(844) 627-8267 | Info@NationalCyberSecurity
(844) 627-8267 | Info@NationalCyberSecurity

auDA now admits attack, says ransomware group provided proof | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware

The au Domain Administration, the organisation that administers the Australian domain namespace, now says attackers who claimed they had breached its network have provided evidence of the breach.

auDA had initially said it had found no evidence of the breach that was notified to it on Friday afternoon.

In a statement on Sunday, auDA said: “Today, the cyber criminal has provided evidence of a small sample of data they say is in their possession. It includes screenshots of a file list from a computer.

“Our investigation remains ongoing, including to verify the cyber criminal’s claims and the provenance of this data. We will provide an update when further information is available.”

As iTWire reported on Saturday, a ransomware group named NoEscape claimed on its website on the dark web on 11 August that it had breached auDA’s site, adding that it had pilfered more than 15GB of data.

In an update to the initial notice, the group said: “…if you do not contact us, the first step will be to sell access to bank accounts with balances over $4k.

“For the bad behaviour of the company, we reduce the time on the timer from 8 to 3 days.”

That timer is now down to a shade more than two days.

NoEscape has released four screenshots on its site, two of which appear to be listings of some of auDA’s clients.

auDA said it took claims about breaches “extremely seriously”.

“auDA worked quickly to notify the Australian Cyber Security Centre, the Department of Home Affairs and the Office of the Australian Information Commissioner and began work with industry experts to investigate the claim,” it added.

The ransomware group claims the documents it has stolen during the breach include “powers of attorney and legal documents with seals, passports, personal data, medical reports, loan repayment, dismissal documents, declarations, death certificates, access to customer bank accounts (name pw bsb acc nmbr…), taxes, projects, and much more confidential information”.


You probably know that we are big believers in Network Detection and Response (NDR).

Did you realise that Gartner also recommends that security teams prioritise NDR solutions to enhance their detection and response?

Picking the right NDR for your team and process can sometimes be the biggest challenge.

If you want to try out a Network Detection and Response tool, why not start with the best?

Vectra Network Detection and Response is the industry’s most advanced AI-driven attack defence for identifying and stopping malicious tactics in your network without noise or the need for decryption.

Download the 2022 Gartner Market Guide for Network Detection and Response (NDR) for recommendations on how Network Detection and Response solutions can expand deeper into existing on-premises networks, and new cloud environments.



It’s all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://itwire.com/itwire-update.html and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.



Click Here For The Original Source.

National Cyber Security