Feeds

More on the ‘NBN hack’ that wasn’t

The Au Fed Police press conference, response from Platform Networks

  • alert
  • submit to reddit

Seven Steps to Software Security

More details have emerged on the “NBN hacker” story, in which a 25-year-old truck driver using the handle “Evil” penetrated a company called Platform Networks.

The association with the National Broadband Network was both tenuous and irresistible. Even though Platform isn’t yet offering services, and although the attack took place last year, its status as an NBN service provider put that link in the lead of every story.

Since we published the story earlier today (Wednesday, July 27), Platform Networks has got in touch with further information. CEO David Hooton told The Register: “In December 2010 during routine systems and network monitoring, Platform Networks became aware of unlawful traffic transiting our network. We commenced a six-month investigation, collecting information and actively monitoring traffic which led us to believe that there was malicious traffic transiting our network which was of a nature that threatened national infrastructure.

“As soon as this became obvious, Platform Networks immediately started working with the Australian Federal Police (AFP) High Tech Crimes Commission, providing them with a rare insight into this unlawful activity as it was happening.”

In a press conference broadcast on ABC News 24, the AFP’s Brad Martin associated the “national infrastructure” implications of the attack as being related to Platform’s domain and Web services, saying: “Web hosting or domain registrars … may have 150,000 or 200,000 downstream companies”.

The potential for that many companies – or even individuals – to lose access to Internet services is what elevates such services to “national infrastructure” status, he explained, not the association between Platform Networks and the NBN.

In fact, he said, this attack “would not have had a direct impact on the NBN”.

Martin backed up Platform’s account of its response to the attack, saying that when it became aware of the intrusion, it created offline, off-site backups of all systems to minimize the impact of any attack.

The AFP’s Grant Edwards said the accused first came to the agency’s notice not through the attack on Platform Networks, but after the Website of Sydney University was defaced in January. This, along with a tip-off to the National Security Hotline, led the AFP to monitor the individual now arrested.

“In May and June, we identified a number of companies hacked by this individual,” he told the press conference.

One of the 49 charges the man faces, unauthorised modification of data, carries a maximum penalty of ten years in prison, while the remaining 48 are for unauthorised access to data, which is punishable by two years in prison.

Even though the NBN angle is somewhat less than it seemed, the opposition’s communications spokesperson Malcolm Turnbull has told ABC News: “This is a very serious wakeup call for the National Broadband Network and the government. There is a risk of security breaches being able to pervade the whole network.” ®

Mobile application security vulnerability report

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
BMW's ConnectedDrive falls over, bosses blame upgrade snafu
Traffic flows up 20% as motorway middle lanes miraculously unclog
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.