Only Four Suspects In Australia's High Level Attack

Suspicion is falling on Chinese spies for targeting the computer systems of Australia's three major political parties, with intelligence officials acknowledging the skilled cyber hackers were the most sophisticated to confront Australia in years. 

Australia’s Prime Minister Scott Morrison has revealed Australia's political parties suffered cyber-attacks alongside the Parliament House computer network several weeks ago by a "sophisticated state actor".

The announcement is likely to intensify speculation that China was behind the attacks, which come just three months before the federal election, though Mr Morrison said there was no evidence of election interference.

Sources are describing the level of sophistication as "unprecedented" but are unable to say yet which foreign government is behind the attack.

The attacks are understood to carry the digital fingerprints of China, though authorities are concerned that another state could be replicating the hallmarks of Chinese intelligence to deflect blame towards them.

Mr Morrison told Parliament on Monday 18th February that while investigating the parliamentary hack, cybersecurity authorities "also became aware that the networks of some political parties, Liberal, Labor and Nationals, have also been affected". Security agencies "acted decisively to confront it", Mr Morrison said.

"Our cyber experts believe that a sophisticated state actor is responsible for this malicious activity."

Only four nations are thought to be capable of such a high-level attack: China, Russia, Israel and the United States. The theft of any party or political material has echoes of the 2016 election interference campaign against the United States by Russia when the Democratic National Committee was hacked by Russia, and damaging information was released during the presidential campaign.

Mr Morrison said the government had "put in place a number of measures to ensure the integrity of our electoral system".
"I have instructed the Australian Cyber Security Centre to be ready to provide any political party or electoral body in Australia with immediate support, including making their technical experts available," he said.

"They have already briefed the electoral commissions and those responsible for cyber security for all states and territories. They have also worked with global anti-virus companies to ensure Australia's friends and allies have the capacity to detect this malicious activity. We have acted decisively to protect our national interests."

The attack occurred just a few months before an election in May, raising fears that any theft of MPs’ and staffers’ private correspondence could be used for the purposes of election interference.

The Department of Parliamentary Services, which runs the parliamentary computer network used by MPs and their staff, has significantly upgraded its cyber security since the system was breached in 2011, reportedly by Chinese intelligence agencies. In that breach, Chinese agents are understood to have potentially been reading MPs’ emails for months.

House Speaker Tony Smith and Senate President Scott Ryan issued a joint statement immediately after the cyber-attack on Parliament earlier this month, saying there was no evidence any data had been accessed or taken.

SMH.com       AFR.com

You Might Also Read: 

Cyber Attacks On Australia Reveal A Pattern:

« Your Employees Are The Major Risk To Cyber Security
Top Six Cyber Secure Countries »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Wisegate

Wisegate

Wisegate is a community of IT experts providing advisory services on all areas of IT including security.

Hitachi ID Systems

Hitachi ID Systems

Hitachi ID Systems offers comprehensive identity management and access governance, privileged access management and password management solutions.

AcceptLocal

AcceptLocal

AcceptLocal is a payments industry consultancy with expertise in payment processing, payment security, anti-money laundering and fraud prevention.

Norwegian Center for Information Security (NorSIS)

Norwegian Center for Information Security (NorSIS)

NorSIS) is an independent organization that works to increase knowledge and understanding of information security for businesses and individuals.

Cradlepoint

Cradlepoint

With Cradlepoint customers leverage the speed and economics of wired and wireless Internet broadband for branch, mobile, and IoT networks while maintaining end-to-end visibility, security and control.

Cyanre

Cyanre

Cyanre delivers state of the art cyber forensic services through software technologies and procedures that exceed conformities of major law enforcement agencies across the globe.

RedSeal

RedSeal

RedSeal’s network modeling and risk scoring platform is the foundation for enabling enterprise networks to be resilient to cyber events.

ReSec Technologies

ReSec Technologies

ReSec provides total protection against all types of known and unknown malware threats including viruses, Trojans, ransomware and phishing, regardless of their delivery method.

World Congress on Industrial Control Systems Security (WCICSS)

World Congress on Industrial Control Systems Security (WCICSS)

The World Congress on Industrial Control Systems Security (WCICSS) is focused on emerging trends in protection of industrial control systems.

River Loop Security

River Loop Security

River Loop Security specialize in solving complex cybersecurity challenges in the IoT and embedded devices space.

Defscope

Defscope

Defscope is an Azerbaijani company entirely focused on cybersecurity offering training, security consulting, and other professional services.

Advent One

Advent One

Advent One are recognised for solving intricate dilemmas, not only making technology work but building foundations that customers can grow upon in an effective and secure way.

Intel Ignite

Intel Ignite

Intel Ignite is an internationally renowned acceleration program for early-stage deep tech startups.

Dion Training Solutions

Dion Training Solutions

Dion Training Solutions offer comprehensive training in areas such as project management, cybersecurity, agile methodologies, and IT service management.

Fulcrum Technology Solutions

Fulcrum Technology Solutions

The Fulcrum team of technologists are recognized experts in the fields of IT Infrastructure Technology, Security, Service Management and Support.

Inveo Group

Inveo Group

Inveo group is the Italian leader for the management of privacy and data protection issues.