How cyber-crime has become organised warfare | Four Corners
Resumo
TLDRThis video provides an in-depth look at the escalating threat of cyber attacks in Australia, particularly focusing on organized criminal syndicates such as Revel, which have targeted major companies like Medibank and latitude Financial. Experts outline how these gangs operate, the psychological and economic impact of their actions, and the strategies that defenders are employing to combat cyber crime. The Australian government is emphasized as taking a proactive role in cybersecurity, urging businesses and individuals to be vigilant and to resist paying ransoms, while highlighting the complex relationship between cybercriminals and Russian intelligence. Overall, the Cyber Security landscape is portrayed as a dangerous, rapidly evolving arena where both private and public entities must adapt to continuously changing threats.
Conclusões
- 🛡️ Cyber attacks occur every seven minutes in Australia.
- 💼 Criminal gangs like Revel operate with a sophisticated structure.
- 💰 Paying ransoms is discouraged as it fuels cyber crime.
- 🔍 The Australian government is increasing efforts to disrupt cyber criminals.
- 📉 Data breaches can have devastating impacts on individuals.
- 🌐 Ukraine's experience provides insight into cyber warfare and its implications.
- 🗂️ Strong data protection measures are essential for organizations.
- 🔎 Cyber crime is a global issue, with ties to Russian hackers.
Linha do tempo
- 00:00:00 - 00:05:00
A massive cyber attack on Latitude Financial has put the personal details of millions of Optus customers at risk, showing the scale and severity of modern cybercrime that operates like a business.
- 00:05:00 - 00:10:00
Australia is facing a wave of cyber attacks, with a significant monetary impact on businesses. The intense stress of these incidents raises concerns for both individuals and corporate entities, whose operations are threatened by organized crime resembling the mob.
- 00:10:00 - 00:15:00
Cyber gangs targeting Australia are organized and operate globally, often from safe havens like Russia, adopting business-like structures that allow them to maximize their efforts and evade capture. Authorities warn that more attacks are anticipated, pushing for a proactive approach to combat these threats.
- 00:15:00 - 00:20:00
Cybersecurity analysts continuously monitor for signs of attacks, identifying threats early and engaging in a cat-and-mouse game against attackers. Australia's cybersecurity reputation is under siege as incidents grow in frequency and sophistication.
- 00:20:00 - 00:25:00
Ransomware and data theft are the primary methods used by cyber extortion gangs, with a notable attack on Medibank highlighting the potential fallout of data breaches and the challenges of negotiating with perpetrators.
- 00:25:00 - 00:30:00
Following the Medibank hack, the team focused on containment and investigation but faced daunting threats from hackers aiming to extort money by releasing sensitive medical data. Victims felt the distress as personal health information became compromised.
- 00:30:00 - 00:35:00
The refusal to pay ransoms can be a stance against future attacks, as hack investigations reveal attackers often operate through complex networks that include affiliated hackers and lesser-known groups manipulating ransomware technologies.
- 00:35:00 - 00:40:00
The internal dynamics of cybercriminal organizations resemble corporate structures, leading to brutal efficiency in operations, where traditional management issues like employee incentives clash with ongoing criminal activity.
- 00:40:00 - 00:45:49
As enforcement strategies evolve, the global rise in ransomware attacks signals an ongoing struggle, with law enforcement targeting the core operations of cyber gangs while aware of their ability to reinvent themselves continually.
Mapa mental
Vídeo de perguntas e respostas
What is the frequency of cyber attacks in Australia?
A cyber attack is reported every seven minutes in Australia.
Who is primarily behind the cyber attacks targeting Australia?
Organized crime groups, particularly those linked to Russian hackers, are primarily responsible for these attacks.
What types of attacks are commonly used by cyber gangs?
Common attacks include ransomware and data theft, often combined with extortion.
What was the impact of the Medibank hack?
The Medibank hack affected 9.7 million current and former customers, leading to public data leaks and significant distress for individuals whose sensitive information was exposed.
What is the Australian government's response to cyber threats?
The government is increasing efforts to disrupt cyber crime and advising businesses not to pay ransoms.
How does the structure of cyber crime groups resemble traditional organized crime?
Cyber crime groups operate with a hierarchy, similar to organized crime syndicates, including roles for management and HR functions.
What lesson does the conflict in Ukraine provide regarding cyber warfare?
The Ukraine conflict has shown how cyber attacks are integrated with traditional warfare, suggesting future conflicts will see deeper ties between cyber and military operations.
What measures should organizations take to secure their data?
Organizations need to assess their data retention policies and implement strong encryption and de-identification protocols.
Why might paying a ransom be discouraged?
Paying ransoms feeds the business model of cyber criminals, encouraging further attacks.
What is the significance of the latitude Financial hack?
The latitude Financial hack was larger than the Medibank breach and reflects the escalating nature of cyber crime in Australia.
