Modern Australian
Men's Weekly

.

Australia is under sustained cyber attack, warns the government. What's going on, and what should businesses do?

  • Written by Mahmoud Elkhodr, Lecturer in Information and Communication Technologies, CQUniversity Australia

Prime Minister Scott Morrison had some alarming news for Australians this morning: we are under cyber attack. He informed the nation the attacks “hadn’t just started”, and that Australian businesses and governments are being widely targeted.

It is unclear why the government chose today to make the announcement, or indeed what exactly is going on.

The attack is described as “state-sponsored”, which means a foreign government is believed to be behind it. When asked who that might be, Morrison said there is a high threshold for drawing that kind of conclusion, but added:

…there are not a large number of state-based actors that can engage in this type of activity.

This has been interpreted as a coded reference to China, which the Australian government reportedly suspects of being behind the attacks.

Read more: Why international law is failing to keep pace with technology in preventing cyber attacks

What do we know about the attack so far?

An advisory note posted on the government’s Australian Cyber Security Centre website describes the attack as a “cyber campaign targeting Australian networks”.

The advisory says the attackers are primarily using “remote code execution vulnerability” to target Australian networks and systems. Remote code execution is a common type of cyber attack in which an attacker attempts to insert their own software codes into a vulnerable system such as a server or database.

The attackers would not only try to steal information but also attempt to run malicious codes that could damage or disable the systems under attack.

Detecting this is hard, and would require advanced defensive measures such as penetration testing, in which trained security professionals known as “ethical hackers” try to hack into a system in an attempt to find potential vulnerabilities.

What systems have been affected?

The advisory linked the attack to three specific vulnerabilities in particular systems, detailed in the table below. Any business that uses any of these systems is vulnerable to attack. It is too early to tell whether other systems are also vulnerable; other vulnerabilities may emerge as investigations continue.

Affected system

Description

Action required

Microsoft Internet Information Services (IIS)

This is a general-purpose webserver from Microsoft that runs on Windows systems. The most common use of an IIS is to host web-based applications and simple static websites.

For all three systems:

  • Ensure you are running the    latest version of the software
  • Install the latest patches and updates
  • Change all passwords, log off from all devices
  • Set up multifactor authentication, more details can be found here
  • Scan and remove any malicious codes which you don’t recognise

    

 

 

SharePoint

A SharePoint Server is used by organisations to manage Office 365 Enterprise accounts within their own organisation.

Citrix

The affected Citrix products are mainly Citrix gateways and servers. These are used to support web, cloud and mobile application services.  

How can businesses protect themselves?

Even though the specific threats are not fully known to the public, there is a range of measures businesses can take in the meantime. These include:

Use available government resources

The federal government has provided extensive cyber safety guidelines for Australian businesses, featuring advice on cyber security and data protection, and information on the various types of cyber threat.

More comprehensive cyber security guidelines can be found at the ACSC website, including detailed advice on secure management of databases, email systems and physical computer assets, among others.

Watch out for spam

Phishing is not just limited to email. These scams can be executed via text messages, social media such as Facebook, and VOIP messaging services such as WhatsApp.

As a general guide:

  • do not open messages or attachments from unknown senders

  • remember that genuine organisations such as banks, government departments and online retailers never ask for personal information via email, and you should always check with them directly (such as by calling them) if in doubt.

Read more: Everyone falls for fake emails: lessons from cybersecurity summer school

Beware DDoS attacks

A “distributed denial of service” (DDoS) attack is the most common type of cyber attack. It works by flooding your website with traffic, preventing genuine customers from reaching your website. Think of it like a traffic jam clogging up a highway and preventing cars from reaching their destinations.

Luckily, there are ways to reduce the impact of DDoS attacks, such as by using intrusion detection and prevention systems. If you are concerned about DoS attacks speak with your internet provider about developing a DDoS response plan.

Have a backup plan

A “continuity plan” ensures important assets such as personnel records, customer databases and network configurations are protected and can be restored quickly in the event of a cyberattack.

Suggested plans are available via the federal and Queensland governments.

