Australia announced an ongoing investigation on unspecified ‘security incident’ in the federal parliament’s computer network.
“Following a security incident on the parliamentary computing network, a number of measures have been implemented to protect the network and its users,” parliamentary authorities said in a statement.
At the time of writing, authorities did not provide technical details on the security breach, officials said there was no initial evidence that data had been compromised by threat actors.
Representatives from Australia’s Parliament did not release any statement on the attribution of the attack, but clearly, such kind of operations are usually associated with activities of nation-state actors.
“We have no evidence that this is an attempt to influence the outcome of parliamentary processes or to disrupt or influence electoral or political processes,” a statement said.
“Our immediate focus has been on securing the network and protecting data and users.”
In response to the incident, the IT staff reset passwords for all parliamentary
The Australian Signals Directorate (ASD) is also investigating the incident, according to the Australian broadcaster ABC intelligence agencies suspect the involvement of state-sponsored hackers.
“ASD and its Australian Cyber Security Centre will continue to work with (Parliament) to understand the full extent of this network compromise,” and ASD spokesperson told AFP.
“Meanwhile, the necessary steps are being taken to mitigate the compromise and prevent any harm.”
| [adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – hacking, Australia’s Parliament)
[adrotate banner=”5″] [adrotate banner=”13″]
Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…
A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…
A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…
Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…
Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…
This website uses cookies.