Security Market Segment LS
Friday, 08 February 2019 11:17

Hackers gain entry to Federal Parliament network Featured

Hackers gain entry to Federal Parliament network Pixabay

The computer network at the Federal Parliament has been infiltrated and security agencies are now trying to find out if any data was stolen in the attack and who was responsible.

The Sydney Morning Herald and The Australian both reported the breach, with the former saying that the director-general of the Australian Signals Directorate, Mike Burgess, and the head of the Australian Cyber Security Centre, Alastair MacGibbon, were both on the scene.

The passwords of all users of the network were changed as a precaution.

In 2011, the network was breached by attackers who were said to be from China and its defences were upgraded thereafter.

The speaker of the House of Representatives, Tony Smith, and the Senate president, Scott Ryan, issued a joint statement, saying that the perpetrator(s) were as yet unknown.

“The Department of Parliamentary Services and relevant agencies are working jointly to take the necessary steps to investigate the incident, while our immediate focus has been on security of the network and protecting data and users,”they said.

“There is no evidence that any data has been accessed or taken at this time. However this will remain subject to ongoing investigation.

“Similarly, we have no evidence that this is an attempt to influence the outcome of parliamentary processes or to disrupt or influence electoral or political processes.

“The Department of Parliamentary Services and relevant agencies are working jointly to take the necessary steps to investigate the incident, while our immediate focus has been on securing the network and protecting data and users.

“While there is no guaranteed approach to cyber security, best practice is the ability to detect and remediate threats quickly. The department has done this working jointly with expert agencies.”

An ASD spokesperson said in a statement: "We can confirm the Australian Signals Directorate is working with the Department of Parliamentary Services on this matter to ensure the network and its users are protected. The Department of Parliamentary Services responded immediately to the detection.

"ASD and its Australian Cyber Security Centre will continue to work with DPS to understand the full extent of this network compromise.

"Meanwhile, the necessary steps are being taken to mitigate the compromise and prevent any harm.

"At this early stage, our immediate focus is on securing the network and protecting its users. Proper and accurate attribution of a cyber incident takes time."

Daniel Lai, the head of ASX-listed Canberra-based cyber security firm archTIS, told iTWire: "Clearly the international rule of law has broken down. If this morning's reports are true, Australia's democracy is under attack in an unspoken cyber war with foreign entities.

"This proves once again that old antiquated security models no longer have the capacity to protect our existing systems that we rely on to safeguard our national sovereignty and values. We need to take urgent action to protect our government institutions, our economic interests and our national security.

"What is most bizarre about this incident is the fact that we have a cyber security industry in Canberra that is unparalleled in the world and yet our government is still looking to overseas multinationals for the answers.

"If they had them we would not be so compromised. The government is still trapped in cultural constraints that are not letting them engage effectively with industry to adopt innovative security solutions that would give them a competitive advantage against these adversaries. We need to do something differently. After all, the definition of madness is doing the same thing over again and expecting a different result."

Mark Sinclair, ANZ country manager of security outfit WatchGuard Technologies, was of the opinion that a sophisticated attack requiring a mature skillset was highly likely to be executed by a foreign state-based actor or a very well-funded organisation.

"The fact that it is targeting MPs is a strong indication that it is a foreign nation. Any MP can be the target of such an attack since the attacker may be able use it as a springboard to launch subsequent attacks on other MPs on the network," he said.

"If this attack was the result of weak or stolen credentials then the use of multi-factor authentication will play a big part in preventing further attacks.”

Geoff Andrews, APAC regional director of Ping Identity, said: "Although Ping Identity has no specific insights into this incident, we are aware of several highly active state-sponsored cyber actors who have successfully compromised other government entities worldwide.

"Government ministers and MPs are high-value targets for hackers. Highly sensitive information assets should, at a minimum, be protected by multi-factor authentication, including something you are (biometric), something you know, for example a password, and something you have such as a one-time code or token.

“Sophisticated protections will overlay intelligent, dynamic step-ups in authentication based on other factors such as location, time, changing IP addresses, or other behavioural characteristics."

Michael Warnock, Australia country manage of Aura Information Security, said the breach against confirmed that distance did not provide any defence for the Australian public and private sectors.

"Both individuals and their employers need to have proactive cyber defence measures in place day in day out and also ensure that they have a strong focus on educating their employees," he said.

"As with the community in general, the Australian public sector is in the sight of cyber criminals and we should all continue to take note of the ASD Essential 8 strategies to mitigate cyber security incidents.”


26-27 February 2020 | Hilton Brisbane

Connecting the region’s leading data analytics professionals to drive and inspire your future strategy

Leading the data analytics division has never been easy, but now the challenge is on to remain ahead of the competition and reap the massive rewards as a strategic executive.

Do you want to leverage data governance as an enabler?Are you working at driving AI/ML implementation?

Want to stay abreast of data privacy and AI ethics requirements? Are you working hard to push predictive analytics to the limits?

With so much to keep on top of in such a rapidly changing technology space, collaboration is key to success. You don't need to struggle alone, network and share your struggles as well as your tips for success at CDAO Brisbane.

Discover how your peers have tackled the very same issues you face daily. Network with over 140 of your peers and hear from the leading professionals in your industry. Leverage this community of data and analytics enthusiasts to advance your strategy to the next level.

Download the Agenda to find out more


Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.



Recent Comments