Ver mais resumos de vídeos
#315 How to use Voltage Supervisors to protect ESP32, Raspberry Pi, and Batteries
ANCIENT CIVILIZATIONS : Ancient Persia and Arabian Peninsula
How to remember literally anything you learn with ChatGPT
Empires of Ancient Persia explained in 10 minutes ( History of Iran )
How the French Army Compares to the British Army
The DEADLIEST French Export RUSSIA Fears Most
- 00:00:02foreign
- 00:00:08cyber Security Experts scrambling to
- 00:00:10assess the scale of the attack the Cyber
- 00:00:12attack on latitude Financial little
- 00:00:15details of millions of Optus customers
- 00:00:17at risk
- 00:00:19it's organized crime it's a modern day
- 00:00:21version of the mob
- 00:00:23Australia is under attack and the enemy
- 00:00:26is anonymous
- 00:00:29with all of these attacks they are
- 00:00:32intense they're stressful it's hard not
- 00:00:35to feel anxiety
- 00:00:38we might think it's one guy in a
- 00:00:40basement wearing a hoodie but the
- 00:00:42reality is it is a business operation on
- 00:00:44some counts Global cyber crime is the
- 00:00:47third biggest economy in the world
- 00:00:49every seven minutes a Cyber attack is
- 00:00:52reported in Australia and businesses are
- 00:00:55paying tens of millions of dollars in
- 00:00:58ransoms
- 00:00:59this hurts many people businesses go out
- 00:01:02of business people lose their jobs
- 00:01:04stocks plummet in their value there's a
- 00:01:07lot of damage
- 00:01:09this Four Corners episode cracks open
- 00:01:11the operations of the Cyber gangs
- 00:01:14targeting Australia this structure you
- 00:01:16get scale you look like any other
- 00:01:18software company but you're actually
- 00:01:20just a criminal organization
- 00:01:22I think he's online now so he's come
- 00:01:25back with Australians at the most
- 00:01:27stupidest humans alive and they have a
- 00:01:29lot of money for no reason a lot of
- 00:01:31money and no sense at all
- 00:01:36we go to Ukraine to track them down
- 00:01:40and discover we are battling a common
- 00:01:43enemy so they hit Australia yeah these
- 00:01:46guys Target Australia
- 00:01:50the Australian government warns we must
- 00:01:52all brace for more attacks
- 00:01:57to Cyber attack s can hack back
- 00:02:00and the instruction of the Australian
- 00:02:01government now is you go you Rove the
- 00:02:03world you find these people and you hurt
- 00:02:05them before they can hurt us
- 00:02:21so this is the place where our analysts
- 00:02:24are monitoring the networks of our
- 00:02:26customers for malicious activity that
- 00:02:29suggests that maybe it's the beginning
- 00:02:31of a ransomware attack
- 00:02:32[Music]
- 00:02:33so as you can see we have two detections
- 00:02:36two executions that were allowed and
- 00:02:38five were blocked we'll be doing a
- 00:02:41couple of hundred major incidents a year
- 00:02:48often we'll wake up when there is a high
- 00:02:51severity alert like if there's something
- 00:02:53bad happening you don't want to leave it
- 00:02:55till the next morning to respond to it
- 00:03:00it's a bit of a cat and mouse game
- 00:03:01really
- 00:03:03The Defenders get better
- 00:03:05the cyber crime ecosystem is incredibly
- 00:03:08resilient
- 00:03:10they operate from offshore safe havens
- 00:03:13Russia for example green lights it's
- 00:03:15ransomware and cyber extortion actors
- 00:03:17provided they don't attack Russian
- 00:03:20targets
- 00:03:22as head of intelligence for cyber
- 00:03:24security companies cyber CX Catherine
- 00:03:28manstead understands the inner workings
- 00:03:30of the criminal syndicates causing chaos
- 00:03:33in the lives of Australians
- 00:03:36what we're defending against is cyber
- 00:03:38extortion gangs and they use a range of
- 00:03:40tools to achieve their objectives one of
- 00:03:42those is ransomware so they lock up the
- 00:03:44systems of their victims until those
- 00:03:46victims pay a ransom to unlock the
- 00:03:49systems or or hopefully find another way
- 00:03:51to get themselves back online the other
- 00:03:54thing they're doing and they're doing
- 00:03:55this increasingly is stealing
- 00:03:57information you don't need ransomware
- 00:03:59for that you walk into the system you
- 00:04:01steal information and you threaten to
- 00:04:03make it public unless the victim pays a
- 00:04:06ransom
- 00:04:07in October last year Australia was hit
- 00:04:10by one of the largest data breaches in
- 00:04:13its history
- 00:04:14cyber CX was part of the response
- 00:04:18medibank was part of a string of attacks
- 00:04:22against well-known popular household
- 00:04:25brands in Australia late last year that
- 00:04:28formed something of a wake-up call
- 00:04:30[Music]
- 00:04:37authorities won't reveal details about
- 00:04:39the heck we want to find out who was
- 00:04:42behind it
- 00:04:44I'm on the way to meet a man who is
- 00:04:46working with midibank when the hack was
- 00:04:48first detected John McPherson used to
- 00:04:51work in international security overseas
- 00:04:53he's home now and gets called in for
- 00:04:55major cyber incidents we're hoping to
- 00:04:58find how the first few days after the
- 00:05:00hack unfolded
- 00:05:02foreign
- 00:05:05I received a call quite late at night on
- 00:05:08the 12th of October the night before he
- 00:05:11became public
- 00:05:12it's the first priority was containing
- 00:05:15the attack and making sure that the
- 00:05:16systems were secure after that the the
- 00:05:19very lengthy process of forensic
- 00:05:22investigation and trying to understand
- 00:05:23exactly what had happened what the
- 00:05:25parameters of the attack were began in
- 00:05:27earnest
- 00:05:29how would you describe the mood of the
- 00:05:31team I think with all of these attacks
- 00:05:34they are intense they're stressful it's
- 00:05:38hard not to feel anxiety but you have a
- 00:05:42good plan you execute that plan
- 00:05:45six days after the attack the hacker
- 00:05:47sent an ominous message directly to the
- 00:05:49medibank CEO's phone
- 00:05:52hi as your team is quite shy we decided
- 00:05:55to make the first step in our
- 00:05:57negotiation we found people with very
- 00:06:00interesting diagnoses
- 00:06:04they were threatening to release a
- 00:06:08so-called naughty list which was a list
- 00:06:12of a hundred people
- 00:06:14who had received various forms of highly
- 00:06:19sensitive Medical Treatments so a an
- 00:06:21outright threat of uh releasing the most
- 00:06:26damaging kind of material as a way of
- 00:06:29trying to extort money
- 00:06:33for Claire O'Neill Australia's first
