Australian Government Discloses Breach of Defense Supplier’s Computer
According to the Australian government, hackers infiltrated certain defense contractor's PC in 2016. Before launching the yearly threat report of the Australian Cyber Security Center scheduled for October 10, Dan Tehan Assistant Minister for Cyber Security couldn't confirm the individual's name behind the hack.
Managing to reach the Information Technology network, the intruders remained there for long as they stole vast volumes of data belonging to the defense supplier. When in November 2016, the Australian Cyber Security Center of the federal government became aware of the incident it assisted in halting the attack.
Tehan explained that the hacker could be a state-sponsored online thief or a normal cyber-criminal, either way the individual's behavior prompted serious action. The minister said nothing could be fully confirmed, a usual hazard in this field of cyber-crime. He couldn't also state the length of time the intruders stayed on the computer. However, according to him, the IT infrastructure of the contractor was currently safe. Abc.net.au posted this, October 10, 2017.
The idea that some overseas government was responsible for the hack can't be ruled out, said Tehan and his group of specialists. The ACSC has located 47,000 cyber assaults during April 2016-March 2017, which was an increase by 15%, while over 50% of these happened to be online frauds or scams.
A total of 7,283 cyber attacks hit major businesses in Australia. Consequently, the Australian Signals Directorate Intelligence took action against 671 though. The cyber-criminals made away with $20m-or-more from Australian businesses over the past twelve months.
Tehan says unlike before cyber attacks come from advanced, well-organized networks of cyber-criminals who may even franchise their jobs to subsidiary businesses. The ACSC is witness to entities operating cyber threat against hardware and software while trading their kits along with applications (simple to use) with other entities else partners who mayn't be technically skilled for programming fresh software.
When dangerous cyber activity is enforced, strategically Australia can deal with it via soft power such as economic, diplomatic or law enforcement alternatively via hard power such as military action. These involve cyber capabilities for degradation, denial or disruption of adversaries' PC-networks.
» SPAMfighter News - 10/13/2017
We are happy to see you are reading our IT Security News.
We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!