{"id":8671,"date":"2021-09-24T12:10:50","date_gmt":"2021-09-24T15:10:50","guid":{"rendered":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=8671"},"modified":"2021-09-24T12:10:50","modified_gmt":"2021-09-24T15:10:50","slug":"ciberataques-cada-vez-mas-dirigidos-a-la-infraestructura-critica-de-australia","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=8671","title":{"rendered":"Ciberataques cada vez m\u00e1s dirigidos a la infraestructura cr\u00edtica de Australia"},"content":{"rendered":"<p>El informe del Centro Australiano de Seguridad Cibern\u00e9tica revela que los incidentes de ransomware aumentaron un 15% a medida que las p\u00e9rdidas por delitos cibern\u00e9ticos alcanzaron los $ 33.000 millones de d\u00f3lares. Los ciberdelincuentes intentaron explotar la pandemia alentando a los destinatarios a ingresar credenciales personales para acceder a informaci\u00f3n o servicios relacionados con Covid, mientras que los gobiernos extranjeros no identificados se dirigieron al sector de la salud en busca de &#8220;acceso a la propiedad intelectual o informaci\u00f3n confidencial sobre la respuesta de Australia al Covid&#8221;.<\/p>\n<hr \/>\n<p class=\"dcr-s23rjr\">A quarter of cyber incidents reported to Australian security officials over the past year have targeted critical infrastructure and essential services, including health care, food distribution and energy.<\/p>\n<p class=\"dcr-s23rjr\">The Australian Cyber Security Centre (ACSC) will disclose the incidents in a report to be published on Wednesday, warning of \u201csignificant targeting, both domestically and globally, of essential services\u201d.<\/p>\n<p class=\"dcr-s23rjr\">These incidents have \u201cunderscored the vulnerability of critical infrastructure to significant disruption in essential services, lost revenue and the potential of harm or loss of life\u201d.<\/p>\n<p>The report will also show ransomware attacks disclosed to the ACSC increased 15% in the 2020-21 financial year, when compared with the previous financial year.<\/p>\n<p class=\"dcr-s23rjr\">The ACSC \u2013 which is part of the Australian Signals Directorate \u2013 received more than 67,500 reports of cybercrime of all types in 2020-21, or one every eight minutes.<\/p>\n<p class=\"dcr-s23rjr\">That compared with one every 10 minutes the previous year.<\/p>\n<p class=\"dcr-s23rjr\">The report says businesses, individuals and other entities had incurred more than $33bn in total losses from cyber crime throughout the year.<\/p>\n<p class=\"dcr-s23rjr\">Cybercriminals sought to exploit the pandemic by encouraging recipients to enter personal credentials to access Covid-related information or services, while unnamed foreign governments targeted the health sector seeking \u201caccess to intellectual property or sensitive information about Australia\u2019s response to Covid\u201d.<\/p>\n<p class=\"dcr-s23rjr\">The ACSC responded to about 1,630 cybersecurity incidents in 2020-21, or an average of 31 cybersecurity incidents a week.<\/p>\n<p class=\"dcr-s23rjr\">\u201cApproximately one quarter of reported cybersecurity incidents affected critical infrastructure organisations, including essential services such as education, health, communications, electricity, water and transport,\u201d the report says.<\/p>\n<p class=\"dcr-s23rjr\">A breakdown of the severity of cyber incidents in 2020-21 shows there were 14 cases in which federal government entities or nationally significant infrastructure suffered the removal or damage of sensitive data or intellectual property.<\/p>\n<p class=\"dcr-s23rjr\">This category also includes the supply chain to critical national infrastructure. Those entities also suffered a further 44 incidents in which there was an active network intrusion or temporary disruption to systems or services.<\/p>\n<p>The report does not name most of the affected entities, although it includes several case studies, including a March 2021 ransomware attack against a Victorian public health service. That attack \u201caffected four hospitals and aged care facilities, and resulted in the postponement of elective surgeries\u201d.<\/p>\n<p class=\"dcr-s23rjr\">The assistant defence minister, Andrew Hastie, who will release the report, said malicious cyber criminals were \u201cescalating their attacks on Australians\u201d.<\/p>\n<p class=\"dcr-s23rjr\">Hastie said the health sector reported the second highest number of ransomware incidents, \u201cright at a time when Australians are most reliant on our health workers to help us respond and recover through the pandemic\u201d.<\/p>\n<p class=\"dcr-s23rjr\">He pointed to a government bill \u2013 which remains before the parliament, and has attracted concerns from industry about regulatory impact \u2013 that would impose mandatory cyber incident reporting requirements on organisations that run critical infrastructure assets.<\/p>\n<p class=\"dcr-s23rjr\">Hastie said the legislation would \u201censure that in the event of a large-scale cyber attack on our critical infrastructure, our cyber and law enforcement agencies are empowered to provide greater and more immediate support to the victims\u201d.<\/p>\n<p class=\"dcr-s23rjr\">In ransomware attacks, criminals typically lock up the data of a target organisation and then demand payment to decrypt and unlock systems, sometimes threatening to leak stolen data if the request is rebuffed.