- 00:06:35cyber security minister this was the
- 00:06:38second major breach in as many months
- 00:06:43it's just it is just a low Act of a of a
- 00:06:47sub-human type of person to take
- 00:06:50personal health information the most
- 00:06:52private thing that URI could have and
- 00:06:55try to use that for money it just
- 00:06:57disgusts me and it does tell us that we
- 00:06:59are dealing with a particular type of
- 00:07:01scumbag here
- 00:07:02[Music]
- 00:07:04the hackers doubled down ramping up
- 00:07:06their threats
- 00:07:08in the event of a negative outcome of
- 00:07:10the negotiations for us we will do
- 00:07:13everything in our power to inflict as
- 00:07:15much damage as possible for you both
- 00:07:18financial and reputational
- 00:07:20[Music]
- 00:07:24they want you to panic and then pay
- 00:07:27I think in the medibank case the hakka
- 00:07:31seemed to enjoy the media and the
- 00:07:33notoriety
- 00:07:34[Music]
- 00:07:35they seem to think that the negative
- 00:07:38publicity would be a trigger for
- 00:07:40medibank to pay a ransom when in actual
- 00:07:42fact it's it's quite the opposite
- 00:07:47after almost a month of back and forth
- 00:07:49with the hacker in November medibank
- 00:07:52confirmed that 9.7 million of its
- 00:07:55current and former customers had been
- 00:07:57impacted
- 00:07:59and the hackers quoting Confucius
- 00:08:01published their ultimatum
- 00:08:07they demanded almost 10 million dollars
- 00:08:10or in 24 hours the stolen data would be
- 00:08:14released
- 00:08:15[Music]
- 00:08:17finally medibank made the decision not
- 00:08:20to pay the ransom
- 00:08:22on the 9th of November the so-called
- 00:08:26naughty and nice list of customers
- 00:08:31details were released
- 00:08:34[Music]
- 00:08:35lawyer Andrew Watson was watching the
- 00:08:38drama unfold
- 00:08:40he's led many major class actions and
- 00:08:44knew how large the impact of this breach
- 00:08:46could be
- 00:08:48people have just been devastated by the
- 00:08:53circumstances of what's occurred
- 00:08:58we've had people who have had procedures
- 00:09:02that have involved termination
- 00:09:05who for obvious reasons didn't want that
- 00:09:09public we've had people who
- 00:09:13were the subject to drug and alcohol
- 00:09:16treatment who have been devastated by
- 00:09:18the fact that that might become known
- 00:09:22I think for some medibank customers it
- 00:09:24was obviously TP upsetting I think for
- 00:09:27others it wasn't a material issue
- 00:09:30the important thing is
- 00:09:32medibank's refusal to pay a ransom
- 00:09:35results in keeping Australian companies
- 00:09:38safe from future attacks that makes it
- 00:09:40easier for companies in the future to
- 00:09:43refuse to pay criminals for data that
- 00:09:46they've stolen
- 00:09:50the Australian federal police were in
- 00:09:52charge of investigating the hack
- 00:09:55so you've got no doubt that that
- 00:09:56midibank hack was sourced in Russia
- 00:10:00we've got no doubt that a number of the
- 00:10:02Simon cripples who are involved in that
- 00:10:04attack were based in Russia can you tell
- 00:10:07us anything about the people behind it
- 00:10:09no I can't go into that John given the
- 00:10:12ongoing investigation
- 00:10:15as the crisis deepened inside medibank
- 00:10:19the team was scrutinizing their system
- 00:10:21for any trace of the hacker
- 00:10:24what does a forensic team look for when
- 00:10:26it does its investigation forensic teams
- 00:10:29are sifting through terabytes of data
- 00:10:32and hundreds of millions of lines of
- 00:10:34code
- 00:10:35they're looking for the traces that
- 00:10:37hackers leave in the system so they're
- 00:10:39looking through computer logs they're
- 00:10:42looking for the triggers of malware and
- 00:10:45viruses that they leave behind in
- 00:10:46systems they're looking for traffic that
- 00:10:49leaves an organization and and travels
- 00:10:53overseas
- 00:10:55the way the criminal groups operate
- 00:10:57makes tracking them all the more
- 00:10:58difficult gangs sell access to software
- 00:11:01that harms a network and they control
- 00:11:03Ransom negotiations with the victims but
- 00:11:06it's hackers known as Affiliates that
- 00:11:09make the initial breach
- 00:11:11so an affiliate is a fancy word for
- 00:11:14people who buy into a ransomware or a
- 00:11:18cyber extortion model I guess you could
- 00:11:20say it's a bit like a franchise but
- 00:11:22instead of a business person buying
- 00:11:26access to the McDonald's brand and
- 00:11:29supply chain and Tech Innovation and
- 00:11:32illegitimate cyber criminal buys into a
- 00:11:36ransomware or a cyber extortion model so
- 00:11:38they might rent the malware the
- 00:11:40ransomware they might
- 00:11:42get access to that group's dark web
- 00:11:46resources their portals for leaking
- 00:11:48information and they'll do all of that
- 00:11:51of course for a monetary incentive they
- 00:11:53get to keep a big portion of the ransoms
- 00:11:55that they harvest
- 00:11:56[Music]
- 00:11:58The Gangs each develop their own
- 00:12:00ransomware a type of malicious software
- 00:12:04if there's a trace of that ransomware in
- 00:12:06an attack it can be credited back to the
- 00:12:09Gang
- 00:12:12cyber criminals can use an exploit like
- 00:12:14a lure a fishing lure and you can click
- 00:12:15on that link and then malware's uploaded
- 00:12:19and they sit and they wait and they do
- 00:12:22reconnaissance sometimes up to six
- 00:12:23months on your systems work out what
- 00:12:26your valuable data is to you and how
- 00:12:27they can steal it
- 00:12:30many banks negotiators had been engaging
- 00:12:33with the hacker for weeks
- 00:12:36are you from
- 00:12:38in this case we'd better be anonymous
- 00:12:41just a ransomware group
- 00:12:44the hacker claimed to be affiliated with
- 00:12:46several well-known cider gangs but the
- 00:12:49medibank team was skeptical the hacker
- 00:12:53was not able to give any confidence that
- 00:12:56they were affiliated with a Criminal
- 00:12:58group
- 00:12:59so they were never able to demonstrate
- 00:13:01that they were part of a group who would
- 00:13:04do what they say they were going to do
- 00:13:10ultimately the blog the medibank hacker
- 00:13:13decided to leak the data on offered the
- 00:13:16best lead
- 00:13:19Jeremy Kirk is a cyber analyst and
- 00:13:21agreed to take us through the evidence
- 00:13:26there's several Clues as to who might be
- 00:13:29responsible but nothing is a hundred
- 00:13:30percent and when the MetaBank data the
