Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Risk Management

Australia’s Spy Agency Warns of G20 Cyberattacks

SYDNEY – An Australian intelligence agency is warning that cyber-criminals will target the upcoming G20 summit in Brisbane, saying they could include state-sanctioned hackers, trade spies or activists.

SYDNEY – An Australian intelligence agency is warning that cyber-criminals will target the upcoming G20 summit in Brisbane, saying they could include state-sanctioned hackers, trade spies or activists.

As world leaders prepare to visit the Queensland state capital for the high-powered November 15-16 meeting, the Australian Signals Directorate (ASD) has reportedly been briefing industry about the threat.

“Targeting of high-profile events such as the G20 by state-sponsored or other foreign adversaries, cyber-criminals and issue-motivated groups is a real and persistent threat,” the directorate said in its G20 cyber-security advice.

G20 Cyber AttacksIt said malicious emails appearing to relate to summits held in 2012 and 2013 had been sent to Australian government agencies in a bid to compromise computer networks and seek information.

A spokesman for CREST Australia, which provides cyber and information security to individuals and businesses, said Friday that hackers could have a wide range of motivations.

“They would love to just, you know, get into the traffic light system for example and just disrupt that. And what they’re after really is free international media,” Greg Rudd told the Australian Broadcasting Corporation.

Rudd said hackers also tried to disguise their attacks, making it harder to know from where they originated.

“Because China is an obvious suspect and Russia is an obvious suspect, a lot of the hackers all over the world have gone out of their way and developed it into a bit of an art form to lay the blame at China and Russia’s feet for all sorts of hacks,” he said.

The ASD, which provides foreign signals intelligence to the Australian government and military, warned that the most commonly used technique to gain access to networks was via socially engineered emails.

Advertisement. Scroll to continue reading.

These emails, which often appear work-related or from a friend or acquaintance, attempt to deceive the receiver into clicking on a link or an attachment which can install malicious software onto their computer.

Once installed, this software can facilitate the theft of information.

Written By

AFP 2023

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Email Security

Many Fortune 500, FTSE 100 and ASX 100 companies have failed to properly implement the DMARC standard, exposing their customers and partners to phishing...

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...