Tech News

Tech Business News

  • Home
  • Technology
  • Business
  • News
    • Technology News
    • Local Tech News
    • World Tech News
    • General News
    • News Stories
  • Media Releases
    • Tech Media Releases
    • General Media Releases
  • Advertisers
    • Advertiser Content
    • Promoted Content
    • Sponsored Whitepapers
    • Advertising Options
  • Cyber
  • Reports
  • People
  • Science
  • Articles
    • Opinion
    • Digital Marketing
    • Guest Publishers
  • About
    • Tech Business News
    • News Contributions -Submit
    • Journalist Application
    • Contact Us
Reading: ASD Cyber Threat Report For 2022-2023 Flags New Cyber Normal For Australia
Share
Font ResizerAa
Tech Business NewsTech Business News
  • Home
  • Technology News
  • Business News
  • News Stories
  • General News
  • World News
  • Media Releases
Search
  • News
    • Technology News
    • Business News
    • Local News
    • News Stories
    • General News
    • World News
    • Global News
  • Media Releases
    • Tech Media Releases
    • General Press
  • Categories
    • Crypto News
    • Cyber
    • Digital Marketing
    • Education
    • Gadgets
    • Technology
    • Guest Publishers
    • IT Security
    • People In Technology
    • Reports
    • Science
    • Software
    • Stock Market
  • Promoted Content
    • Advertisers
    • Promoted
    • Sponsored Whitepapers
  • Contact & About
    • Contact Information
    • About Tech Business News
    • News Contributions & Submissions
Follow US
© 2022 Tech Business News- Australian Technology News. All Rights Reserved.
Tech Business News > Cyber > ASD Cyber Threat Report For 2022-2023 Flags New Cyber Normal For Australia
Cyber

ASD Cyber Threat Report For 2022-2023 Flags New Cyber Normal For Australia

The ASD annual cyber threat report released on Wednesday revealed that in the last financial year the agency responded to 143 incidents at critical infrastructure entities such as ports, up from 95 incidents in the previous year. Law enforcement agencies also received almost 94,000 reports via ReportCyber, averaging approximately one report every six minutes

Matthew Giannelis
Last updated: November 16, 2023 11:16 pm
Matthew Giannelis
Share
SHARE

In 2022-23, Australia faced an ongoing threat to its security and prosperity from malicious cyber activities. Various actors with both the intention and capability to compromise critical systems posed a continuous risk.

The Australian Signals Directorate (ASD) actively addressed more than 1,100 cybersecurity incidents reported by entities within the country. Additionally, law enforcement received almost 94,000 reports through ReportCyber, averaging to approximately one report every six minutes.

Australian networks were consistently targeted by a mix of opportunistic and deliberate malicious cyber activities. The vast majority of the reports related to low-level attacks or isolated issues, such as compromised accounts or credentials.

ASD said critical infrastructure tends to have a broad attack surface, remote access, connected systems and third parties, which make it of interest to malicious actors.

Worldwide, state-sponsored cyber actors have aimed at government and critical infrastructure networks as part of continuous information-gathering campaigns or disruptive activities.

In 2022–23, ASD joined international partners to call out Russia’s Federal Security Service’s use of ‘Snake’ malware for cyber espionage, and also highlighted activity associated with a People’s Republic of China state-sponsored cyber actor that used ‘living-off-the-land’ techniques to compromise critical infrastructure organisations..

Australian critical infrastructure was targeted via increasingly interconnected systems.

Operational technology connected to the internet and into corporate networks has provided opportunities for malicious cyber actors to attack these systems. In 2022–23, ASD responded to 143 cyber security incidents related to critical infrastructure.

Cybercriminals continued to adapt tactics to extract maximum payment from victims. 

Cybercriminals constantly evolved their operations against Australian organisations, fuelled by a global industry of access brokers and extortionists. ASD responded to 127 extortion-related incidents: 118 of these incidents involved ransomware or other forms of restriction to systems, files or accounts.

Business email compromise remained a key vector to conduct cybercrime. Ransomware also remained a highly destructive cybercrime type, as did hacktivists’ denial-of-service attacks, impacting organisations’ business operations.

Professor Matthew Warren, Director of the RMIT Centre for Cyber Security Research and Innovation (CCSRI said “Australia is facing increased risks in relation to cyber security and the new ASD 2022-23 threat report bears this out. 

“Last year 94,000 cyber crime reports were reported to the government, an average of a report every six minutes; the previous year a crime was reported every seven minutes,,” said Warren

“In that time, the government also responded to 143 cyber incidents focused on Australia’s cyber security critical infrastructure,,”

“The financial costs of cyber crime incidents have also increased from last year, up by 14 percent – which is a massive increase,” he said.

