Estimated reading time: 1 minute, 36 seconds

Australian Cyber Attack Not So 'Sophisticated,' Pros Say

The Australian government’s claim that the country’s institutions are targets of an advanced, state-sponsored cyber attack is a call to basic cybersecurity preparedness, industry experts say.

australia 28586 640smallAs The Financial Times reports, Australia’s prime minister, Scott Morrison, recently warned that a “sophisticated state-based cyber actor” was “targeting Australian organizations across a range of sectors, including all levels of government, industry, political organisations, education, health, essential service providers and operators of other critical infrastructure.”

While the prime minister did not specify which state was allegedly behind the hacking, the Australian Broadcasting Corporation (ABC) reports, citing senior sources, that China is thought to be the culprit. Beijing has denied such claims, calling them “baseless.”

Rachael Falk, CEO of the nonprofit Cyber Security Cooperative Research Centre, tells the ABC that assigning responsibility at this point is a “distraction.” Falk said that the prime minister’s point was more that Australians should take necessary steps to secure their data, such as ensuring their passwords are secure and wasting no time installing security updates for their mobile phones.

Ralph Holz, a cybersecurity lecturer at the University of Sydney and the Netherlands’ University of Twente, tells Gizmodo Australia that the attack was probably just “routine” espionage. “The government has issued a warning that Australia needs to get better security and I think they are right on that one,” Holz is quoted as saying. “If this leads to more [secure systems] on the Australian side, then that’s a plus and I think the government would have achieved what they wanted.”

The Australian Cybersecurity Center has said that hackers used what it called “copy-paste compromises,” or code copied heavily from open-source materials, as well as phishing techniques.

University of New South Wales cybersecurity professor Richard Buckland tells The Guardian the attack “doesn’t look very sophisticated.” He called the hackers “well-resourced” but added, “They’re using known techniques against known vulnerabilities and following known processes.”

Read 3462 times
Rate this item
(0 votes)

Visit other PMG Sites:

PMG360 is committed to protecting the privacy of the personal data we collect from our subscribers/agents/customers/exhibitors and sponsors. On May 25th, the European's GDPR policy will be enforced. Nothing is changing about your current settings or how your information is processed, however, we have made a few changes. We have updated our Privacy Policy and Cookie Policy to make it easier for you to understand what information we collect, how and why we collect it.