Only Four Suspects In Australia's High Level Attack

Suspicion is falling on Chinese spies for targeting the computer systems of Australia's three major political parties, with intelligence officials acknowledging the skilled cyber hackers were the most sophisticated to confront Australia in years. 

Australia’s Prime Minister Scott Morrison has revealed Australia's political parties suffered cyber-attacks alongside the Parliament House computer network several weeks ago by a "sophisticated state actor".

The announcement is likely to intensify speculation that China was behind the attacks, which come just three months before the federal election, though Mr Morrison said there was no evidence of election interference.

Sources are describing the level of sophistication as "unprecedented" but are unable to say yet which foreign government is behind the attack.

The attacks are understood to carry the digital fingerprints of China, though authorities are concerned that another state could be replicating the hallmarks of Chinese intelligence to deflect blame towards them.

Mr Morrison told Parliament on Monday 18th February that while investigating the parliamentary hack, cybersecurity authorities "also became aware that the networks of some political parties, Liberal, Labor and Nationals, have also been affected". Security agencies "acted decisively to confront it", Mr Morrison said.

"Our cyber experts believe that a sophisticated state actor is responsible for this malicious activity."

Only four nations are thought to be capable of such a high-level attack: China, Russia, Israel and the United States. The theft of any party or political material has echoes of the 2016 election interference campaign against the United States by Russia when the Democratic National Committee was hacked by Russia, and damaging information was released during the presidential campaign.

Mr Morrison said the government had "put in place a number of measures to ensure the integrity of our electoral system".
"I have instructed the Australian Cyber Security Centre to be ready to provide any political party or electoral body in Australia with immediate support, including making their technical experts available," he said.

"They have already briefed the electoral commissions and those responsible for cyber security for all states and territories. They have also worked with global anti-virus companies to ensure Australia's friends and allies have the capacity to detect this malicious activity. We have acted decisively to protect our national interests."

The attack occurred just a few months before an election in May, raising fears that any theft of MPs’ and staffers’ private correspondence could be used for the purposes of election interference.

The Department of Parliamentary Services, which runs the parliamentary computer network used by MPs and their staff, has significantly upgraded its cyber security since the system was breached in 2011, reportedly by Chinese intelligence agencies. In that breach, Chinese agents are understood to have potentially been reading MPs’ emails for months.

House Speaker Tony Smith and Senate President Scott Ryan issued a joint statement immediately after the cyber-attack on Parliament earlier this month, saying there was no evidence any data had been accessed or taken.

SMH.com       AFR.com

You Might Also Read: 

Cyber Attacks On Australia Reveal A Pattern:

« Your Employees Are The Major Risk To Cyber Security
Top Six Cyber Secure Countries »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Parasoft

Parasoft

Parasoft is an independent software testing and software quality assurance tool and solution vendor.

ID-SIRTII/CC

ID-SIRTII/CC

Security Incident Response Team for Internet Infrastructure in Indonesia.

Infiltrate

Infiltrate

INFILTRATE is a deep technical conference that focuses entirely on offensive security issues.

Snow Software

Snow Software

Snow Software is changing the way organizations think about their technology investments, empowering IT and business leaders to drive transformation with precision and agility.

Secmentis

Secmentis

Secmentis is a cyber security consultancy specializing in penetration testing, threat intelligence, and proactive defense for your IT infrastructure.

Exatel

Exatel

Exatel is Poland’s leading provider of ICT security services.

Secure Soft

Secure Soft

Secure Soft are experts in Computer and Information Security with a presence in Peru, Colombia and Ecuador.

RangeForce

RangeForce

RangeForce delivers the only integrated cybersecurity simulation and skills analysis platform that combines a virtual cyber range with hand-on training.

Beazley

Beazley

Beazley are a specialist insurer with three decades of experience in providing clients with the highest standards of underwriting and claims service worldwide.

Utility Cyber Security Forum

Utility Cyber Security Forum

The Utility Cyber Security Forum offers a focused venue in which utility executives can network one-on-one with colleagues facing issues in protecting against cyber attacks.

Cobalt Iron

Cobalt Iron

Cobalt Iron is a global leader in SaaS-based enterprise backup and data protection technology.

Thrive

Thrive

Thrive delivers the experience, resources, and expertise needed to create a comprehensive cyber security plan that covers your vital data, SaaS applications, end users, and critical infrastructure.

KrCERT/CC

KrCERT/CC

KrCERT/CC is the National Computer Emergency Response Team in Korea.

Cymune

Cymune

At Cymune we help businesses to fight against cybercrime, protect patented data and diminish security risks.

NORMA Cyber

NORMA Cyber

NORMA Cyber delivers centralised cyber security services to Norwegian shipowners and other entities within the Norwegian maritime sector.

Future Crime Research Foundation (FCRF)

Future Crime Research Foundation (FCRF)

FCRF is a Non-Profit NGO specializing in Research in Cyber Security, Digital Crime, Fraud Risk Management, Cyber Laws and Cyber Forensics.