Businesses should also follow sensible IT security procedures, which include the following:

Australia is under sustained cyber attack, warns the government. What's going on, and what should businesses do? What businesses should be doing to minimise their cyber security risks. Mahmoud Elkhodr, Author provided

Regardless of the details, the latest announcement is a reminder that we should not lower our guard against cyber attacks. The latest round of cyber attacks are likely the result of previous “reconnaissance attacks”, which revealed existing vulnerabilities in Australian networks.

Taking the steps outlined above could help prevent hackers mounting similar attacks in the future.

Authors: Mahmoud Elkhodr, Lecturer in Information and Communication Technologies, CQUniversity Australia

Read more https://theconversation.com/australia-is-under-sustained-cyber-attack-warns-the-government-whats-going-on-and-what-should-businesses-do-141119

Fertility Treatment in Australia | Expert Reproductive Care

One of the most significant journeys in life is the formation or the development of a family. To most couples and individuals, conception, however, ...

Professional Bathroom Builders Sydney: What Defines Professional Standards

Professional bathroom builders in Sydney operate within a regulated construction environment that prioritises safety, compliance, and structural durab...

Retail Cleaning Creating Welcoming and Professional Store Environments

First impressions matter in retail, and cleanliness plays a powerful role in shaping how customers perceive a store. Retail cleaning focuses on mai...

Why Year 12 Tutoring Plays A Crucial Role In Academic Success

The final year of school is one of the most demanding periods in a student’s academic journey, which is why year 12 tutoring has become an essent...

Legal Remedies Available in a Breach of Contract Case

When a contract is broken, the consequences can affect cash flow, reputation and ongoing business relationships. A breach of contract may occur when...

Long Weekend Camping in the Yarra Ranges: Three Weekends of High Country Adventure

Yarra Ranges National Park, Victoria. Image by Mattinbgn (talk · contribs), CC BY 3.0, via Wikimedia CommonsVictoria’s Yarra Ranges offer keen trav...

Why Waste Management Solutions Are Essential For Modern Businesses

Managing waste responsibly has become a critical priority for organisations of all sizes, which is why waste management solutions play such an impo...

The Importance and Varieties of Ride-On Mower Tyres

Ride-on mowers are built to manage larger lawns with consistency and control. The quality and design of ride on mower tyres play a critical role in ...

Gain Peace Of Mind: The Undeniable Benefits Of A Ready First Aid Kit

Life in our vibrant communities, whether it's the bustling city or the quiet country town, is full of unexpected moments. From a scraped knee on the...

The Most Common Conveyor System Issues in Manufacturing

In modern manufacturing, conveyor systems play a central role in keeping production lines efficient, consistent, and cost-effective. When they operate...

How to Secure a Long-Term Rental in a Competitive Market

The rental market can be unpredictable and may present challenges if you’re not prepared. Initially, you might submit numerous applications and stil...

What Smart Investors Know About Real Estate

Many people think investing in property is just about buying a house and waiting for it to get expensive. While that can happen, the people who actual...

The Benefits of Seeking Help for Anxiety and Stress

Anxiety and stress have become common experiences in today’s fast-paced world, affecting people across all ages and lifestyles. From work pressures ...

How to Make the Most of Fashion Wholesale Options for Your Brand

If you want to grow a fashion brand without constantly reinventing the wheel, wholesale can be one of the smartest ways to scale. The key is knowing h...

How to Add Value to Your Home Before Selling

Selling a home is not just about putting up a sign and waiting for offers. It is about presenting a property that buyers instantly connect with and ar...

How Outdoor Play Enhances Learning and Wellbeing

You don’t need to be an expert to conclude that play is an essential part of growing up. When children aren’t restricted and kept indoors, they de...

How to Build Passive Income Through Real Estate

Building passive income is one of the most effective ways to create long-term financial security. While there are many investment opportunities availa...

DIY Guide to Replacing Small Parts in Your Laundry Machine

Finding a puddle or a broken washer is frustrating, but you don’t always need a professional. Many common issues are caused by tiny parts that are c...