One in 5 critical vulnerabilities was exploited within 48 hours.

This was despite patching or mitigation advice being available. Malicious cyber actors used these critical flaws to cause significant incidents and compromise networks, aided by inadequate patching.

Cyber security is increasingly challenged by complex ICT supply chains and advances in fields such as artificial intelligence.

To boost cyber security, Australia must consider not only technical controls such as ASD’s Essential Eight, but also growing a positive cyber-secure culture across business and the community. This includes prioritising secure-by-design and secure-by-default products during both development (vendors) and procurement (customers).

ASD’s first year of REDSPICE increased cyber threat intelligence sharing, the uplift of critical infrastructure, and an enhanced 24/7 national incident response capability.

Genuine partnerships across both the public and private sectors have remained essential to Australia’s cyber resilience; and ASD’s Cyber Security Partnership Program has grown to include over 110,000 organisations and individuals.

ASD possesses the capability to construct a comprehensive national cyber threat overview, facilitated in part by the prompt and detailed reporting of cybersecurity incidents by members of the public and Australian businesses.

The compilation of cybersecurity incident data empowers ASD to enhance threat mitigation guidance with real-time insights into the latest trends and threats posed by malicious cyber actors.

Any decline in the quantity or quality of information reported to ASD adversely impacts cybersecurity outcomes. Information provided to ASD undergoes anonymisation before being disseminated to the community.

ASD classifies each incident it addresses on a severity scale ranging from Category 1 (C1), representing the most severe, to Category 6 (C6), denoting the least severe.

Incident categorisation considers factors such as the severity of impact, extent of compromise, and the significance of the affected organization.

The number of C2 incidents increased from 2 in year 2021–22 to 5 in the fiscal year 2022–23. This includes noteworthy data breaches wherein cybercriminals extracted data from critical infrastructure for financial gain.

Cybersecurity incidents maintain consistency with the previous fiscal year, with approximately 15 percent of all incidents categorized as C3 or higher.

Among C3 incidents, over 30 percent were associated with organisations self-identifying as critical infrastructure, with the most affected sectors being transport (21 percent), energy (17 percent), and higher education and research (17 percent).

The prevalent C3 incident type was compromised assets, network, or infrastructure (23 percent), followed by data breaches (19 percent) and ransomware (14 percent).

Common activities leading to C3 incidents included the exploitation of public-facing applications (20 percent) and phishing (17 percent).

Almost a quarter (24 percent) of C3 incidents involved notification by ASD to the affected organizations regarding suspicious activity.

Although reports of low-level malicious attacks are often labeled as unsuccessful, these reports still signify a persistent targeting of Australian entities.

As Australians increasingly incorporate technology into their personal lives and business operations, the potential points of vulnerability, or attack surface, for malicious cyber actors continue to expand.

A larger attack surface poses greater challenges for effective defense. Malicious cyber actors commonly target security weaknesses within Information and Communication Technology (ICT), referred to as common vulnerabilities and exposures (CVEs), to compromise systems, pilfer data, or gain complete control over a system.

The prevalence of published CVEs has exhibited a consistent upward trend. The US National Vulnerability Database documented 19,379 CVEs in FY 2020–21, 24,266 CVEs in FY 2021–22, and 29,019 CVEs in FY 2022–23.

In order to assess the exploitation rates of CVEs following the availability of patches or mitigations, ASD conducted an analysis spanning from July 1, 2020, to February 28, 2023, covering 60 CVEs.

The findings revealed that approximately 82 percent of vulnerabilities had a ‘network’ attack vector according to the Common Vulnerability Scoring Scheme. This suggests a preference among malicious actors for vulnerabilities that can be exploited remotely and are present on internet-facing or edge devices.

Incredible as it may seem, over 90 percent of Common Vulnerabilities and Exposures (CVEs) come with a patch or mitigation advice within a mere two weeks of public disclosure! Now, that’s a testament to the incredible efficiency of the cybersecurity community.

But here’s the kicker – despite this rapid response, about 50 percent of these CVEs are still falling victim to exploitation more than two weeks after the patch or advice is out in the wild.

During the analysis period, ASD noted that Log4Shell (CVE-2021-44228) and ProxyLogon (CVE-2021-26855) stood out as the most frequently exploited vulnerabilities. These two vulnerabilities accounted for 29 percent of all incidents related to CVEs.