- 00:13:33personal data started to be released it
- 00:13:35was released on a blog site and this is
- 00:13:38common for ransomware gangs to release
- 00:13:40stolen data on blogs in order to try to
- 00:13:42get the victims to pay this blog had a
- 00:13:45bit of a technical history and had kind
- 00:13:48of a tie to another ransomware gang
- 00:13:50called our evil which was one of the
- 00:13:52largest ransomware gangs so the belief
- 00:13:55is that the people who were responsible
- 00:13:58for the attack against medibank may be
- 00:14:00linked to those people with the our evil
- 00:14:02ransomware gang but again nothing is a
- 00:14:04hundred percent it's just a suspicion so
- 00:14:06who is our evil yeah our evil it stands
- 00:14:09for ransomware evil and it was one of
- 00:14:11the biggest and most successful uh sort
- 00:14:14of ransomware groups it made at least a
- 00:14:16hundred million dollars it was similar
- 00:14:19to other ransomware gangs in that it was
- 00:14:21as a service so other cyber criminals
- 00:14:23could sign up and use the ransomware it
- 00:14:25conducted some of the largest ransomware
- 00:14:27attacks at the time and caused an
- 00:14:30enormous amount of damage to businesses
- 00:14:32and organizations
- 00:14:36Revel sat at the top of that ransomware
- 00:14:40Kingdom for a very long time
- 00:14:42John DiMaggio knows the gang referred to
- 00:14:44as both are evil or Revel very well
- 00:14:49one of the big things that they did and
- 00:14:51that they made famous was the double
- 00:14:53extortion model what rival did was they
- 00:14:55didn't just encrypt their victims data
- 00:14:57but they also stole the data and they
- 00:15:01would post bits of it publicly on their
- 00:15:03website in order to embarrass victims
- 00:15:06and sort of entice them to to pay the
- 00:15:10ransom in 2020 the gang targeted several
- 00:15:13high-profile companies in the United
- 00:15:15States and turned their ransomware on
- 00:15:18celebrities
- 00:15:20Revo went after the new york-based legal
- 00:15:24firm that had strong ties to both
- 00:15:26politicians and the entertainment
- 00:15:28industry as they looked through it they
- 00:15:31started to see very popular names like
- 00:15:33Bruce Springsteen Madonna president
- 00:15:36Donald Trump and there were others as
- 00:15:38well and they began to believe that they
- 00:15:40would be able to get you know people
- 00:15:42like Madonna to pay them this vast
- 00:15:44amount of money and then they jumped to
- 00:15:45the president United States
- 00:15:47it's just amazing they would be that
- 00:15:49dumb to threaten the president of the
- 00:15:50United States but they did they really
- 00:15:52put their target on on their own back
- 00:15:54when they did all of this
- 00:15:56there are a few pivotal incidents in
- 00:15:59mid-2021 when was the attack against
- 00:16:01Colonial pipeline which was the big
- 00:16:03energy provider in the U.S that wasn't
- 00:16:06our evil it was a group called dark side
- 00:16:08but the groups were kind of linked and
- 00:16:10then there were a couple Affiliates for
- 00:16:12our evil that conducted attacks against
- 00:16:14JBS foods which was the large abattoir
- 00:16:17and those incidents really elevated
- 00:16:20ransomware to a national security
- 00:16:21concern particularly in the United
- 00:16:23States
- 00:16:24the ransomware attack they did against
- 00:16:27JBS food that was an example of how they
- 00:16:30could cause disruption that crossed
- 00:16:32borders that caused operational
- 00:16:34disruption of a significant degree and
- 00:16:37the ransom they demanded for that which
- 00:16:40was paid was about 11 million U.S
- 00:16:44John DiMaggio was monitoring Revel every
- 00:16:47step of the way
- 00:16:48once I gained access to the crime forums
- 00:16:51now they were there every day and I
- 00:16:53could see the conversations they were
- 00:16:54having with other criminals and even
- 00:16:56participate in conversations
- 00:16:59he even applied to join the gang posing
- 00:17:02as a hacker we got pretty far in the
- 00:17:04interview but what they did at the end
- 00:17:06caught me off guard they asked me about
- 00:17:08Russian folklore and they asked things
- 00:17:11that I believe that they thought only a
- 00:17:14true native Russian would know and you
- 00:17:16know we weren't able to Google anything
- 00:17:18quick enough to figure it out and that
- 00:17:20was the end of our interview
- 00:17:22it's organized crime it's an organized
- 00:17:24group of cyber criminals that work
- 00:17:26together and share money and it's a
- 00:17:28modern day version of the mob
- 00:17:33so this is the way that ransomware gangs
- 00:17:36are often structured there's a boss kind
- 00:17:37of at the top or maybe a couple
- 00:17:39different bosses there's kind of a layer
- 00:17:40of middle management and those middle
- 00:17:42managers then interface with the people
- 00:17:43who actually do a lot of the work
- 00:17:45there's an HR function which is
- 00:17:47responsible for recruiting other cyber
- 00:17:49criminals and people who want to be a
- 00:17:51part of it there's coders who develop
- 00:17:53the malware which is actually the
- 00:17:55malicious software that's infecting
- 00:17:56computers you'll have an offensive team
- 00:17:58as well so one's a company or
- 00:18:00organization is infected with malware
- 00:18:02they'll take over and go into that
- 00:18:04organization figure out where their
- 00:18:06sensitive assets and data are in order
- 00:18:08to steal that data and then also encrypt
- 00:18:10it and then finally after that has
- 00:18:12happened they usually send an extortion
- 00:18:14note to a company which is where the
- 00:18:16negotiators come in and they're
- 00:18:17responsible for trying to extract as
- 00:18:19much money as possible from the victim
- 00:18:20we've seen over the years that some of
- 00:18:22the big drug gangs the medicine drug
- 00:18:25cartel Etc came up with these sorts of
- 00:18:27corporate structures is this the Cyber
- 00:18:29equivalent of the median drug cartel
- 00:18:31yeah absolutely it's like looking for a
- 00:18:33fish efficiency in any way and that's
- 00:18:35what they've discovered they've been
- 00:18:36able to get scale and efficiency and
- 00:18:38attack more companies and organizations
- 00:18:41than ever before so how do we know this
- 00:18:44is the sort of structure that some of
- 00:18:46these groups are implementing yeah so in
- 00:18:48early 2022 there were tens of thousands
- 00:18:51of chat messages leaked on the internet
- 00:18:53that belonged to a group called The
