Shock ABC report using FOI shows some worrying statistics
Australia’s mining and manufacturing sectors are taking
extraordinary lengths of time to discover cyber intrusions, with new figures
revealing delays that in some cases stretch well past a year — and in one
instance beyond 500 days — before a breach is even noticed.
Freedom of Information data compiled by industrial
cybersecurity firm Secolve shows 187 data breaches recorded across the two
sectors since 2018, affecting the personal information of as many as 3.6
million people. Although the dataset is de-identified, the scale and duration
of undetected activity highlight a growing concern for insurers about silent
exposures within industries that underpin the national economy.
The figures show one operator failed to identify an
intrusion for 520 days, then waited another 84 days before reporting it to the
Office of the Australian Information Commissioner. Even when breaches were
detected promptly, many companies held back for months before notifying
regulators. Several incidents took between 30 and 300 days to be disclosed,
despite being discovered on the day they occurred.
Across all breaches, mining and manufacturing businesses
took an average of 39 extra days to notify authorities after detection.
Professor Dali Kaafar of Macquarie University’s
Cyber Security Hub told the ABC that the findings pointed to a fundamental gap
in Australia’s breach-reporting framework. He said the data revealed a
“critical weakness” in the regime and warned that delays compounded the fallout
for victims and organisations alike. “The real takeaway here is how long it's
taking some operators to detect and report breaches. That delay is not just
procedural, but it increases the harm,” he said.
“The longer a breach goes undetected, the more time
attackers have to harvest credentials, exfiltrate data or deploy ransomware,”
Professor Kaafar said. “It also drives up recovery costs once the incident is
discovered.”
He said the current obligation to report breaches “as soon
as practicable” left too much room for interpretation. “Reporting 'as soon as
practicable' is open to interpretation,” he said, adding that the data
suggested some organisations may be weighing up whether incidents are serious
enough to disclose at all. “Under-reporting is always possible,” he said.
Professor Kaafar said the volume of exposed financial
information — which appeared in more than half of reported breaches — and tax
file numbers, which comprised about 40 per cent, demonstrated the need for
organisations to rethink data-retention practices. “Organisations should be
reducing their sensitive data footprint,” he said. “They shouldn't be storing
financial information or other personal data they don't actually need.”
Secolve’s analysis found that more than nine in ten breaches
in the two sectors stemmed from malicious or criminal attacks, far above the
national average. Ransomware accounted for more than a quarter of cases.
Malware-related attacks took an average of 146 days to detect, compared with
just 2.5 days for brute-force credential attacks.
Secolve said it was “quite confronting” to see how
long intruders were able to operate inside networks undetected. Attackers came
from “all over — we see geopolitical groups, we see opportunistic hackers,” and
described the mining sector as particularly attractive due to the revenue
involved. There was a spike in attacks during the early stages of the
Russia-Ukraine war - hackers were targeting miners as Australia became a more
significant supplier of sanctioned resources.
๐ Visit Us
๐ Website: statisticsaward.com/
๐
Nomination: statisticsaward.com/award-nomination/?ecategory=Awards&rcategory=Awardee
๐
Registration: statisticsaward.com/award-registration/
Comments
Post a Comment