INDEPENDENT NEWS

GCSB: Malicious cyber activity attributed to Russia

Published: Thu 4 Oct 2018 01:06 PM
Malicious cyber activity attributed to Russia
The Government Communications Security Bureau (GCSB) has established clear links between the Russian government and a campaign of malicious cyber activity targeting overseas political institutions, businesses, media and sporting organisations.
“The GCSB has worked through a robust attribution process which strongly links four international malicious cyber incidents since 2015 to the Russian government,” Director-General Andrew Hampton said.
"The nature of these campaigns is complex. The GCSB’s assessment found it was highly likely the Russian military General Staff Main Intelligence Directorate (GRU) was behind the campaigns and that a number of cyber proxy groups associated with these incidents are actors of the Russian state.
“Our process considered material from our partners and our own cyber threat analysis.”
The United Kingdom’s National Cyber Security Centre has today announced it assesses the GRU is behind this activity. This analysis is consistent with the GCSB’s.
“These malicious cyber activities serve no legitimate national security interest. They were designed to negatively impact on the ability of people around the world to go about their daily lives free from interference,” Mr Hampton said.
“Such behaviour is unacceptable – it is counter to New Zealand’s vision for an open, safe and secure cyberspace.
“New Zealand organisations were not directly affected by these malicious cyber activities. We are, however, seeing a range of activity in New Zealand that contains indicators which can be linked to Russian state actors.
“These incidents reinforce the need for New Zealand to have robust national systems to address cyber threats. Initiatives such as the GCSB’s CORTEX cyber defence capabilities and the proposed expansion of the Malware-Free Networks programme help protect our nationally significant organisations.”
The Government is taking a fresh look at the current Cyber Security Strategy to ensure New Zealand is equipped to handle increasing cyber security threats.
Further information about CORTEX or the expansion of the Malware-Free Networks can be found on the GCSB’s website. Further information about the refresh of the Cyber Security Strategy can be found on the Connect Smart website.
Notes to Editors
A GCSB assessment relates to the below malicious cyber activity:
October 2017 The malware known as BadRabbit was distributed, affecting users in Ukraine and Russia.
August 2016 Confidential medical files relating to a number of international athletes were released online. The World Anti-Doping Agency (WADA) stated publicly that this data came from a hack of its Anti-Doping Administration and Management system.
June 2016 The US Democratic National Committee (DNC) was hacked and documents were subsequently published online in an unauthorised disclosure.
July 2015 Multiple email accounts belonging to a small UK-based TV station were accessed and content stolen.

Next in New Zealand politics

West Coast Swim Spot Testing Clear Of E-coli
By: Brendon McMahon - Local Democracy Reporter
Government Throws Coal On The Climate Crisis Fire
By: Green Party
Public Transport Costs To Double As National Looks At Unaffordable Roading Project Instead
By: New Zealand Labour Party
New Paper On A Framework For Assessing The Economic And Fiscal Impacts Of Climate Change
By: The Treasury
Pet Bonds A Win/Win For Renters And Landlords
By: New Zealand Government
New Zealand Condemns Iranian Strikes
By: New Zealand Government
View as: DESKTOP | MOBILE © Scoop Media