Security Market Segment LS
Thursday, 21 February 2019 13:04

Oh, what a feeling! Toyota Australia hit by cyber attack Featured

Oh, what a feeling! Toyota Australia hit by cyber attack Pixabay

Toyota Australia has suffered what it says is a cyber attack that is believed to have affected its website and mail systems.

Sections of the site are still down as can be seen from the screenshot below.

toyota webpage

The company said in a statement: "Toyota Australia can confirm it has been the victim of an attempted cyber attack.

"At this stage, we believe no private employee or customer data has been accessed.

"The threat is being managed by our IT department who is working closely with international cyber security experts to get systems up and running again.

"At this stage we have no further details about the origin of the attack.

"We apologise for any inconvenience caused and thank customers for their patience."

The company was made aware of the attack on Wednesday, according to radio station 3AW's Rumour File.

News of the Toyota attack comes on the same day that the Melbourne Heart Group was revealed as being the victim of a Windows ransomware attack.

A number of security professionals were quick to offer comment on the Toyota hack. Geoff Andrews, regional director, APAC for identity provider Ping Identity, said: "As we are commonly seeing in all industries, and reported in Mandatory Breach Notification reports from OAIC, credential abuse is one of the major vectors of cyber attack.

"At the same time, increasingly, we are also seeing API infrastructures as an attack vector, and one where exploits known to evade web application firewalls and API gateways themselves are becoming more prevalent.

"A robust security posture requires organisations of all types to have strong, continuous and adaptive authentication and authorisation as part of their strategy to keep their business data, and that of their staff, customers and partners, secure. Additional security measures should be considered for API-forward organisations."

CQR Consulting co-founder and chief technology officer Phil Kernick said the recent breaches indicated it was time for Australian business to get on the front foot with their cyber defences.

"For too long businesses have claimed that they accept the risk of cyber attack without really understanding what it means, and only start responding after their systems have been breached and their data stolen," he said.

"In 2019, this is no longer good enough. Businesses need to proactively assess and protect against increasing cyber threats. The Australian Cyber Security Centre has already provided excellent advice to Australian businesses. It’s time for Australian businesses to act."

Michael Warnock, Australia country manager of Aura Information Security, expressed surprise that businesses were still being caught by surprise.

"Given the potential for serious financial losses in the event of a cyber security breach, you might think that Australian businesses were fully on-board with doing whatever has to be done to mitigate harm. Unfortunately, that is not always the case," he said.

"While the majority of businesses have some sort of structure in place to keep the board and senior management apprised of security issues, our survey late last year found that one-fifth of Australian IT professionals report that senior managers don’t regard cyber security as a key concern.

"Buy-in from senior management is essential for any company-wide process. Complacency on cyber-security from management puts the whole organisation at risk and organisations really do need to develop processes for monitoring and managing their cyber health.

LogRhythm APAC sales director Simon Howe said the data held by Toyota was extremely valuable. "The automotive industry holds design and customer data which are extremely valuable while at the same time, the cyber threat landscape is always evolving and hackers are getting more sophisticated with their methods of attack," he said.

"We must remember that if we are using technologies such as artificial intelligence and machine learning for cyber security, so are the hackers. Organisations simply don’t have the means to block off every attack especially when hackers are targeting valuable information and the data stored and collected as they go digital.

"Instead, they should be looking at minimising the time to detect, respond and remediate a threat rather than just preventing a breach."

Sean Abbott, country manager of Australia and New Zealand for disaster-recovery firm Zerto, said: “The ransomware and cyber attacks on Toyota Australia and Melbourne Heart Group serve as a strong reminder of the importance of data protection and having an IT-resilient strategy in place.

"With cyber attacks getting bolder and more sophisticated and hitting organisations when they least expect it, businesses need to ensure that they’re able to withstand and rebound from incidents that can potentially cripple their organisation. The ability for Australian organisations to respond to service disruptions and downtime and how fast they get back up and running is key to ensuring that the business’ financial and reputation is not compromised.

"More importantly, Australian businesses need to be available to their customers 24/7 and ensure that customer confidence in the organisation continues to remain high following a disruption. When it comes to data loss, continuous data replication is critical and a system that can capture every change, every second and allow for fast recovery is crucial to an organisation.”


As part of our Lead Machine Methodology we will help you get more leads, more customers and more business. Let us help you develop your digital marketing campaign

Digital Marketing is ideal in these tough times and it can replace face to face marketing with person to person marketing via the phone conference calls and webinars

Significant opportunity pipelines can be developed and continually topped up with the help of Digital Marketing so that deals can be made and deals can be closed

- Newsletter adverts in dynamic GIF slideshow formats

- News site adverts from small to large sizes also as dynamic GIF slideshow formats

- Guest Editorial - get your message out there and put your CEO in the spotlight

- Promotional News and Content - displayed on the homepage and all pages

- Leverage our proven event promotion methodology - The Lead Machine gets you leads

Contact Andrew our digital campaign designer on 0412 390 000 or via email



Security requirements such as confidentiality, integrity and authentication have become mandatory in most industries.

Data encryption methods previously used only by military and intelligence services have become common practice in all data transfer networks across all platforms, in all industries where information is sensitive and vital (financial and government institutions, critical infrastructure, data centres, and service providers).

Get the full details on Layer-1 encryption solutions straight from PacketLight’s optical networks experts.

This white paper titled, “When 1% of the Light Equals 100% of the Information” is a must read for anyone within the fiber optics, cybersecurity or related industry sectors.

To access click Download here.


Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.



Recent Comments