back to article Mystery hack pwns Australian government

Parliamentary computers of the Australian prime minister, Julia Gillard, and other ministers may have been hacked, according to Australian media reports. Details of the reported hack are more than a little vague. Sydney's Daily Telegraph reported that US intelligence tipped local authorities off over a suspected breach, which …


This topic is closed for new posts.
  1. Anonymous Coward

    email cache circulating on Tor

    > It's likely the US authorities came across the leak after spotting the email cache circulating on the Tor anonymizer network ..

    Do you have a link to this cache and what ever you do don't mention Windows ... :)

    1. Baskitcaise

      what ever you do don't mention Windows ... :)

      I think you got away with it.

    2. K. Adams
      Black Helicopters

      Re: email cache circulating on Tor

      I'm sure the ACMA will be along Real Soon Now to draft legislation targeting Tor and other privacy protection services...

  2. Anonymous Coward

    Didn't the Oz govt get warned

    by Anonymous - maybe its not the Chinese after all

    1. Anonymous Coward

      Won't be surprised if it is

      Given Anonymous' stand on censorship and how it turned out that the new information minister is for censorship, it's just inevitable.

      Please think of the children? What ever happened to parental guidance?

  3. Captain TickTock

    Chuck another pwn on the barbie, love.

    ...mine's the Dryzabone.

  4. Mark Simon

    IE again?

    I have trained many people from various government departments, am commonly informed that they are still locked into IE, and all too often IE6, which says all you need to know about their knowledge of and attitude to IT security.

    Why can I never find rancid milk when I need it?

  5. umacf24

    Why Parliament?

    BHP and RTZ wouldn't have to work very hard at security to be a lot tighter than a parliamentary network. Legislatures are like partnerships -- they have hundreds of "chief executives" -- and without a hierarchy, it's difficult to enforce much in the way of policy on builds or network activity.

    So whoever did this probably just found an easy target.

  6. Graham Bartlett

    Burning the Midnight Oil

    How can we stand while our data's churning

    How can we sleep while our login's burning


  7. Anonymous Coward

    Pah, hacked my arse....'s the dirty little buggers surfing dodgy websites to err test, yes test the great Firewall of Oz. They clearly need to install "Codecs" to play the video, just to make sure it wasn't porn. Twice.

  8. The Morgan Doctrine

    China: "The usual suspects"

    No longer a whispered scenario, China is now the first guess in any hacking story. My advice to China is clean up your act, before a licensed and bonded cyber privateer cleans it up for you. Because they'll clean out a few bank accounts along the way.

  9. Anonymous Coward
    Big Brother

    Corporate masters own the politicians

    "If you were after intelligence on mining operations it would make more sense to hack into the systems of mining firms than those of politicians."

    If Australian politicians are as beholden to their corporate masters as U.S. politicians are (up to their ears in corruption, some of the U.S. ones are), the Australian politicians could be being paid off by the mining companies to pass laws favorable to mining.

    So hackers might very well find tantalizing info about mining, by hacking into political systems.

    On the other hand, maybe Australian politicians have a higher level of professionalism and maybe they can't be bought as easily as some American politicians can.

This topic is closed for new posts.

Biting the hand that feeds IT © 1998–2019