- 00:18:55Conti ransomware group and it was
- 00:18:58basically their entire Communications
- 00:18:59for two years and so it really just
- 00:19:01opened it up for researchers like okay
- 00:19:03this is what it's like day to day in a
- 00:19:06cyber criminal group
- 00:19:07[Music]
- 00:19:10the leak that cracked open the inner
- 00:19:12workings of the Conti gang was revenge
- 00:19:14for the group's support of Russia's
- 00:19:16invasion of Ukraine
- 00:19:19more than 60 000 internal messages
- 00:19:22reveal in forensic detail Conti's
- 00:19:25negotiation strategies and HR disputes
- 00:19:30they also provided insight into how
- 00:19:32other big cyber gangs like Revel operate
- 00:19:37foreign
- 00:19:37[Music]
- 00:19:39from the manager who says your next
- 00:19:43salary depends on my good mood and
- 00:19:46anybody who doesn't reply within three
- 00:19:48hours of me trying to contact them gets
- 00:19:50a strike against their name two strikes
- 00:19:52and you're out it's pretty ruthless
- 00:19:54organization yeah the managers were
- 00:19:56pretty frustrated with their employees
- 00:19:57and they had high turnover as a result
- 00:19:59too I mean clearly you know the chats
- 00:20:01showed you know management was upset
- 00:20:03with this because they're trying to
- 00:20:05pressurize you know their employees to
- 00:20:07get more productivity out of them it
- 00:20:09just happens to be you know productivity
- 00:20:11motivated by crime here we have another
- 00:20:14one
- 00:20:15this month three people were fine for
- 00:20:17absenteeism and various mistakes that
- 00:20:19led to losses these fines will go to the
- 00:20:22bonus fund for employees of the month
- 00:20:25so this is really strange right like
- 00:20:27these are normal sort of uh things that
- 00:20:29managers would deal with in normal
- 00:20:30companies and here this is a cyber
- 00:20:31criminal organization right that has an
- 00:20:34employee of the month
- 00:20:37chats reveal that Conti's leadership was
- 00:20:40particularly unhappy with their Ransom
- 00:20:42negotiators complaining we bargain like
- 00:20:45school children gangsters don't behave
- 00:20:48like that
- 00:20:51we've got a recording here of a woman
- 00:20:53from Conti ringing up a victim
- 00:20:55pressuring them for money let's listen
- 00:21:02um Luke
- 00:21:03[Music]
- 00:21:05um I'm calling you from Palmdale
- 00:21:08your company right now in negotiation
- 00:21:13regarding data recovery
- 00:21:17I find that chilling this is a woman
- 00:21:19from a crime gang essentially they're
- 00:21:21effectively holding a gun to the head of
- 00:21:23the firm and it sounds like someone's
- 00:21:25ringing to say you haven't paid your
- 00:21:27electricity bill exactly the calling is
- 00:21:29a very aggressive tactic to start
- 00:21:30calling and harassing organizations and
- 00:21:33ransomware gangs do that they they pull
- 00:21:35out all stops to try and you know get
- 00:21:38that organization to pay including kind
- 00:21:40of running a call center
- 00:21:41[Music]
- 00:21:45yeah
- 00:21:46our researcher Jess Longbottom managed
- 00:21:49to contact a hacker who worked with
- 00:21:51several cyber gangs he also claimed he
- 00:21:54was part of Revel
- 00:21:56[Music]
- 00:21:57he agreed to chat with us on the
- 00:21:59encrypted site Telegram
- 00:22:02so we're hoping to chat to him and find
- 00:22:04out a bit more about the group and
- 00:22:06hopefully medibank definitely
- 00:22:09he's online now
- 00:22:13how do you feel when you hack into
- 00:22:20a system
- 00:22:23and he says great it's a feeling of
- 00:22:25being on top of the world like nobody
- 00:22:27can touch you
- 00:22:29he claimed he traveled freely between
- 00:22:31Eastern Europe and the UK and had no
- 00:22:34fear of arrest he said he loved
- 00:22:37targeting American companies let's ask
- 00:22:40him about Australia
- 00:22:48look at this yes let me tell you
- 00:22:50something Australians are the most
- 00:22:52stupidest humans alive
- 00:22:54so pretty strong language there and they
- 00:22:57have a lot of money for no reason a lot
- 00:22:59of money and no sense at all stupidest
- 00:23:01humans alive there's such hostility uh
- 00:23:04from him towards the US and Australia
- 00:23:06yeah it's quite incredible I think we
- 00:23:09should ask him about midibank
- 00:23:11yeah okay
- 00:23:13do you know who's behind the hack
- 00:23:19in the setup for the interview we had
- 00:23:21not mentioned anything about medibank
- 00:23:24so we were surprised he answered our
- 00:23:26questions so quickly
- 00:23:29come back with the the shush the swish
- 00:23:31emoji
- 00:23:36which I wonder I wonder I think that
- 00:23:38relates to blog XX which is the which is
- 00:23:41the blog where the medibank data leak
- 00:23:43was actually published
- 00:23:47we asked if blog xx and revel were the
- 00:23:50same people
- 00:23:54yes however there is some new faces
- 00:23:57wow so he's saying that it's Revel and
- 00:24:00blog XX
- 00:24:01um they're connected it's really
- 00:24:03interesting yeah
- 00:24:04so is it correct that Rebel
- 00:24:09was involved
- 00:24:11in the medibank hack
- 00:24:17ha yes indeed so he's confirming as much
- 00:24:21as we can trust him that rival was
- 00:24:24involved in midibank which is really
- 00:24:26interesting because there's been so much
- 00:24:28speculation that they were exactly that
- 00:24:31to have him saying that really
- 00:24:33contributes towards the picture and
- 00:24:36interesting because lots of people said
- 00:24:37that the attack wasn't sophisticated
- 00:24:39enough to be Rebel so I think we should
- 00:24:42put to him that the medibank hack caused
- 00:24:44distress to millions of Australians and
- 00:24:46see what he says about that
- 00:24:55could not care less is his response wow
- 00:24:58completely without empathy or morality
- 00:25:02yeah exactly so much bravado
- 00:25:05[Music]
- 00:25:06we sent our conversation with the hacker
- 00:25:09to John DiMaggio
- 00:25:11my professional opinion is this sort of
- 00:25:14second raising of Revol that we've seen
- 00:25:16over the past year is not the original
- 00:25:18group they simply have access to the
- 00:25:20infrastructure and to the Rival malware
- 00:25:23in my opinion someone else is using
- 00:25:26their malware today this is for the ones
- 00:25:29that are occurring to evade authorities
- 00:25:32gangs are morphing all the time packers
- 00:25:35come and go but the ransomware they
- 00:25:37develop is still used
- 00:25:39we've seen with some groups once they
- 00:25:42create too much harm and fear they get
