Thursday, February 25, 2021
  • Setup menu at Appearance » Menus and assign menu to Top Bar Navigation
Advertisement
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
No Result
View All Result
Home Internet Security

ASD teamed up with GCHQ for stolen credit card crackdown

March 10, 2020
in Internet Security
ASD teamed up with GCHQ for stolen credit card crackdown
586
SHARES
3.3k
VIEWS
Share on FacebookShare on Twitter

The Australian Signals Directorate (ASD) and the UK Government Communications Headquarters (GCHQ) were involved in an operation to crack down on stolen credit card numbers.

Contained in an opening statement that was accepted into Hansard rather than read out by newly installed director-general of ASD, Rachel Noble, on Wednesday evening last week, ASD said the operation was undertaken with powers it gained in July 2018 to prevent overseas cybercrime.

You might also like

More than 6,700 VMware servers exposed online and vulnerable to major new bug

Google funds Linux kernel developers to work exclusively on security

Want to pass on your old PCs to good causes? Here’s how to do it while staying secure

“ASD, in collaboration with our UK counterpart GCHQ, identified over 200,000 stolen credit cards globally, including over 11,000 stolen Australian cards. These stolen credit cards represent potential losses of over AU$90 million globally, and over AU$7.5 million domestically,” Noble said.

“This case also demonstrates how our intelligence actions offshore, can directly impact online safety and security here at home.”

Noble said it was an example of criminals selling credit card details on the dark web.

“That’s an example where we have used our powers to look into the dark web to understand the nature of activity by criminals,” she said.

See also: Australian cyber spooks hacked Islamic State comms before major battle

“We are working with the private sector — in this case, Visa and Mastercard — to start to prevent that criminality by helping them work through the cancellation of those cards and the management of their customers.”

In its annual report released in October, GCHQ said it had undertaken Operation Haulster, which “automatically flagged fraudulent intention against more than one million stolen credit cards”.

Noble noted that GCHQ has powers to prevent cybercrime onshore, whereas ASD does not. However, an exchange with Senator Jacqui Lambie revealed ASD had used its powers domestically.

“ASD is prohibited via legislation from producing intelligence on Australian persons except in rare circumstances. Have any of those rare circumstances occurred in the last 12 months?” Lambie asked.

“Yes,” replied Noble, who added that to give an example would involve classified material.

The opening statement also said Toll Group had called in the Australian Cyber Security Centre (ACSC) following an infestation of Mailto ransomware that saw the logistics giant fall back to manual processes.

“Our assistance has included providing technical experts to identify the nature and extent of the compromise, and provide Toll with tailored mitigation advice,” Noble said.

ACSC has used its Cyber Incident Management Arrangements (CIMA), which handles co-ordination between governments in Australia during “national cyber incidents”, twice since July 2019, with one instance being when Emotet malware re-emerged.

“The ACSC coordinates CIMA activations through its role on the National Cyber Security Committee,” Noble’s statement said.

“Partnership with our state and territory counterparts is essential to the successful detection and response to multi-jurisdictional cybersecurity incidents.”

In testimony from last Wednesday, Noble revealed that a Citrix vulnerability announced over Christmas could have been used by malicious actors to access a database of Australian Defence recruitment details.

“On the 24th of January … through sensitive other sources, had a concern that the Department of Defence and its contractor running the DFRN [Defence Force Recruiting Network] may have been vulnerable to a malicious act as a result of the Citrix issue,” Noble said.

ASD believed no data was compromised, but it did see attempts to access the network related to the vulnerability.

“Given the global nature of the vulnerability which affected companies worldwide, I don’t think they would have been the only one,” Noble said.

Related Coverage

Aussie Parliament’s sad cyber espionage saga is a salient lesson for others

Australia’s Parliament downplayed a leaked report saying its cybersecurity was ‘at a low level of maturity’, claiming it’s OK now. But parliaments and politicians are high-value cyber espionage targets.

Australia’s surveillance laws are hitting the social license problem

Can lawmakers continue to ignore the well-founded criticisms of the ever-increasing powers given to law enforcement and intelligence agencies? Can agencies continue to be so secretive?

