Knock Knock! Cybercriminal at Your Doorstep

May 25, 2020 12:20 AM AEST | By Hina Chowdhary
 Knock Knock!  Cybercriminal at Your Doorstep

An organisation has a CCTV camera and lock on the door to safeguard the business from criminals, but what about the security of what they cannot see? An investment is required to have a shield on an integral part of the organisation, popularly known as data.

The paradigm shift to digitalisation is creating a humongous amount of data, thereby increasing the threat, and leaving businesses vulnerable to cyberattacks.

An organisation might think- can there be a cyberattack on my business? When? How? Well, it does not matter as to what is the size or nature of the business or when it can get attacked. Everyone is at risk, and organisations need to be well prepared to take on oncoming cyberattacks. It is worth mentioning that cyberattacks fall under a broad umbrella, wherein there is inequality amongst the cyberattacks. Today attacks are evolving in terms of sophistication and hampering the organisations and individuals in terms of damage in reputation, financial losses, and productivity.

The current COVID-19 crisis has added a flower in the garden of cyber incidents. The pandemic has captured all the eyes on it and changed the strategic view across the globe. All eyes are gazing this pandemic, and cyberattackers are using this economic turmoil as a mask to target organisations. With the surge in cyberattacks, organisations need to boost their security.

From the stealing of bank accounts and accessibility to sensitive information, cybercrime attackers are capitalising on the COVID-19 pandemic and social isolation in new and demonic ways. They chase vulnerable people and organisations by using panic and dangerous ploy in the form of fake emails and texts that are sent across to organisations and individuals to decoy victims into revealing information, such as user accounts to corporate systems or personal information. Also, they are romping on COVID-19 related fears and desperation of individuals or organisations targeting stimulus payments and government aid.

Did you read: Not that impressive: Investors shy away from Aristocrat’s results

In the wake of the current crisis, cybercriminals have unleashed an exotic stream of cyberattacks on numerous employees operating in vulnerable home environments. Employees are working from home with the spill of confidential files on their desktops connecting via home routers or VPNs to access the organisation’s network, which is giving a hard time to the organisations to spot the attacker.

Organisations were vulnerable to cyberattacks way before the outbreak of COVID-19, but many of the organisations did not report these breaches or did not have any idea what they are. Organisations or government agencies failed to act in response to these cyber incidents with poise and utmost urgency.

There is an upsurge in the number of cybercrimes, posing the threat of existence among variant sized organisations amid the coronavirus outbreak.

A cybercrime wave hit BlueScope Steel Limited (ASX: BSL), the Australian steel producer, during mid-May 2020. BlueScope confirmed via its official website that a cyberattack had affected its IT systems and caused disruptions in certain operational parts of the company.

Minor disruptions were caused in the company’s Asian, North Star and New Zealand businesses. However, these businesses are continuing broadly unaffected by these disruptions.

It is yet to outline how BSL was attacked and what was the type or source of the cyber incident. As per the company’s official statement, sales and manufacturing operations had been impacted in Australia.

In response to this attack, some of the processes had been put on halt. In contrast, few operations continued such as steel despatches along with some manual processes and workarounds.

BSL, the oldest steel manufacturer in Australia, has a customer base and operations across regions or countries such as North America, Australia, Asia, and New Zealand. Hence, any degree of a cyber incident can hobble its global operations.

Tania Archibald, Chief Financial Officer, BlueScope, stated that the detection of the cyber incident happened in one of the BSL’s US businesses, and prompt response to the event was taken. Also, in the affected businesses, the company reverted to operations manually until the assessment of the impact and remedies required to restore normal working of the businesses quickly.

Ms Archibald added that the company had deployed internal people, along with assistance from external providers to work on this severe event to restore and protect its systems.

BlueScope is Not Alone; Toll Group and Services NSW Followed the Attack Trail

Service NSW was another victim of cyberattack targeted by a phishing campaign. This attack is one of the known methods of cyberattacks, and it has evolved over the years. This attack can longer be detected by relying solely on personnel, as it requires technological measures.

