Cybersecurity remains a big problem for industry – UNSW discovers why
THE RECENT MyDeal incident is the third major cybersecurity ‘fail’ affecting Australians. University of NSW (UNSW) digital experts are calling for Australian business to restore public confidence in Australia’s cyber capabilities – fast and effectively.
In the past three weeks, three cyber attacks resulted in identity leaks that have sent ripples around the nation and raised the concerns of UNSW Institute for Cybersecurity (IFCYBER) chief scientist and professor, Sanjay Jha.
“Has the triple-A of cyber security (authentication, authorisation and accounting) failed?” he asked.
In the recent MyDeal.com.au incident, early reports suggested that a compromised credential, most likely related to elevated users, was used to access a database storing user information. The attack led to the scrambling of 2.2 million customers’ data, which included email addresses, full names, phone numbers, delivery addresses and some customers’ birthdates.
In an interview with Channel 9 News, Professor Jha said, “… the breach raises serious concerns for the end user's confidence in using online services and poses a serious challenge for the industry”.
“Compromised credentials should not provide easy access to malicious actors when multi-factor authentication (MFA) is in place,” he said.
“You would expect more stringent authorisation and access control and network partitioning to protect these critical assets.”
SAFELY NAVIGATING THE DIGITAL WORLD
Following basic practices on Cyber Security Guidelines listed by the Australian Cyber Security Centre can help a business to protect its systems from cyber threats.
Arash Shaghaghi, a senior lecturer in cybersecurity from the UNSW School of Computer Science and Engineering and UNSW Institute for Cybersecurity, said it was evident from the recent attacks that some industries were not adopting the latest research on cybersecurity fast enough.
“Users’ data is collected by various services without any control from the end user, and often the data collection to join these services is excessive – leaving end users vulnerable and with limited options when a serious breach occurs,” Dr Shaghaghi said.
“Other parts of the world are investing heavily in technological measures such as self-sovereign identity (SSI), where users would have better control over who had access to what part of user identity and other information.
“SSI gives individuals control over the information they use to prove who they are to websites, services and applications across the web,” Dr Shaghaghi said.
“We need to enhance investment in practical research and think of measures that facilitate the adoption of the latest technologies to reinforce our resiliency against the growing number of attacks targeting Australia.”
THE OPTUS CASE
Last month, 10 million Optus customers experienced a similar fate when cyber criminals hacked into the system, stealing personal details such as passport ID and driver licence numbers. It was reported in the media that the breach suggested an open port without authentication, for testing purposes, was left in the production version.
Unfortunately, these problems are well-known to the industry, Prof. Jha said.
“About five years ago, we were white boxing early versions of Philip Hue bulbs and Phillip Hue Bridge. We found that you could control these devices through such open ports,” he said.
“This was reported to the company who fixed the problem in their future version. A simple penetration testing of servers before deployment could have potentially made such attacks difficult, if not impossible.”
Prof. Jha is also concerned about the state of risk assessment and authorisation processes across the industry and said further stringent penalties for negligence would go a long way.
Often these processes were a box-ticking exercise in an Excel spreadsheet, and many conducting these tasks do not have adequate background in cybersecurity, he said.
“This re-emphasises the need for quality education along with more research in quality tools to improve these processes,” Prof. Jha said.
“My team is working on such tools for a Distributed Energy Resource Management Security project at UNSW funded by Cyber Security Cooperative Research Centre.
“Cyber security is a cat-and-mouse game. Researchers and industry experts need to come together in Australia and work closely to build stronger and more resilient capabilities that help safeguard businesses and users in today’s world of cyber war and cyber terrorism.
"We need to regain the community's confidence in our cyber capabilities.”