<\/p>\n<p class=\"dcr-s23rjr\">The ACSC report mentions the ransomware attack on the global meat and food processing company <a href=\"https:\/\/www.theguardian.com\/food\/2021\/jun\/02\/cyber-attack-targets-worlds-largest-meat-processing-company\" target=\"_blank\" rel=\"noopener\" data-link-name=\"in body link\">JBS Foods in May 2021<\/a>, which led to the suspension of operations and <a href=\"https:\/\/www.theguardian.com\/australia-news\/2021\/jun\/02\/cyber-attack-on-jbs-worlds-largest-meatworks-temporarily-shuts-australian-operations\" target=\"_blank\" rel=\"noopener\" data-link-name=\"in body link\">standing down of workers in Australia<\/a>.<\/p>\n<p class=\"dcr-s23rjr\">The US division later <a href=\"https:\/\/www.theguardian.com\/business\/2021\/jun\/10\/worlds-biggest-meat-producer-jbs-pays-11m-cybercrime-ransom\" target=\"_blank\" rel=\"noopener\" data-link-name=\"in body link\">confirmed that it had paid a ransom<\/a> equivalent to $US11m \u2013 reportedly in bitcoin.<\/p>\n<p class=\"dcr-s23rjr\">With nearly 500 ransomware cybercrime reports in the 2020-21 financial year, the ACSC says the problem has \u201cgrown in profile and impact, and poses one of the most significant threats to Australian organisations\u201d.<\/p>\n<p class=\"dcr-s23rjr\">\u201cThis increase has been associated with an increasing willingness of criminals to extort money from particularly vulnerable and critical elements of society.\u201d<\/p>\n<p class=\"dcr-s23rjr\">The report says ransom demands by cybercriminals ranged from thousands to millions of dollars, and attackers have improved their capabilities by accessing tools and services on the dark web.<\/p>\n<p class=\"dcr-s23rjr\">The report says \u201cnew and serious concerns\u201d have joined the list of existing cyber threats, such as \u201cthe protection of Australia\u2019s Covid-19 vaccine supply, including distribution processes, from malicious cyber actors\u201d.<\/p>\n<p class=\"dcr-s23rjr\">State-based actors are believed to have an interest in learning more about Australia\u2019s pandemic response and the views of those providing advice to government.<\/p>\n<p class=\"dcr-s23rjr\">\u201cState and criminal cyber actors alike possess the capability to disrupt Australia\u2019s critical infrastructure \u2013 including vaccine supply and distribution chains \u2013 with the pandemic only amplifying the opportunities for these actors to cause Australia harm,\u201d the report says.<\/p>\n<p class=\"dcr-s23rjr\">\u201cEven in the absence of direct and intentional targeting, there remains the potential for malicious cyber actors to inadvertently disrupt vaccine supply and distribution chains, making the threat more difficult to address.\u201d<\/p>\n<p class=\"dcr-s23rjr\">The report mentions China once \u2013 when summarising <a href=\"https:\/\/www.theguardian.com\/world\/2021\/jul\/19\/australia-joins-allies-in-accusing-china-of-malicious-cyber-activities\" target=\"_blank\" rel=\"noopener\" data-link-name=\"in body link\">the Australian government\u2019s decision in July<\/a> to join with the US and other international partners in accusing China\u2019s Ministry of State Security of exploiting vulnerabilities in the Microsoft Exchange software.<\/p>\n<p class=\"dcr-s23rjr\">That exploit is estimated to have affected thousands of computers and networks worldwide, including in Australia \u2013 but the Chinese government said they were \u201cgroundless accusations\u201d.<\/p>\n<p class=\"dcr-s23rjr\">Wednesday\u2019s report also warns that business email compromise \u2013 which includes when companies are targeted with fake invoices that appear to be for genuine services \u2013 \u201ccontinues to present a major threat to Australian businesses and government enterprises, especially as more Australians work remotely\u201d.<\/p>\n<p class=\"dcr-s23rjr\">The average loss in such incidents was more than $50,600, which the report says is \u201cover one-and-a-half times higher than the previous financial year\u201d. It says cybercriminal groups have become more sophisticated and organised.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Fuente:<\/strong> <a href=\"https:\/\/www.theguardian.com\/technology\/2021\/sep\/15\/significant-threat-cyber-attacks-increasingly-targeting-australias-critical-infrastructure\" target=\"_blank\" rel=\"noopener\"><em>https:\/\/www.theguardian.com<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>El informe del Centro Australiano de Seguridad Cibern\u00e9tica revela que los incidentes de ransomware aumentaron un 15% a medida que las p\u00e9rdidas por delitos cibern\u00e9ticos&hellip; <\/p>\n","protected":false},"author":1,"featured_media":8672,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[23,28],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/8671"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8671"}],"version-history":[{"count":1,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/8671\/revisions"}],"predecessor-version":[{"id":8673,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/8671\/revisions\/8673"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/media\/8672"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8671"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=8671"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=8671"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}