Australia announced an ongoing investigation on unspecified ‘security incident’ in the federal parliament’s computer network.
“Following a security incident on the parliamentary computing network, a number of measures have been implemented to protect the network and its users,” parliamentary authorities said in a statement.
At the time of writing, authorities did not provide technical details on the security breach, officials said there was no initial evidence that data had been compromised by threat actors.
Representatives from Australia’s Parliament did not release any statement on the attribution of the attack, but clearly, such kind of operations are usually associated with activities of nation-state actors.
“We have no evidence that this is an attempt to influence the outcome of parliamentary processes or to disrupt or influence electoral or political processes,” a statement said.
“Our immediate focus has been on securing the network and protecting data and users.”
In response to the incident, the IT staff reset passwords for all parliamentary
The Australian Signals Directorate (ASD) is also investigating the incident, according to the Australian broadcaster ABC intelligence agencies suspect the involvement of state-sponsored hackers.
“ASD and its Australian Cyber Security Centre will continue to work with (Parliament) to understand the full extent of this network compromise,” and ASD spokesperson told AFP.
“Meanwhile, the necessary steps are being taken to mitigate the compromise and prevent any harm.”
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – hacking, Australia’s Parliament)
[adrotate banner=”5″] [adrotate banner=”13″]
The National Police Agency in South Korea warns that North Korea-linked threat actors are targeting…
The U.S. Department of State imposed visa restrictions on 13 individuals allegedly linked to the…
A cyber attack has been disrupting operations at Synlab Italia, a leading provider of medical…
Russia-linked APT28 group used a previously unknown tool, dubbed GooseEgg, to exploit Windows Print Spooler…
A financially motivated group named GhostR claims the theft of a sensitive database from World-Check…
Researcher demonstrated how to exploit vulnerabilities in the Windows DOS-to-NT path conversion process to achieve…
This website uses cookies.