified consulting services in information security, personnel security and physical security.