Actors Target Critical Infrastructure

Critical infrastructure assets and networks are attractive targets for malicious cyber activity as these assets need to hold sensitive information, maintain essential services, and often have high levels of connectivity with other organisations and critical infrastructure sectors.

A cyber incident can result in a range of impacts to critical services. For instance, the disruption of an electricity grid could cause a region to lose power. Without power, a hospital may lose access to patient records and struggle to function, internet services may be down and affect communications and payment systems, or water supply could be impacted.

Globally, a broad range of malicious cyber actors, including state actors, cybercriminals and issue‑motivated groups, have demonstrated the intent and the capability to target critical infrastructure.

Malicious cyber actors may target critical infrastructure for a range of reasons. For example, they may:

  • attempt to degrade or disrupt services, such as through denial-of-service (DoS) attacks, which can have a significant impact on service providers and their customers
  • steal or encrypt data or gain insider knowledge for profit or competitive advantage
  • preposition themselves on systems by installing malware, in anticipation of future disruptive or destructive cyber operations, potentially years in advance
  • covertly seek sensitive information through cyber espionage to advance strategic aims.

Critical infrastructure can be targeted by the mass scanning of networks for both old and new vulnerabilities. In February 2023, an Italian energy and water provider was affected by ransomware.

While there was no indication the water or energy supply was affected, it reportedly took 4 days to restore systems like information databases.

Italy’s National Cybersecurity Agency publicly noted the ransomware attack targeted older and unpatched software, exploiting a 2-year-old vulnerability.

According to Professor Warren Cyber crimes are becoming increasingly sophisticated operations, and these attacks will continue to rise in the micro and macro levels until we introduce preventative measures that can keep up with their development. 

“The report states key cyber issues identified are ongoing poor patch management and poorly connected IT and operation technology networks,”

“Hopefully, the Federal Government’s Cyber Security Strategy, which is set to be handed down next week, will strengthen Australia’s cyber security strategies and regulations to minimise the risks and disruptions caused by increasing cyberattacks,” he said.

The ASD Cyber Threat Report serves as a stark revelation of the evolving digital landscape in Australia, signaling the emergence of a new cyber normal.

The findings underscore the persistent and sophisticated nature of cyber threats, necessitating a heightened level of vigilance and adaptive cybersecurity measures.

As the nation grapples with an increasingly complex threat landscape, it is imperative for stakeholders across government, industry, and the public to collaboratively fortify their defenses.

By Matthew Giannelis
Follow:
Secondary editor and executive officer at Tech Business News. An IT support engineer for 20 years he's also an advocate for cyber security and anti-spam laws.
Previous Article Tech News Appian Delivers Better Business Decisions and Outcomes
Next Article Yahoo announces launch of new search engine Yahoo Announces New Search Engine Experience To Roll Out In 2024
Tech News - asd-cyberreport-2023 Australia

Tech Articles

Starting a small business venture in Australia

Starting A Small Business Venture In Tough Economic Times

When starting a small business venture in Australia it's worth…

December 8, 2024
Attitudes Toward Work Manifest The Rise of AI

Did Our Collective Attitudes Toward Work Manifest The Rise of Artificial Intelligence? (AI)

It’s definitely something to think about. There’s a fine line…

November 26, 2024
IT managed services Australia

The Rise Of Managed IT Services In Australia

As we stand at the crossroads of technological advancement and…

October 14, 2024

Recent News

Advanced Bots 95% Undetected
Cyber

Research Finds 95% Of Advanced Bots Go Undetected On Websites

4 Min Read
DDOS CYBER
Cyber

80% of reported ANZ cyber incidents are DoS attacks, financial industry hit hardest

4 Min Read
Rackspace blames ransomware attack
Cyber

Rackspace Confirms Ransomware Attack Leaving Customers Without Email Access

3 Min Read
Wipro Shelde Australia
Cyber

Wipro launches Wipro Shelde Australia to bolster sovereign cybersecurity capabilities

3 Min Read
Tech News

Tech Business News

Stay up to date with the latest technology & business news trends from Australia and the around the world.

Technology News reports and whitepaper publishing services are available along with media and advertising options

Our Australian technology news includes People, Business, Science, World News, Local News, Guest publishers, IT News & Tech News Australia | Tech News was established in 2019

About

About Us 
Contact Us 
Privacy Policy
Copyright Policy
Terms & Conditions

December, 10, 2024

Contact

Contact Information.
Melbourne, Australia

Werribee 3030

Phone: +61 431401041

Hours : Monday to Friday, 9am 530-pm.


Tech News

© Copyright Tech Business News 

Latest Australian Tech News – 2024

Welcome Back!

Sign in to your account