Scoop has an Ethical Paywall
Work smarter with a Pro licence Learn More

Gordon Campbell | Parliament TV | Parliament Today | News Video | Crime | Employers | Housing | Immigration | Legal | Local Govt. | Maori | Welfare | Unions | Youth | Search

 

GCSB: Malicious cyber activity attributed to Russia

Malicious cyber activity attributed to Russia

The Government Communications Security Bureau (GCSB) has established clear links between the Russian government and a campaign of malicious cyber activity targeting overseas political institutions, businesses, media and sporting organisations.

“The GCSB has worked through a robust attribution process which strongly links four international malicious cyber incidents since 2015 to the Russian government,” Director-General Andrew Hampton said.

"The nature of these campaigns is complex. The GCSB’s assessment found it was highly likely the Russian military General Staff Main Intelligence Directorate (GRU) was behind the campaigns and that a number of cyber proxy groups associated with these incidents are actors of the Russian state.

“Our process considered material from our partners and our own cyber threat analysis.”

The United Kingdom’s National Cyber Security Centre has today announced it assesses the GRU is behind this activity. This analysis is consistent with the GCSB’s.

“These malicious cyber activities serve no legitimate national security interest. They were designed to negatively impact on the ability of people around the world to go about their daily lives free from interference,” Mr Hampton said.

“Such behaviour is unacceptable – it is counter to New Zealand’s vision for an open, safe and secure cyberspace.

“New Zealand organisations were not directly affected by these malicious cyber activities. We are, however, seeing a range of activity in New Zealand that contains indicators which can be linked to Russian state actors.

Advertisement - scroll to continue reading

Are you getting our free newsletter?

Subscribe to Scoop’s 'The Catch Up' our free weekly newsletter sent to your inbox every Monday with stories from across our network.

“These incidents reinforce the need for New Zealand to have robust national systems to address cyber threats. Initiatives such as the GCSB’s CORTEX cyber defence capabilities and the proposed expansion of the Malware-Free Networks programme help protect our nationally significant organisations.”

The Government is taking a fresh look at the current Cyber Security Strategy to ensure New Zealand is equipped to handle increasing cyber security threats.

Further information about CORTEX or the expansion of the Malware-Free Networks can be found on the GCSB’s website. Further information about the refresh of the Cyber Security Strategy can be found on the Connect Smart website.


Notes to Editors

A GCSB assessment relates to the below malicious cyber activity:
October 2017 The malware known as BadRabbit was distributed, affecting users in Ukraine and Russia.
August 2016 Confidential medical files relating to a number of international athletes were released online. The World Anti-Doping Agency (WADA) stated publicly that this data came from a hack of its Anti-Doping Administration and Management system.
June 2016 The US Democratic National Committee (DNC) was hacked and documents were subsequently published online in an unauthorised disclosure.
July 2015 Multiple email accounts belonging to a small UK-based TV station were accessed and content stolen.

© Scoop Media

Advertisement - scroll to continue reading
 
 
 
Parliament Headlines | Politics Headlines | Regional Headlines

 
 
 
 
 
 
 

LATEST HEADLINES

  • PARLIAMENT
  • POLITICS
  • REGIONAL
 
 

InfoPages News Channels


 
 
 
 

Join Our Free Newsletter

Subscribe to Scoop’s 'The Catch Up' our free weekly newsletter sent to your inbox every Monday with stories from across our network.