iTnews

ASD mounts offensive operations against cybercrime infrastructure

By Julian Bajkowski on Apr 7, 2020 10:00AM
ASD mounts offensive operations against cybercrime infrastructure

As other forms of criminal enterprise dry up.

The Australian Signals Directorate has put its offensive capability boot into a substantial escalation of cyber scams proliferating off the back of the COVID-19 pandemic, laying into a number of crime groups seeking to benefit from a global shift to working from home.

Announced by Defence Minister Linda Reynolds on Tuesday, ASD’s usually highly classified offensive operations come as cybercrime gangs globally experience a surge of interest as other forms of criminal enterprise dry up on the back of lockdowns.

While the ASD is adhering to its tightly worded script, the scenario unfolding is not hard to surmise.

Literally trillions of dollars is being pumped into rescue and stimulus packages by governments with far more relaxed checks on eligibility and distribution.

At the same time, billions of people are trying to sign-up for welfare for the first time, making them easy targets for fake pages.

And the whole world is using Zoom.

Put simply, it’s one giant cyber-hygiene mess. Hence the pro-active intervention.

“Our offensive cyber campaign has only just begun and we will continue to strike back at these cyber criminals operating offshore as they attempt to steal money and data from Australians,” Australian Signals Directorate's director general Rachel Noble said.

Defence Minister Linda Reynolds went one step further, essentially saying that boxes have been hit.

 “We are hitting back through the Australian Signals Directorate (ASD), who have already successfully disrupted activities from foreign criminals by disabling their infrastructure and blocking their access to stolen information,” Reynolds said.

“Some of these cybercriminals have even posed as health officials in an attempt to exploit vulnerable Australians, by infecting their computers with malware and stealing their private information.”

The fact that ASD is publicly broadcasting that it has been hitting boxes to shut them down is somewhat ominous. It suggests a sufficiency of operational urgency for what is essentially direct military intervention to shut down threats before they escalate.

A real possibility is that the usual methods of persuasion are currently either unavailable or ineffective, potentially both.

Noble said telecommunications carriers and platforms had been roped into the operations, with the Australian Cyber Security Centre (ACSC) working with Google and Microsoft to have nasty websites painted-up as malicious, with warnings fired off to visitors that the sites are malicious.

“Close cooperation with telecommunications and IT companies is vital in providing increased protective barriers for Australians from these heartless cyber criminals,” Noble said.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
acsc asd australian signals directorate cloud cyber security hardware linda reynolds networking offensive capability rachael noble security telco/isp

Partner Content

As Australian companies lean more heavily on the cloud, edge security is finding its stride
Partner Content As Australian companies lean more heavily on the cloud, edge security is finding its stride
What conversations should executives be having about cyber security?
Partner Content What conversations should executives be having about cyber security?
Shut the door on ransomware
Promoted Content Shut the door on ransomware
Preventing cybercrime in the world of forex trading
Promoted Content Preventing cybercrime in the world of forex trading

Sponsored Whitepapers

The top 5 tech trends to deliver business outcomes
The top 5 tech trends to deliver business outcomes
10 reasons why businesses need to invest in cloud security training
10 reasons why businesses need to invest in cloud security training
Your guide to application security solutions
Your guide to application security solutions
State of Software Security: Open Source Edition
State of Software Security: Open Source Edition
Five questions to ask before you upgrade to a SIEM solution
Five questions to ask before you upgrade to a SIEM solution

Events

  • On-Demand Webinar: How Poly and Microsoft are Embracing Future Work Environments
  • [iTnews and Micro Focus] Navigating the cloud modernisation minefield
By Julian Bajkowski
Apr 7 2020
10:00AM
0 Comments

Related Articles

  • ASD issues warning over cheap and nasty video conferencing
  • Special Report: Inside the West’s failed fight against China’s ‘Cloud Hopper’ hackers
  • Nothing beats cyber FUD to squander trust and irritate people
  • Britain's Huawei compromise puts Australia's cyber hawks under pressure
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

TPG Telecom to start enticing NBN customers to move

TPG Telecom to start enticing NBN customers to move

Infosys scores another $40m for Centrelink payments engine build

Infosys scores another $40m for Centrelink payments engine build

Telstra InfraCo opens up telco's own fibre network

Telstra InfraCo opens up telco's own fibre network

Transport for NSW data stolen in Accellion breach

Transport for NSW data stolen in Accellion breach

You must be a registered member of iTnews to post a comment.
Log In | Register
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.