- 00:25:44too big for their boots that's when
- 00:25:46they're most likely to attract the
- 00:25:48attention of global law enforcement
- 00:25:49after that those groups have
- 00:25:53metastasized their Affiliates have left
- 00:25:56the big bad Ransom and cyber extortion
- 00:25:59gangs and they've moved on to smaller
- 00:26:01gangs and they're playing their trade
- 00:26:03through smaller lower profile groups so
- 00:26:06the threat has changed it hasn't
- 00:26:09necessarily diminished
- 00:26:13months later the damage of the midibank
- 00:26:16hack is still being uncovered
- 00:26:19effectively every medibank customers
- 00:26:21details were placed on the dark web
- 00:26:23given the sensitivity of the data it
- 00:26:27seems likely that medibank should have
- 00:26:30been looking at a proper encryption
- 00:26:33protocol or a de-identification protocol
- 00:26:36so that the data even if hacked would
- 00:26:40have been useless to the hackers there
- 00:26:42was criticism of medibank storage of
- 00:26:45personal data what's your opinion of
- 00:26:46that
- 00:26:48I think every organization in Australia
- 00:26:50is now rapidly trying to assess how much
- 00:26:53data they hold how secure it is whether
- 00:26:56they need it or not how long they've
- 00:26:58retained it for
- 00:27:00I think it goes back to the question
- 00:27:02that as a nation we've placed too much
- 00:27:04value on collecting data and not enough
- 00:27:06value on how we secure it and whether or
- 00:27:09not we actually need to keep it
- 00:27:14medibank is one of a string of hacks
- 00:27:16that has made cyber crime a key priority
- 00:27:18for the federal government
- 00:27:20hey everyone in Australia a Cyber attack
- 00:27:23is now reported every seven minutes
- 00:27:27for businesses these days cyber security
- 00:27:30is as important as having a lock on the
- 00:27:34door
- 00:27:36increased awareness Rachel Fork is on
- 00:27:38the panel developing the government's
- 00:27:40new cyber security strategy so all of us
- 00:27:43understand one of the options being
- 00:27:45considered is starving The Gangs of
- 00:27:47funds by making the payment of ransoms
- 00:27:50illegal
- 00:27:53The Ransom note the damage has been done
- 00:27:55by that point you're either in pain
- 00:27:57Ransom mode or reputation Salvage mode
- 00:28:00remembering it's a bit like The House
- 00:28:02Always Wins here they always keep a copy
- 00:28:05of your data you can then pay and they
- 00:28:07will not release their data allegedly
- 00:28:09will not release data on the dark web
- 00:28:10for sale but you never know what's going
- 00:28:12to happen happen with the copy of the
- 00:28:13data that's stolen what's your view on a
- 00:28:15company that's been hacked considering
- 00:28:17paying a ransom well obviously it's a
- 00:28:20it's a challenging situation in the
- 00:28:21boardroom absolutely and it will never
- 00:28:23be black and white the Australian
- 00:28:25government's really clear advice is that
- 00:28:27we would ask that Australian companies
- 00:28:28organizations and individuals do not pay
- 00:28:31Ransom because this simply feeds the
- 00:28:33business model of cyber hackers so
- 00:28:35ransomware is one of the biggest cyber
- 00:28:37threats that we face as a country and
- 00:28:39we're not pallets when it comes to cyber
- 00:28:41attacks we can hack back at these people
- 00:28:43and use the same tools that they are
- 00:28:45using to hurt Australians to hurt them
- 00:28:47and the instruction of the Australian
- 00:28:49government now to the Australian signals
- 00:28:51director at the Cyber guns of the
- 00:28:52Australian government and the Australian
- 00:28:54federal police is you go you Rove the
- 00:28:56world you find these people and you hurt
- 00:28:58them before they can hurt us
- 00:29:00[Music]
- 00:29:04it's the AFP cyber command which is now
- 00:29:08tasked with going after or disrupting
- 00:29:10the Cyber gangs
- 00:29:12disruption is about frustrating their
- 00:29:14ability to operate and stopping their
- 00:29:16ability to operate
- 00:29:18while we're at AFP Sydney headquarters
- 00:29:21news breaks of another hack we've heard
- 00:29:24there's been a major cyber incident the
- 00:29:26team's pretty tight-lipped about what's
- 00:29:28happened but what we do know is that a
- 00:29:30loans credit card and insurance company
- 00:29:32has been hacked and more than 200 000
- 00:29:35customer records stolen the team's being
- 00:29:37briefed and are on standby
- 00:29:42Days Later latitude Financial revealed
- 00:29:45the hack was much larger with the data
- 00:29:47of 14 million former and current
- 00:29:49customers stolen
- 00:29:53I think it's now the new Norm we are
- 00:29:57seeing the incidence of ransomware
- 00:29:59attacks becoming more prevalent both in
- 00:30:01terms of the number but also the scale
- 00:30:03the sophistication and the impacts on
- 00:30:06our community
- 00:30:07do you think most Australians understand
- 00:30:09how nasty this new world is no I don't I
- 00:30:12think it's an evolving situation for all
- 00:30:14of us
- 00:30:16increasingly there's been a shift to
- 00:30:19disruption which is a way to get at
- 00:30:22these gangs before they can cause harm
- 00:30:24the FBI and its Global law enforcement
- 00:30:27partners and Australian law enforcement
- 00:30:28are getting better at this we've seen
- 00:30:31the FBI and other Global law enforcement
- 00:30:34Partners seize infrastructure so these
- 00:30:36groups are forced offline we've seen
- 00:30:38them infiltrate groups to get the
- 00:30:40decryption key so that when they engage
- 00:30:42in ransomware global law enforcement can
- 00:30:45come in and help those victims by giving
- 00:30:47them the decryption key rather than
- 00:30:49those victims having to pay a ransom
- 00:30:55it was that Arsenal that the Federal
- 00:30:58Bureau of Investigation used to bring
- 00:31:00down rival after the gang carried out
- 00:31:03one of the largest attacks in history
- 00:31:07when cassia was attacked what happened
- 00:31:09is they had about 1500 Downstream
- 00:31:12customers that rival leveraged their
- 00:31:15software to infect with their ransomware
- 00:31:17so instead of just having one large
- 00:31:19corporation now being held ransom they
- 00:31:21had 1500 companies being held Ransom
- 00:31:25unlike a lot of technology companies can
- 00:31:27say is pretty easy to understand the
- 00:31:30hack affected companies in at least 18
- 00:31:32countries including Australia closing
- 00:31:34down supermarkets in Sweden and
