DDoS disrupts NZX trading for three days
Ongoing DDoS attacks on the New Zealand stock exchange disrupted trading for three consecutive days this week.
NZX decided not to reopen the NZX Main Board, NZX Debt Market or Fonterra Shareholders’ Market on Thursday after DDoS attacks temporarily disrupted trading late on Tuesday and for most of the working day on Wednesday.
“This decision not to reopen has been made while we focus on addressing the situation. We continue to address the threat and work with cybersecurity experts, and we are doing everything we can to resume normal trading,” NZX said in a statement.
The DDoS attack appears to be originating from an overseas entity, so NZX will need the cooperation of overseas ISPs to block the malicious traffic.
The stock exchange has a policy of ceasing trading if the website goes down, because otherwise retail investors would not be able to see market announcements made.
Tenable Staff Research Engineer Satnam Narang said the effectiveness of the attack is cause for alarm.
“It’s certainly concerning that a DDoS attack was successful at halting trading on the New Zealand stock exchange for multiple days, whether or not financial information was accessed,” he said.
“Similar DDoS attacks have been attempted on other stock exchanges in the past. However, that was quite a long time ago and DDoS attacks have gotten more sophisticated. As financial organisations become more reliant on the Internet of Things (IoT), cybercriminals can leverage unpatched devices to launch stronger, more sophisticated DDoS attacks.”
Reducing the renewed threat of DDoS attacks will require financial organisations to address the new devices and vulnerabilities being added to their networks in the face of the IoT transformation, Narang said.
A Trend Micro survey has highlighted the risks posed by smart home devices to the corporate...
Research from NordVPN found that 43% of Australians looking to break into something were...
The Australian Cyber Security Centre's inaugural Annual Threat Report for 2020 found that...