Sorry, you need to enable JavaScript to visit this website.
Skip to main content

News

Intel Meltdown and Spectre images

Update on processor vulnerabilities (Meltdown/Spectre)

Jan 29, 2018 - Intel has confirmed that the microcode updates designed to mitigate Spectre variant 2 (CVE-2017-5715: Branch Target Injection) have introduced an increased risk of system instability, data loss and corruption. Intel has released an advisory recommending that users cease deployment of the current microcode update (Root Cause of Reboot Issue Identified).

ACSC and AISA seal partnership deal for a secure cyber future

Jan 29, 2018 - The Australian Cyber Security Centre (ACSC) and the Australian Information Security Association (AISA), Australia’s peak body for information security professionals, have joined forces to further strengthen Australia’s cyber security posture and achieve a cyber secure nation. Together the organisations will deliver a high impact program of events in 2019, including a bigger and better Australian Cyber Conference in Melbourne 7-9 October, replacing the ACSC Conference.
Intel inside logo

ACSC statement on reports of Intel Active Management Technology (AMT) security issue

Jan 16, 2018 - The ACSC is aware of reporting that devices with Intel Active Management Technology (AMT) have an insecure default behaviour that could allow an attacker to bypass security controls on the device. AMT is a management feature of Intel products that enables administrators to remotely manage devices. The feature is found on devices such as laptops, desktops and servers.

News ACSC Statement on Reports of Speculative Execution Flaws in Processors

Jan 4, 2018 - Main Points Security researchers have developed methods involving speculative execution to read kernel memory from user space on a variety of processors from a range of vendors produced in the last decade. At this point there is no indication that the reported flaws are being actively exploited by malicious cyber actors.

Wi-Fi protocol vulnerabilities

Oct 17, 2017 - Researchers have identified security vulnerabilities in the Wi-Fi WPA2 protocol which may make all Wi-Fi enabled devices, such as mobiles, computers and internet routers, vulnerable to malicious actors stealing sensitive information such as credit card numbers, passwords and emails. Malicious actors within range of an affected Wi-Fi device may be able to exploit this vulnerability. At this stage there are no reports of this vulnerability being exploited in Australia.
Router

Routers targeted

Aug 16, 2017 - The Australian Cyber Security Centre (ACSC) is aware that cyber adversaries are extracting configuration files from the routers and switches of a number of Australian organisations. We have no evidence at this stage to suggest that home users are directly impacted by this threat. Identifying vulnerable devices Switches with Cisco Smart Install accessible from the internet, and routers or switches with Simple Network Management Protocol (SNMP) enabled and exposed to the internet, are vulnerable to this activity.
Petya ransom message

Update on the initial infection vector of the Petya ransomware campaign

Jun 29, 2017 - From reports and analysis performed to date, this version of the ransomware appears to have been delivered via a malicious software update for My Electronic Document (M.E.Doc), which is accounting software used by Ukrainian-based companies. It appears that almost all affected organisations can be linked back to Ukraine either through direct or indirect connections. While only a relatively small number of organisations have been impacted globally, for those affected the impact has been severe.

News Microsoft June 2017 patches for older platforms

Jun 15, 2017 - Latest Microsoft security updates address multiple critical vulnerabilities in Windows operating systems

Ransomware campaign impacting organisations globally

May 13, 2017 - Key points The ACSC is aware of a large-scale ransomware campaign impacting many organisations globally, including the UK's National Health Service. The campaign has various names including 'WannaCry', 'WanaCryt0r', 'WanaCrypt', 'WanaDecryptor', 'WanaCry' or 'Wana'.

Global targeting of enterprises via managed service providers

Apr 4, 2017 - Key points Managed Service Providers have been targeted in a global cyber campaign since at least mid-2016. This includes some companies that also operate in Australia.