Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Incident Response

Canada Helping Australia Determine ‘Full Extent’ of Hack

Canada’s electronic eavesdropping agency said Wednesday it is working with Canberra to try to determine the scale of computer hacking on Australia’s parliament and political parties just months from an election.

Canada’s electronic eavesdropping agency said Wednesday it is working with Canberra to try to determine the scale of computer hacking on Australia’s parliament and political parties just months from an election.

In a statement to AFP, Communications Security Establishment (CSE) spokesman Ryan Foreman said the agency is “aware of a cyber security incident that targeted the Australian Parliament and several domestic political parties.

“We work closely with our Australian partners, including ongoing efforts to understand the full extent of this incident,” he added.

Australian Prime Minister Scott Morrison on Monday said a “sophisticated state actor” was behind the cyber attack earlier this month.

China was named by security experts as a possible suspect, which Beijing said was “irresponsible” speculation and an attempt to “smear” the country.

Australians are expected to go to the polls mid-May, followed by Canadians in October.

Both countries are members of the Five Eyes intelligence network — along with Britain, New Zealand and the United States — and officials have warned that this makes them particularly rich targets for foreign interests.

The CSE has warned that hackers tried but failed to influence Canada’s 2015 election and may try again this year.

Advertisement. Scroll to continue reading.

Last month, Canada created a special task force to fight disinformation and foreign meddling in the vote.

Canada’s paper ballot election system itself is considered safe.

But Public Safety Minister Ralph Goodale has warned of sophisticated attempts to sway elections in other countries in 2017 such as France where bots were used to slander President Emmanuel Macron, and Germany where seven of the 10 most-shared articles about Chancellor Angela Merkel on Facebook were false.

He outlined meddling that may include the “old fashioned” theft of sensitive information by foreign spies or providing illegal funds to campaigns, or coercing a diaspora.

And, he said, “social media have been used to falsely slander elected officials. Trolls and bots are dispatched to stoke anxiety, even hysteria around sensitive issues. Fake news masquerades as legitimate information.”

Written By

AFP 2023

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Mike Dube has joined cloud security company Aqua Security as CRO.

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Data Breaches

LastPass DevOp engineer's home computer hacked and implanted with keylogging malware as part of a sustained cyberattack that exfiltrated corporate data from the cloud...

Incident Response

Microsoft has rolled out a preview version of Security Copilot, a ChatGPT-powered tool to help organizations automate cybersecurity tasks.

Data Breaches

GoTo said an unidentified threat actor stole encrypted backups and an encryption key for a portion of that data during a 2022 breach.

Application Security

GitHub this week announced the revocation of three certificates used for the GitHub Desktop and Atom applications.

Incident Response

Meta has developed a ten-phase cyber kill chain model that it believes will be more inclusive and more effective than the existing range of...

Cloud Security

VMware described the bug as an out-of-bounds write issue in its implementation of the DCE/RPC protocol. CVSS severity score of 9.8/10.