- 00:31:37impacting kindergartens in New Zealand
- 00:31:39and discover how casay can help you
- 00:31:41simplify your systems management tasks
- 00:31:44so this was a really good example of
- 00:31:46rival trying to maximize harm by hitting
- 00:31:49one organization that provided services
- 00:31:51to thousands of others they demanded a
- 00:31:54ransom in that case of 70 million
- 00:31:57dollars
- 00:31:58the attack came only weeks after
- 00:32:01President Biden called on President
- 00:32:03Putin to reign in Russia's cyber
- 00:32:06criminals I did what I came to do
- 00:32:09the US made an arrest and the gang's
- 00:32:12leak site went offline
- 00:32:16then in a surprise move in 2022 Russian
- 00:32:20intelligence rated 14 members of the
- 00:32:23group
- 00:32:24but it wasn't the end of revel's
- 00:32:27ransomware
- 00:32:29the guys that they arrested were all
- 00:32:32very young men they were primarily
- 00:32:34Affiliates they were not the core
- 00:32:35members of the gang they weren't the
- 00:32:37ransomware developers they weren't the
- 00:32:39ones supporting all these operations
- 00:32:41they were simply the people that were
- 00:32:43the hired hackers
- 00:32:45it doesn't stop the attacks they can
- 00:32:47just come back under a new name and
- 00:32:49continue business as usual
- 00:32:53wow I have been providing initial access
- 00:32:56the hecka we spoke to earlier told us
- 00:32:59the 14 members were now out of jail and
- 00:33:03that he was supporting Russia's war
- 00:33:04effort by providing initial access to
- 00:33:07ukrainian-owned infrastructure
- 00:33:11John DiMaggio was not surprised he
- 00:33:13believes that the original masterminds
- 00:33:15behind rival are hacking for Russia they
- 00:33:19are supporting the war in the Ukraine
- 00:33:20think about it even as Affiliates
- 00:33:22they're some of the the best hackers in
- 00:33:23the world so I 100 believe that that is
- 00:33:27what how Russia is utilizing them
- 00:33:28they're helping the Russian intelligence
- 00:33:30Services creating malware uh and
- 00:33:33facilitating attacks against the Ukraine
- 00:33:35to sort of better the mission of Russia
- 00:33:40as the war in Ukraine learned DiMaggio
- 00:33:44says Russia's cyber criminals were given
- 00:33:46an ultimatum hack for your country or
- 00:33:49your assets will be seized and you'll go
- 00:33:51to jail
- 00:33:52[Music]
- 00:33:54we know that these crime gangs have
- 00:33:56always had a pretty cozy relationship
- 00:33:58with Russian intelligence and security
- 00:34:01agencies
- 00:34:03we've seen those leveraged during the
- 00:34:05Russian Ukraine war we've seen in
- 00:34:08particular some groups that have come
- 00:34:11out and said our Allegiance is to Russia
- 00:34:14and we will engage in activities to
- 00:34:16support Russia's cause and to undermine
- 00:34:18Ukraine
- 00:34:27[Music]
- 00:34:29in Ukraine cyber attacks are about more
- 00:34:32than just money
- 00:34:34they're about life and death
- 00:34:40[Music]
- 00:34:52we've come to Kiev to track the Russian
- 00:34:54cyber gangs targeting Australia
- 00:34:57we're on the way to the agency
- 00:34:59responsible for protecting Ukraine
- 00:35:01including against cyber attacks
- 00:35:04Robert Potter co-founder of Australian
- 00:35:07cyber security company internet 2.0 is
- 00:35:10taking us there
- 00:35:12so we're heading up to sbu headquarters
- 00:35:15the sbu is the primary domestic
- 00:35:19Intelligence Agency of Ukraine it's like
- 00:35:22our asio it's equivalent to our Azo or
- 00:35:25MI5
- 00:35:27curity is tight the sbu would be one of
- 00:35:30moscow's top targets we're gonna need to
- 00:35:33switch that off now
- 00:35:37hello hello
- 00:35:38the man we've come to meet is Ilya
- 00:35:41vitiork the country's senior cyber
- 00:35:44intelligence officer that's me
- 00:35:48that's okay
- 00:35:51I'm sure you don't go around handing out
- 00:35:53cards too often yeah in your job
- 00:35:57Australians know about the Invasion the
- 00:35:59physical War but are there now two Wars
- 00:36:02going on they combined cyber attacks
- 00:36:05with psychological information special
- 00:36:07psychological information operations and
- 00:36:10they do combine cyber attacks with
- 00:36:13genetic attacks cyber attacks
- 00:36:15accompanied missile attacks on our
- 00:36:17energy sector since October so they try
- 00:36:21to destroy ID infrastructure of power
- 00:36:24plants and distribution companies
- 00:36:27simultaneously with cyber attacks to
- 00:36:29cause more damage and to make people
- 00:36:33suffer even more what can Australia
- 00:36:36learn from Ukraine's experience with
- 00:36:39Russian hackers no other country in the
- 00:36:42world has faced what Ukraine has faced
- 00:36:46in cyber domain first of all and the
- 00:36:49experience we have how to withstand
- 00:36:53when your enemy is more powerful is
- 00:36:57crucial we've invented and used
- 00:36:59different kinds of algorithm techniques
- 00:37:02tools that have proved their
- 00:37:04effectiveness and we are ready to share
- 00:37:06this knowledge and this experience with
- 00:37:09the world
- 00:37:16in another part of the city internet 2.0
- 00:37:19is working to strengthen Ukraine's cyber
- 00:37:22defense
- 00:37:23the other founder David Robinson has
- 00:37:26just arrived
- 00:37:27[Music]
- 00:37:30it's fascinating
- 00:37:32um
- 00:37:37I mean amazing is we can see the
- 00:37:40international cyber war on our
- 00:37:43dashboards all over the world if the
- 00:37:44Russians for example were attacking one
- 00:37:47of the computer networks we're
- 00:37:48protecting the systems can detect flag
- 00:37:51that Russian cyber attacks using
- 00:37:53algorithms using lots of pieces of
- 00:37:57Technology all in the cyber security
- 00:37:59industry in order to identify flag and
- 00:38:01then view that that threat and then we
- 00:38:04can basically block it
- 00:38:06the team security engineer rafig Jabra
- 00:38:09yilov has already got to work
- 00:38:12here he's monitoring Russian cyber
- 00:38:14attacks
- 00:38:16so when someone in Russia makes an
- 00:38:18attack you can see that here yes in real
- 00:38:21time in real time with the live data we
- 00:38:24can see their iPad dresses we can detect
- 00:38:27their rough estimated locations it's a
- 00:38:30never-ending battle isn't it yes it's
- 00:38:32basically a cyber wall going between
- 00:38:35engineers and attackers so as you said
- 00:38:39it's never ending and as much as they
- 00:38:41are improving their skills we need to do
- 00:38:44it twice three times more to be ahead of
- 00:38:47them
