Canberra blames Russia for cyber incidents


By Jonathan Nally
Tuesday, 17 April, 2018


Canberra blames Russia for cyber incidents

The federal government has declared that Russian state-sponsored actors were responsible for malicious cyber activity targeting commercially available routers around the world in October 2017.

The government has based its position on advice from domestic intelligence agencies, and those of Australia’s allies.

According to Minister for Law Enforcement and Cyber Security Angus Taylor, while “a significant number of Australian organisations have been affected by this activity, there is no indication Australian information has been successfully compromised”.

Taylor added that these incidents are unacceptable and has called on all countries, including Russia, not to take actions that could lead to damage of critical infrastructure that provide services to the public.

“Commercially available routers were used as a point of entry, demonstrating that every connected device is vulnerable to malicious activity,” Taylor said.

“This attempt by Russia is a sharp reminder that Australian businesses and individuals are constantly targeted by malicious state and non-state actors, and we must maintain rigorous cybersecurity practices.”

The minister is currently in the United States meeting with US counterparts, including Secretary of Homeland Security Kirstjen Nielsen, as well as officials from the Department of Justice and the FBI to discuss cybersecurity, law enforcement priorities and responses to cyber risk.

“A strong alliance between Australia and the United States is crucial if we are to prevent and develop strong defences to state-sponsored cyber incidents,” Taylor said.

“The Turnbull government, through its 2016 Cyber Security Strategy and the establishment of the Home Affairs portfolio, is committed to ensuring the Australian public sector, businesses and the community are safe from malicious cyber activity.”

The 2017 International Cyber Engagement Strategy commits Australia to deter and, importantly, to actively respond to malevolent behaviour in cyberspace.

Image credit: ©iStockphoto.com/Brian Jackson

Please follow us and share on Twitter and Facebook. You can also subscribe for FREE to our weekly newsletter and quarterly magazine.

Related Articles

The MediSecure breach thrusts the security spotlight back on service providers

Organisations have been confronting security risks in their supply chains for years, but a new...

Managing third-party cybersecurity risks in the supply chain

Third-party cybersecurity breaches occur when the victim's defences are compromised through a...

Countering MFA fatigue demands a rethink on user authentication

While MFA remains effective, highly motivated threat actors are using tactics that seek to...


  • All content Copyright © 2024 Westwick-Farrow Pty Ltd