Service NSW is an agency that operates government services and transactions related to public transport, births, deaths, marriages, housing, etc. The NSW Police was notified regarding the phishing attack on 22 April 2020, which compromised information held within staff emails and resulted in the illegal access of the email accounts of 47 Service NSW staff members. This breach by the cyberattack on the customer service department had put in sensitive information of citizens at risk, causing the use of such personal information for abominable purposes by the hackers.

CEO Damon Rees, Service NSW, said that their cybersecurity teams had interrupted the attack, and the impact on customers and services was curbed. Also, the criminal access was limited to the transactions that happened via phone or over the counter at a Service NSW Centre. He also apologised for not successfully protecting its customers against this cyberattack.

The state government agency deep dived into the email accounts by engaging forensic specialists to identify whether any personal information has been accessed over the attack.

Service NSW has advised the reset of all passwords and pins while scrutinising current accounts for unwarranted activity or transactions to those who have been in touch with Service NSW staff and have experienced mistrustful activity online.

Did you read: Miners Calm Over New Chinese Iron Ore Inspection Policy, But Deputy PM Expresses Concern Over Coal

Australia’s logistics giant, Toll Group, was hit in February 2020 by a Mailto ransomware attack. This attack compromised around 1k systems while impacting local and global deliveries. And, the second wave of a cyberattack hit the company in May 2020.

The group closed its systems after the detection of suspicious activity on the IT systems. On 5 May 2020, Toll confirmed a ransomware attack known as Nefilim. However, the group made sure to restore its services while prioritising the most urgent deliveries amid COVID-19 and maintaining regular contact with the Australian Cyber Security Centre (ACSC) for the process of investigation and recovery.

At least one specific corporate server was accessed, which had details related to past and present employees along with commercial agreement details with its former and current enterprise clients.

The attacker is known to have published this stolen data to the dark web after the download of data from the server whose specific nature of information is unknown. Therefore, Toll is now fastening the process of accessibility and verification of the nature of the published stolen data. And, post this assessment, the impacted individuals will be notified and offered support.

Today more action is needed. The organisations and government agencies need to figure out why they are more exposed. They need to make sure that they brush up on national security policies and determine how to knock together a more cyber-resilient organisation and nation.


Disclaimer

The content, including but not limited to any articles, news, quotes, information, data, text, reports, ratings, opinions, images, photos, graphics, graphs, charts, animations and video (Content) is a service of Kalkine Media Pty Ltd (Kalkine Media, we or us), ACN 629 651 672 and is available for personal and non-commercial use only. The principal purpose of the Content is to educate and inform. The Content does not contain or imply any recommendation or opinion intended to influence your financial decisions and must not be relied upon by you as such. Some of the Content on this website may be sponsored/non-sponsored, as applicable, but is NOT a solicitation or recommendation to buy, sell or hold the stocks of the company(s) or engage in any investment activity under discussion. Kalkine Media is neither licensed nor qualified to provide investment advice through this platform. Users should make their own enquiries about any investments and Kalkine Media strongly suggests the users to seek advice from a financial adviser, stockbroker or other professional (including taxation and legal advice), as necessary. Kalkine Media hereby disclaims any and all the liabilities to any user for any direct, indirect, implied, punitive, special, incidental or other consequential damages arising from any use of the Content on this website, which is provided without warranties. The views expressed in the Content by the guests, if any, are their own and do not necessarily represent the views or opinions of Kalkine Media. Some of the images/music that may be used on this website are copyright to their respective owner(s). Kalkine Media does not claim ownership of any of the pictures displayed/music used on this website unless stated otherwise. The images/music that may be used on this website are taken from various sources on the internet, including paid subscriptions or are believed to be in public domain. We have used reasonable efforts to accredit the source wherever it was indicated as or found to be necessary.


AU_advertise

Advertise your brand on Kalkine Media

Sponsored Articles


Investing Ideas

Previous Next
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.