Australia’s DDoS on the Census


It was reported that Australia’s census was attacked back in August. The Census Bureau reported on Twitter that they were attacked and their site was down from a DDoS attack. They had to take measures to let people know there would be no fines leveraged from folks unable to complete their online census:

australia-census-tweets

The cyber security adviser to the PM said this was imminently predictable. Nobody has said for certain what the motivation was other than it was “hackers” who did this. I’m not sure I would agree that someone having the skill of a hacker these days is required to launch a DDoS attack. We’ve illustrated for many years how easily someone can rent a botnet for as little as $10 an hour to launch sophisticated DDoS attacks.

What would it have looked like had it been launched by hackers with a motivation? If someone wanted to disrupt the census to change the allocation of funds for a city, town or village, could that change the budget for education? We’ve seen a rise in false information filing in the USA with fraud being committed for IRS Tax Return filings. Could this be possible to disrupt or change budgets with false information?

[You might also like: Public Education Around Cyber Security]

What if the attackers were using DDoS as a smoke screen to distract the people managing their site while they actually find vulnerabilities? Could a data loss have happened while they were busy working to restore service? Personal data is key for hackers to exploit other systems for financial gains. How valuable would the census data be for accelerating financial fraud?

DDoS prevention and DDoS mitigation isn’t the only thing that would have been needed in order to have assuredness of data integrity and data confidentiality. Because an IP address is not a valid identifier, how do they know unique users were the ones filing the online forms? Device fingerprinting and anti-bot technologies could have given them greater visibility into the users of the system. From all of the articles published on this, I’ve not seen any methodologies or data that would suggest they have the tools to know whether or not the data integrity is there.

This last weekend in the United States, a city municipality was taken hostage when their light rail system was compromised for ransom. We’ve seen many instances of governments paying this kind of ransom as well as healthcare and other sectors. What if the data was lost from the census or encrypted with malware? Could the next attack on a census result in something similar? What would the implications be if the census data was encrypted for a ransom?

Perhaps the lesson to learn from this is to make sure you know what to ask for in your contracts with your application service providers. Is DDoS protection enough? What about application layer protection and anti-bot technologies?

DDoS_Handbook_glow

Download Radware’s DDoS Handbook to get expert advice, actionable tools and tips to help detect and stop DDoS attacks.

Download Now

David Hobbs

As Director of Security Solutions, David Hobbs is responsible for developing, managing, and increasing the company’s security practice in APAC. Before joining Radware, David was at one of the leading Breach Investigation Firms in the US. David has worked in the Security and Engineering arena for over 20 years and during this time has helped various government agencies and world governments in various cyber security issues across all sectors.

Contact Radware Sales

Our experts will answer your questions, assess your needs, and help you understand which products are best for your business.

Already a Customer?

We’re ready to help, whether you need support, additional services, or answers to your questions about our products and solutions.

Locations
Get Answers Now from KnowledgeBase
Get Free Online Product Training
Engage with Radware Technical Support
Join the Radware Customer Program

CyberPedia

An Online Encyclopedia Of Cyberattack and Cybersecurity Terms

CyberPedia
What is WAF?
What is DDoS?
Bot Detection
ARP Spoofing

Get Social

Connect with experts and join the conversation about Radware technologies.

Blog
Security Research Center