National Cyber Security Coordinator’s Post

Yesterday afternoon I was advised by a commercial health information organisation that it was the victim of a large-scale ransomware data breach incident. I am working with agencies across the Australian Government, states and territories to coordinate a whole-of-government response to this incident. The Australian Signals Directorate Australian Cyber Security Centre is aware of the incident and the Australian Federal Police is investigating. We are in the very preliminary stages of our response and there is limited detail to share at this stage, but I will continue to provide updates as we progress while working closely with the affected commercial organisation to address the impacts caused by the incident.

  • No alternative text description for this image
Nigel Bourn

Principal Consultant at Iocane

3mo

What is the point of this "update" when there is no information of any value to be shared? Just sharing the industry vertical means you have already let the malicious actors know you are looking into their activities. What advantage is there to be gained by not disclosing the provider apart from protecting the brand of the org involved? Provide usable information, or stay quiet until you can. This post will just fuel conjecture for the next news cycle and helps nobody, let alone the citizens who will be left (again) to clean up another corporate mess where controls are clearly absent.

Peter Bridgeman

Senior Systems Engineer | Azure | HM Armed Forces Veteran | Submariner

3mo

And yet the government still believes Digital ID is the way forward for Australia, what happens when those systems are breached and citizens data is stolen?

Michael Plis

Follow me for AI, IT, Cybersecurity, Innovation | Founder @ Cyberkite | Innovator | Educator | Neurodivergent | Trekkie | Linkedin Top Voice

3mo

MediSecure is the organisation affected for transparencys sake. To check if you used it try searching in your mailbox for: medisecure They use to dispense digital scripts for GP. MediSecure statement: Cyber security incident/data breach MediSecure has identified a cyber security incident impacting the personal and health information of individuals. We have taken immediate steps to mitigate any potential impact on our systems. While we continue to gather more information, early indicators suggest the incident originated from one of our third-party vendors. MediSecure takes its legal and ethical obligations seriously and appreciate this information will be of concern. MediSecure is actively assisting the Australian Digital Health Agency and the National Cyber Security Coordinator to manage the impacts of the incident. MediSecure has also notified the Office of the Australian Information Commissioner and other key regulators. MediSecure understands the importance of transparency and will provide further updates via our website as soon as more information becomes available. We appreciate your patience and understanding during this time. 16 May 2024 https://www.medisecure.com.au/

Bruno Soares Correa

Tech Troubleshooter, Network & Sys Admin who also loves Cybersec: Keeping Systems Safe, One Byte at a Time!

3mo

Can you please take a look at the SSL issue with bom.gov.au website? It's been months already.

  • No alternative text description for this image

Can we know which healthcare provider

David Gizowski

Security Architect - CISSP, CCSP, AWS-GCP

3mo

You would have to assume the data was exfiltrated as collateral if the ransom is not paid. What are the odds of "we promise to delete the data we stole if you pay"? As best practice, security controls should be designed to protect the data if even compromised, backups held in another cloud, and so on... SaaS providers may or may not encrypt your data with a CMEK of your choosing, is your data in a shared instance vs a dedicated instance? With a bit of effort and upfront design, modern cloud platforms make this possible. Cost more?... sure. Cost of a breach?... what is your company worth. I believe it goes a bit deeper that spending a few million more on security (of course I would be happen to earn some of that) - it's an attitude from the top down, bottom up and side to side. Asking questions like who is the new person in the office, who is this "unverified user" in my teams meeting lobby become the norm. That one question could be difference.

Jason W.

Technology, Telecommunications, Accommodation, Mentoring.

3mo

It's very disappointing to hear time and time again of large business who are not investing enough into Cyber Secuity.

The value of a cyber risk assessment can never be overstated: it is critical to know your gaps and protect your business assets, before the breach, and to have that incident response plan in place. Very sad to hear of another ransomware victim. #cybershields #stopransomware

Carole Champion

Business Development Manager | Cyber Security Advisor, Presenter and Founder of Human Element IT

3mo

The only suitable emoji to choose here is ‘care’ Protect the individuals affected and the organisation that is now unravelling what happened and how.

Joanne Cooper

CEO - Founder World Data Exchange & ID Exchange | Digi.me App | OWI Top 100 Digital ID Influencer l Emerging secure Patient Centric data sharing platform | Data Intermediary | Disruptor - Global

3mo

Another day, another breach. Time to move to privacy and security by design models.

See more comments

To view or add a comment, sign in

Explore topics