- 00:38:53it is the first
- 00:38:55first war in history
- 00:38:57between two major cyber Powers Russia
- 00:39:00and Ukraine we've never seen this before
- 00:39:03and right from the beginning of the
- 00:39:05conflict cyber has been an ever-present
- 00:39:09dimension of that conflict
- 00:39:12Catherine manstead has analyzed how
- 00:39:14effective Russia's combination of
- 00:39:16traditional and cyber warfare has been
- 00:39:19from the outset Russia has made an
- 00:39:22attempt to coordinate its cyber and its
- 00:39:24conventional effects
- 00:39:25it hasn't always been successful and in
- 00:39:28fact towards the beginning of of the war
- 00:39:30it did better on this perhaps because it
- 00:39:33had more time to plan and coordinate
- 00:39:37on one day in the first week we had a
- 00:39:39missile strike on a broadcasting Tower
- 00:39:43we also had a Cyber attack against a
- 00:39:47Broadcasting Company as well as a
- 00:39:50broader information campaign Russia said
- 00:39:52it was going to disable Ukraine's
- 00:39:54quote-unquote disinformation system it
- 00:39:57was targeting people on social media it
- 00:39:59even was targeting the elderly via phone
- 00:40:02calls all of that was about creating
- 00:40:04chaos
- 00:40:09so Ukraine launched
- 00:40:10it defensive and in October hit the
- 00:40:13Crimea Bridge how did Russia respond to
- 00:40:15that so we enter a new phase in many
- 00:40:18respects in Russia's conventional cyber
- 00:40:21and information war on the conventional
- 00:40:23front it's hitting civilian targets
- 00:40:26again Ukraine's looking into a winter
- 00:40:28and it's going after energy assets I'm
- 00:40:31sending millions of Ukrainian citizens
- 00:40:34into blackout it's also hitting water
- 00:40:37assets and that's mirrored in many
- 00:40:39respects in the Cyber realm what
- 00:40:41implications does this have for the next
- 00:40:43major military conflict
- 00:40:45cyber Defender and every cyber attacker
- 00:40:48around the world will be looking at this
- 00:40:50conflict so closely and they will be
- 00:40:53learning the lessons from Russia Ukraine
- 00:40:57Russia has not always done as well as it
- 00:40:59could have at precisely coordinating
- 00:41:01cyber and kinetic effects in the next
- 00:41:04War I would expect we'll see adaptation
- 00:41:06and an even closer interlinkage between
- 00:41:09those two domains
- 00:41:15when there's a Cyber attack in Ukraine
- 00:41:18the response will come from this room
- 00:41:22it's the nerve center of the country's
- 00:41:24cyber defense and the team reports
- 00:41:27directly to president zelenski yeah so
- 00:41:30this is the threats to Ukraine and
- 00:41:32Europe and you can see the different key
- 00:41:34groups so they're just
- 00:41:36so these are the different sectors that
- 00:41:38have been targeted yet yeah and these
- 00:41:40are the different attack tools that are
- 00:41:42used for instance while looking at the
- 00:41:46list of the different groups attacking
- 00:41:47Ukraine I see Revel
- 00:41:52Revel is the one that hit the medibank
- 00:41:54attack so they hit Australia yeah these
- 00:41:57guys Target Australia
- 00:41:58so the power cuts for a moment not
- 00:42:01uncommon here well the system's rebooted
- 00:42:05the head of Ukraine's cyber security
- 00:42:06Center issues a warning my prediction
- 00:42:10for this year that uh
- 00:42:13it is U.S Australia European Union
- 00:42:17countries who will be targeted more even
- 00:42:21more than Ukraine
- 00:42:23so you think there'll be more attacks on
- 00:42:26countries like Australia
- 00:42:29who support Ukraine because they're not
- 00:42:32getting the results they want in Ukraine
- 00:42:34so they'll move on to other places and
- 00:42:36it will be partly revenge for supporting
- 00:42:38Ukraine yes
- 00:42:47some of those names that came up on
- 00:42:49their board today are names that we're
- 00:42:51familiar with launching attacks on
- 00:42:53Australia what does that say to you it
- 00:42:56shows that we are part of the same
- 00:42:57environment that they're studying the
- 00:42:59same bad guys that we are what they
- 00:43:01really are of Russian organized crime
- 00:43:03groups being protected by the Russian
- 00:43:05government and in some ways becoming
- 00:43:08increasingly ideological uh in their
- 00:43:11support of the Russian government and
- 00:43:13that they that exchange of you give us
- 00:43:15safe haven we'll give you a cut is now
- 00:43:17we will also Target
- 00:43:19the Target the ideological enemies of
- 00:43:22the Russian government
- 00:43:28in recent weeks the big cyber attacks on
- 00:43:32Australia keep on coming Crown Resort
- 00:43:34says it's working with police one of
- 00:43:36Australia's biggest property giants has
- 00:43:38been attacked by cyber criminals a Cyber
- 00:43:40attack on latitude Financial has now
- 00:43:43become the hack of latitude Financial is
- 00:43:46now larger than medibank
- 00:43:48ultimately what we see from these groups
- 00:43:51is they tend to be pretty good at
- 00:43:53outmaneuvering law enforcement
- 00:43:56[Applause]
- 00:43:57thy will Phoenix to avoid pressure so
- 00:44:01when the Heat Is On from Global law
- 00:44:03enforcement they will disband their
- 00:44:05group they'll lie low for a bit and then
- 00:44:07they'll pop up again maybe they'll
- 00:44:09Rebrand for example and we've seen that
- 00:44:10over and over again so unfortunately
- 00:44:13it's going to be really hard for us to
- 00:44:17break the business model of cyber
- 00:44:19extortion
- 00:44:25as a nation Australia is bracing to
- 00:44:28fight this ever-changing war against
- 00:44:30enemies Who hide behind screens and know
- 00:44:33neither boundaries nor morals
- 00:44:38what's at stake is everything when you
- 00:44:41think about the life that we live online
- 00:44:43at the moment consider what things will
- 00:44:45look like in 2030 where our fridge and
- 00:44:48our electricity in our homes and our air
- 00:44:50conditioning and our car everything is
- 00:44:52going to be connected to the internet so
- 00:44:54we are going to have to get a handle on
- 00:44:56this problem well before then
- 00:44:59I want cyber hackers to know that we are
- 00:45:02onto them and that we are watching them
- 00:45:04online and that we will come and hurt
- 00:45:05them if they come anywhere near our
- 00:45:07country
- 00:45:10thank you
- 00:45:14[Music]
- 00:45:25[Applause]
- 00:45:37[Music]
- Cyber Security
- Cyber Crime
- Ransomware
- Australia
- Medibank
- Organized Crime
- Data Breach
- Latitude Financial
- Russian Hackers
- Government Response