A quarter of cyber incidents reported to Australian security officials over the past year have targeted critical infrastructure and essential services, including health care, food distribution and energy.
The Australian Cyber Security Centre (ACSC) disclosed the incidents in a report published yesterday, warning of “significant targeting, both domestically and globally, of essential services.”
These incidents have “underscored the vulnerability of critical infrastructure to significant disruption in essential services, lost revenue and the potential of harm or loss of life.”
Photo: Bloomberg
The report will also show ransomware attacks disclosed to the ACSC increased 15 percent in the 2020-21 financial year, when compared with the previous financial year.
The ACSC — which is part of the Australian Signals Directorate — received more than 67,500 reports of cybercrime of all types in 2020-21, or one every eight minutes.
That compared with one every 10 minutes the previous year.
Photo: AP
HUGE LOSSES
The report says businesses, individuals and other entities had incurred more than US$33 billion in total losses from cyber crime throughout the year.
Cybercriminals sought to exploit the pandemic by encouraging recipients to enter personal credentials to access COVID-related information or services, while unnamed foreign governments targeted the health sector seeking “access to intellectual property or sensitive information about Australia’s response to COVID.”
Photo: AFP
The ACSC responded to about 1,630 cybersecurity incidents in 2020-21, or an average of 31 cybersecurity incidents a week.
“Approximately one quarter of reported cybersecurity incidents affected critical infrastructure organizations, including essential services such as education, health, communications, electricity, water and transport,” the report says.
A breakdown of the severity of cyber incidents in 2020-21 shows there were 14 cases in which federal government entities or nationally significant infrastructure suffered the removal or damage of sensitive data or intellectual property.
This category also includes the supply chain to critical national infrastructure. Those entities also suffered a further 44 incidents in which there was an active network intrusion or temporary disruption to systems or services.
The report does not name most of the affected entities, although it includes several case studies, including a March 2021 ransomware attack against a Victorian public health service. That attack “affected four hospitals and aged care facilities, and resulted in the postponement of elective surgeries.”
The assistant defense minister, Andrew Hastie, who released the report, said malicious cyber criminals were “escalating their attacks on Australians”.
Hastie said the health sector reported the second highest number of ransomware incidents, “right at a time when Australians are most reliant on our health workers to help us respond and recover through the pandemic.”
He pointed to a government bill — which remains before the parliament, and has attracted concerns from industry about regulatory impact — that would impose mandatory cyber incident reporting requirements on organizations that run critical infrastructure assets.
Hastie said the legislation would “ensure that in the event of a large-scale cyber attack on our critical infrastructure, our cyber and law enforcement agencies are empowered to provide greater and more immediate support to the victims.”
In ransomware attacks, criminals typically lock up the data of a target organization and then demand payment to decrypt and unlock systems, sometimes threatening to leak stolen data if the request is rebuffed.
The ACSC report mentions the ransomware attack on the global meat and food processing company JBS Foods in May 2021, which led to the suspension of operations and standing down of workers in Australia.
The US division later confirmed that it had paid a ransom equivalent to US$11 million — reportedly in bitcoin.
With nearly 500 ransomware cybercrime reports in the 2020-21 financial year, the ACSC says the problem has “grown in profile and impact, and poses one of the most significant threats to Australian organizations.”
“This increase has been associated with an increasing willingness of criminals to extort money from particularly vulnerable and critical elements of society.”
The report says ransom demands by cybercriminals ranged from thousands to millions of dollars, and attackers have improved their capabilities by accessing tools and services on the dark web.
The report says “new and serious concerns” have joined the list of existing cyber threats, such as “the protection of Australia’s COVID-19 vaccine supply, including distribution processes, from malicious cyber actors.”
STATE-BASED ACTORS
State-based actors are believed to have an interest in learning more about Australia’s pandemic response and the views of those providing advice to government.
“State and criminal cyber actors alike possess the capability to disrupt Australia’s critical infrastructure — including vaccine supply and distribution chains — with the pandemic only amplifying the opportunities for these actors to cause Australia harm,” the report says.
“Even in the absence of direct and intentional targeting, there remains the potential for malicious cyber actors to inadvertently disrupt vaccine supply and distribution chains, making the threat more difficult to address.”
The report mentions China once — when summarizing the Australian government’s decision in July to join with the US and other international partners in accusing China’s Ministry of State Security of exploiting vulnerabilities in the Microsoft Exchange software.
That exploit is estimated to have affected thousands of computers and networks worldwide, including in Australia — but the Chinese government said they were “groundless accusations.”
Wednesday’s report also warns that business email compromise — which includes when companies are targeted with fake invoices that appear to be for genuine services — “continues to present a major threat to Australian businesses and government enterprises, especially as more Australians work remotely.”
The average loss in such incidents was more than US$50,600, which the report says is “over one-and-a-half times higher than the previous financial year.” It says cybercriminal groups have become more sophisticated and organized.
That US assistance was a model for Taiwan’s spectacular development success was early recognized by policymakers and analysts. In a report to the US Congress for the fiscal year 1962, former President John F. Kennedy noted Taiwan’s “rapid economic growth,” was “producing a substantial net gain in living.” Kennedy had a stake in Taiwan’s achievements and the US’ official development assistance (ODA) in general: In September 1961, his entreaty to make the 1960s a “decade of development,” and an accompanying proposal for dedicated legislation to this end, had been formalized by congressional passage of the Foreign Assistance Act. Two
President William Lai’s (賴清德) March 13 national security speech marked a turning point. He signaled that the government was finally getting serious about a whole-of-society approach to defending the nation. The presidential office summarized his speech succinctly: “President Lai introduced 17 major strategies to respond to five major national security and united front threats Taiwan now faces: China’s threat to national sovereignty, its threats from infiltration and espionage activities targeting Taiwan’s military, its threats aimed at obscuring the national identity of the people of Taiwan, its threats from united front infiltration into Taiwanese society through cross-strait exchanges, and its threats from
Despite the intense sunshine, we were hardly breaking a sweat as we cruised along the flat, dedicated bike lane, well protected from the heat by a canopy of trees. The electric assist on the bikes likely made a difference, too. Far removed from the bustle and noise of the Taichung traffic, we admired the serene rural scenery, making our way over rivers, alongside rice paddies and through pear orchards. Our route for the day covered two bike paths that connect in Fengyuan District (豐原) and are best done together. The Hou-Feng Bike Path (后豐鐵馬道) runs southward from Houli District (后里) while the
March 31 to April 6 On May 13, 1950, National Taiwan University Hospital otolaryngologist Su You-peng (蘇友鵬) was summoned to the director’s office. He thought someone had complained about him practicing the violin at night, but when he entered the room, he knew something was terribly wrong. He saw several burly men who appeared to be government secret agents, and three other resident doctors: internist Hsu Chiang (許強), dermatologist Hu Pao-chen (胡寶珍) and ophthalmologist Hu Hsin-lin (胡鑫麟). They were handcuffed, herded onto two jeeps and taken to the Secrecy Bureau (保密局) for questioning. Su was still in his doctor’s robes at