Shock ABC report using FOI shows some worrying statistics

 

Australia’s mining and manufacturing sectors are taking extraordinary lengths of time to discover cyber intrusions, with new figures revealing delays that in some cases stretch well past a year — and in one instance beyond 500 days — before a breach is even noticed.

Freedom of Information data compiled by industrial cybersecurity firm Secolve shows 187 data breaches recorded across the two sectors since 2018, affecting the personal information of as many as 3.6 million people. Although the dataset is de-identified, the scale and duration of undetected activity highlight a growing concern for insurers about silent exposures within industries that underpin the national economy.

The figures show one operator failed to identify an intrusion for 520 days, then waited another 84 days before reporting it to the Office of the Australian Information Commissioner. Even when breaches were detected promptly, many companies held back for months before notifying regulators. Several incidents took between 30 and 300 days to be disclosed, despite being discovered on the day they occurred.

Across all breaches, mining and manufacturing businesses took an average of 39 extra days to notify authorities after detection.

Professor Dali Kaafar of Macquarie University’s Cyber Security Hub told the ABC that the findings pointed to a fundamental gap in Australia’s breach-reporting framework. He said the data revealed a “critical weakness” in the regime and warned that delays compounded the fallout for victims and organisations alike. “The real takeaway here is how long it's taking some operators to detect and report breaches. That delay is not just procedural, but it increases the harm,” he said.

“The longer a breach goes undetected, the more time attackers have to harvest credentials, exfiltrate data or deploy ransomware,” Professor Kaafar said. “It also drives up recovery costs once the incident is discovered.”

He said the current obligation to report breaches “as soon as practicable” left too much room for interpretation. “Reporting 'as soon as practicable' is open to interpretation,” he said, adding that the data suggested some organisations may be weighing up whether incidents are serious enough to disclose at all. “Under-reporting is always possible,” he said.

Professor Kaafar said the volume of exposed financial information — which appeared in more than half of reported breaches — and tax file numbers, which comprised about 40 per cent, demonstrated the need for organisations to rethink data-retention practices. “Organisations should be reducing their sensitive data footprint,” he said. “They shouldn't be storing financial information or other personal data they don't actually need.”

Secolve’s analysis found that more than nine in ten breaches in the two sectors stemmed from malicious or criminal attacks, far above the national average. Ransomware accounted for more than a quarter of cases. Malware-related attacks took an average of 146 days to detect, compared with just 2.5 days for brute-force credential attacks.

Secolve  said it was “quite confronting” to see how long intruders were able to operate inside networks undetected. Attackers came from “all over — we see geopolitical groups, we see opportunistic hackers,” and described the mining sector as particularly attractive due to the revenue involved. There was a spike in attacks during the early stages of the Russia-Ukraine war - hackers were targeting miners as Australia became a more significant supplier of sanctioned resources.

๐Ÿ“Œ Visit Us

๐ŸŒ Website: statisticsaward.com/
๐Ÿ† Nomination: statisticsaward.com/award-nomination/?ecategory=Awards&rcategory=Awardee
๐Ÿ“ Registration: statisticsaward.com/award-registration/

 

Comments

Popular posts from this blog

Data experts race to preserve US government statistics amid quiet purges

11 Essential Statistical Tools for Data-Driven Research

Why are data nerds racing to save US government statistics ?