Watchdog ponders tougher independent oversight for Australia’s encryption laws

There’s no sign of mass surveillance, but the Independent National Security Legislation Monitor suggests a UK-style ‘double lock’ system for authorising access to encrypted communications.

Home Affairs report reveals deeper problems with Australia’s encryption laws

The first seven months of Australia’s controversial encryption laws didn’t see an explosion of decryptions. Worry instead about the cops bypassing judges to get their interception warrants approved.

Cops are getting full URLs under Australia’s data retention scheme

There is content on the envelope. A Senate committee has been told that law enforcement agencies sometimes get full URLs from telcos, despite government reassurances.

Credit: Zdnet

Previous Post

Prof-Bot: The autonomous chemistry professor

Next Post

AllSaints tackles malicious bots with Netacea machine learning tech

Related Posts

More than 6,700 VMware servers exposed online and vulnerable to major new bug
Internet Security

More than 6,700 VMware servers exposed online and vulnerable to major new bug

February 25, 2021
Google funds Linux kernel developers to work exclusively on security
Internet Security

Google funds Linux kernel developers to work exclusively on security

February 25, 2021
Want to pass on your old PCs to good causes? Here’s how to do it while staying secure
Internet Security

Want to pass on your old PCs to good causes? Here’s how to do it while staying secure

February 24, 2021
Red Hat closes StackRox Kubernetes security acquisition
Internet Security

Red Hat closes StackRox Kubernetes security acquisition

February 24, 2021
COVID pandemic causes spike in cyberattacks against hospitals, medical companies
Internet Security

COVID pandemic causes spike in cyberattacks against hospitals, medical companies

February 24, 2021
Next Post
AllSaints tackles malicious bots with Netacea machine learning tech

AllSaints tackles malicious bots with Netacea machine learning tech

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

January 6, 2019
Microsoft, Google Use Artificial Intelligence to Fight Hackers

Microsoft, Google Use Artificial Intelligence to Fight Hackers

January 6, 2019

Categories

  • Artificial Intelligence
  • Big Data
  • Blockchain
  • Crypto News
  • Data Science
  • Digital Marketing
  • Internet Privacy
  • Internet Security
  • Learn to Code
  • Machine Learning
  • Marketing Technology
  • Neural Networks
  • Technology Companies

Don't miss it

IBM Reportedly Retreating from Healthcare with Watson 
Artificial Intelligence

IBM Reportedly Retreating from Healthcare with Watson 

February 25, 2021
Using machine learning to identify blood biomarkers for early diagnosis of autism
Machine Learning

Using machine learning to identify blood biomarkers for early diagnosis of autism

February 25, 2021
Label a Dataset with a Few Lines of Code | by Eric Landau | Jan, 2021
Neural Networks

Label a Dataset with a Few Lines of Code | by Eric Landau | Jan, 2021

February 25, 2021
How to Identify and Prioritize Marketing Ideas
Marketing Technology

How to Identify and Prioritize Marketing Ideas

February 25, 2021
More than 6,700 VMware servers exposed online and vulnerable to major new bug
Internet Security

More than 6,700 VMware servers exposed online and vulnerable to major new bug

February 25, 2021
Everything You Need to Know About Evolving Threat of Ransomware
Internet Privacy

Everything You Need to Know About Evolving Threat of Ransomware

February 25, 2021
NikolaNews

NikolaNews.com is an online News Portal which aims to share news about blockchain, AI, Big Data, and Data Privacy and more!

What’s New Here?

  • IBM Reportedly Retreating from Healthcare with Watson  February 25, 2021
  • Using machine learning to identify blood biomarkers for early diagnosis of autism February 25, 2021
  • Label a Dataset with a Few Lines of Code | by Eric Landau | Jan, 2021 February 25, 2021
  • How to Identify and Prioritize Marketing Ideas February 25, 2021

Subscribe to get more!

© 2019 NikolaNews.com - Global Tech Updates

No Result
View All Result
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News

© 2019 NikolaNews.com - Global Tech Updates