iTnews
  • Home
  • News
  • Technology
  • Security

ASD reveals how the Bureau of Meteorology was hacked

By Paris Cowan
Oct 12 2016 6:00AM

Confirms suspicions of foreign espionage.

Australia’s Cyber Security Centre said it is “likely” foreign adversaries successfully made away with information stolen from the Bureau of Meteorology in a 2015 hack on the agency's networks.

ASD reveals how the Bureau of Meteorology was hacked

The government’s security hub has released new details on the intrusion - which was made public by the ABC in December 2015 - in its second annual cyber threat report, to be published later today.

The Australian Signals Directorate was alerted to the intrusion when it uncovered a breed of RAT (remote accesss trojan) it described as being “popular with state-sponsored cyber adversaries” on the BoM network, following reports of suspicious activity from two agency computers.

The ASD said it was likely all passwords on the bureau’s network were compromised by the time it uncovered the breach, owing to a “password dumping utility” found on the network. It said at least one legitimate domain administrator account had been compromised by the intruder.

The intelligence agency's investigators found evidence of the hacker “searching for and copying an unknown quantity of documents from the bureau’s network,” the ACSC report revealed.

“This information is likely to have been stolen by the adversary," the report stated.

The intruder tried to break into at least six other points on the bureau’s network, including domain controllers and file servers.

They are thought to have covered their tracks with network scanning and time stamp modification tools.

The ACSC attributed the compromise to a “foreign intelligence service”. The Chinese government has already denied claims it had anything to do with the breach.

The ASD investigators said the presence of other unrelated malware on the network - such as Cryptolocker ransomware - pointed to serious failings in the BoM’s information protections, which would have made it an appealing target.

“Security controls in place were insufficient to protect the network from more common threats associated with cybercrime," the ACSC report stated.

The security hub said the BoM has since implemented the ASD’s set of cyber mitigation strategies, which will “significantly improve the security posture of the bureau’s corporate network”.

"The ACSC continues to work with the Bureau of Meteorology to implement a number of further, specific recommendations to mitigate future compromise," it said.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
acscasdbreachbureau of meteorologyespionagegovernmenthackratsecurity

Related Articles

  • Nine's web app protection blocked 96m bad requests in 2024 Olympics Nine's web app protection blocked 96m bad requests in 2024 Olympics
  • James Cook University accelerates digital roadmap and cyber uplift James Cook University accelerates digital roadmap and cyber uplift
  • US proposes requiring reporting for advanced AI, cloud providers US proposes requiring reporting for advanced AI, cloud providers
  • German intelligence says Russian GRU group behind NATO, EU cyberattacks German intelligence says Russian GRU group behind NATO, EU cyberattacks

Partner Content

Kyocera hub
Kyocera hub
Why a speedy response is critical for hardware maintenance
Partner Content Why a speedy response is critical for hardware maintenance
Why maintaining your hardware can improve your cloud journey
Partner Content Why maintaining your hardware can improve your cloud journey
Securing Modern Enterprise: IT Leaders Address Third-Party Risk Management
Partner Content Securing Modern Enterprise: IT Leaders Address Third-Party Risk Management

Sponsored Whitepapers

Redefining Vulnerability Management
Redefining Vulnerability Management
How JLL gained visibility into nearly 100K endpoints with Tanium
How JLL gained visibility into nearly 100K endpoints with Tanium
Why a holistic approach to managing risk is key to solving complex IT problems
Why a holistic approach to managing risk is key to solving complex IT problems
High Availability: The Foundation of Digital Transformation
High Availability: The Foundation of Digital Transformation
Nine Ways To Prepare Your Database for a High-Traffic Event
Nine Ways To Prepare Your Database for a High-Traffic Event
Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

BoM's seven-year technology transformation cost $866m

BoM's seven-year technology transformation cost $866m

Medibank allegedly missed EDR alerts before data breach

Medibank allegedly missed EDR alerts before data breach

ANZ joins NAB and CBA on ConnectID

ANZ joins NAB and CBA on ConnectID

James Cook University accelerates digital roadmap and cyber uplift

James Cook University accelerates digital roadmap and cyber uplift

Digital Nation

State of Security 2023
State of Security 2023
More than half of loyalty members concerned about their data
More than half of loyalty members concerned about their data
How eBay uses interaction analytics to improve CX
How eBay uses interaction analytics to improve CX
COVER STORY: What AI regulation might look like in Australia
COVER STORY: What AI regulation might look like in Australia
Health tech startup Kismet raises $4m in pre-seed funding
Health tech startup Kismet raises $4m in pre-seed funding
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.