Home Security ASD says 'sophisticated, state actor' behind Parliament attack
ASD says 'sophisticated, state actor' behind Parliament attack Pixabay Featured

The Australian Signals Directorate has ascertained that hackers who breached the networks of the Australian Parliament and those of three main political parties — Liberal, Labor and National — are nation-state actors, but the agency's director-general, Mike Burgess, has said he cannot name the country involved in a public forum.

Burgess told the Senate Foreign Affairs, Defence and Trade Legislation Committee on 5 April that the attackers had exfiltrated a small amount of data.

Asked whether the ASD had identified whether it was a state actor, Burgess said: "The level of sophistication here leads us to believe it has to be a state actor. That's our assessment. Of course, that could still be just a very, very clever individual, but we think that's highly unlikely."

He said the question of calling out any country for the attack was a matter for the government, once the ASD had presented its assessment.

In response to a question as to whether any confidential correspondence or information had been compromised, Burgess said: "There was a small amount of data taken; none of that was deemed sensitive, but the assessment of that is a matter for the parliament themselves."

The intrusion was made public on 8 February. On 24 March, the ASD told iTWire in response to queries that the investigation was still ongoing.

Burgess told the parliamentary panel that the damage assessment from the intrusion had been completed and the intruder or intruders had been fully evicted.

Questioned about whether any country would be called out for being behind the attack, Burgess replied: "Attribution is a really difficult thing, so tying it down to a particular country, a particular organisation, and perhaps particular individuals, is a piece of work that takes considerable time. Even if we got to that point, whether that got called out or not is a matter for other organisations — the government — not for the Australian Signals Directorate.

"I would say, though, that if you do get to the point of knowing who it is, sometimes you have an option of calling it out, and the Australian Government has taken action previously to call out state actors for known problems – that's an intent to call out inappropriate behaviour.

"Sometimes, however, there might be other reasons why you don't call it out, but I'll end with attribution: to get to the point where you could prove it in a court of law is terribly difficult."

There were competing claims at the time of the breach, with some organisations, like the ABC, blaming China, while Resecurity, a security outfit in the US, blamed Iran.

Resecurity said an Iranian-linked entity had been responsible for the network attack, adding that it had informed the ASD about its findings and claiming the agency had confirmed this attribution.

But the credentials of Resecurity came under question shortly thereafter, with journalists and technical researchers both citing what they saw as irregularities about its approach. The firm had also blamed Iran for a network attack on multinational software company, Citrix Systems.

FREE SEMINAR

Site24x7 Seminars

Deliver Better User Experience in Today's Era of Digital Transformation

Some IT problems are better solved from the cloud

Join us as we discuss how DevOps in combination with AIOps can assure a seamless user experience, and assist you in monitoring all your individual IT components—including your websites, services, network infrastructure, and private or public clouds—from a single, cloud-based dashboard.

Sydney 7th May 2019

Melbourne 09 May 2019

Don’t miss out! Register Today!

REGISTER HERE!

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the sitecame into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

 

Popular News

 

Telecommunications

 

Guest Opinion

 

Sponsored News

 

 

 

 

Connect