What we can learn from the biggest hack in Australian history
What we can learn from the biggest hack in Australian history
October is Cyber Awareness Month, and it couldn't be more appropriate as it's now 27 days since Optus announced to their customers and the public at large that they had suffered a data breach. In the intervening few weeks thousands of words have been written about what happened, who has been affected, who was to blame, and what we should do about it. And without wanting to go back over old territory I thought it would be worthwhile giving some thoughts now that the dust has settled on what is undoubtably Australia's biggest leak of personal information.
We've been fortunate in our country that to date we haven't suffered a really significant breach. In the industry we know of course of the leaks of personal information from the Red Cross Blood Service (2017), or the PageUp recruitment platform (2018), but these were relatively contained both in terms of numbers as well as the 'usefulness' of the data leaked to an attacker. Probably our best known cyber incident were the Toll Holdings (logistics) ransomware events of 2020 that crippled that company's operations for a period of several weeks, but there wasn't a significant breach of public information there (though internal documents including staff details were released).
Overseas we've had Equifax (2017) and Target (2013) with massive losses of sensitive (primarily financial) information, but for us nothing like Optus for sheer impact on the population. Let's quickly recap the numbers:
What can we learn?
In a world in which security breaches can always occur, data can be a toxic asset.
This isn't me having a go at data scientists that can draw very valuable conclusions and business insights from the vast quantities of data that they correlate and interrogate in their 'lakes', but rather it's the recognition that if data is retained beyond that useful period, it should be purged. If we look at Optus, the retention of ID document details - which it's very, very hard to see a need for - has led to this breach being orders of magnitude more significant that it should have been. The costs to the individuals (in terms of time, effort, anxiety and so on) as well as the company (paying for new documents, reputation) are very high. It's interesting that just a year or so ago Optus, in a submission, argued against having to delete this data on the grounds that it would be too burdensome to have to find it and delete it. That's a thought that hasn't aged well...
I'm sure Optus has a strong security architecture, but in this case it seems that something as simple as a misconfiguration has been their downfall. Remember a few years ago when everyone was losing data because of unsecured Amazon Web S3 buckets? Well, this has the same feel to me. There are two scenarios, and neither covers them in glory:
So a key lesson here is that just buying more security tools isn't going to always protect you. Security teams often seek to put in place layers of protection to lock down assets or networks, but a lack of governance, misconfigurations, or a poor security culture can all contribute to a major cybersecurity incident no matter what you've deployed. I don't have any insights into Optus' security culture, by the way, but I do know of organisations where cultural disconnects between DevOps teams and the security function have led to poor security outcomes. By all means implement the best security tools your company will acquire - but don't ignore the criticality of doing it as part of an overarching governance program and strategy.
Actions
First of all, if you're an Optus customer and you've been told that one or more of your identification documents has been breached, you should seriously consider replacing them. This is because Australia's '100 points of ID' relies heavily on identifiers such as your driver’s license, and so if that information is now known by a criminal they can potentially open a bank account in your name.
Recommended by LinkedIn
Optus announced last Friday that breached password numbers can no longer be used for online authentication purposes. A block on them has been added to the DHS system that provides that service.
In Victoria you can put a block on your driver’s license being used as an identifier which will protect you until you get a new one:
Similarly, if your Medicare card details have been released, then those details can be used as an identifier including on the MyGov portal which controls access to things like health, taxation, and social services.
Secondly, consider signing up with a credit-checking agency such as Equifax or Experian. Why? Because then you can check to see if anyone opens an account in your name, using details from the Optus breach to 'prove' they are you and get a credit card for example. This is a common method of fraud, and while you can usually reclaim your identity it can be time consuming, stressful, and there's no guarantee of success.
Your credit record might be damaged for some time, preventing you from doing other things as trivial as changing electricity providers. You can even put a 'credit ban' on your account yourself which prevents anyone from making a request. Here's an article with some explanations and options:
And what should your company be considering? Well, there's a few things...
And the number one thing: prepare your security incident response plan. How would you have dealt with a breach like Optus? Not just technically, because frankly once the data was gone it was gone. But do you have forensics support to figure out what happened? What about PR support? Legal support? Who will you turn to for help notifying the Privacy Commissioner? Is your cyber insurance in place? Because the way you respond could actually make the difference between being able to regain the trust of your customers and partners, or forever being labelled.
Data breaches are hard: they are both devastating to the diligent and passionate security staff at the organisation, and then baffling, upsetting and infuriating to customers. Every organisation is at risk, but there are things you can do to minimise that risk and prepare for the worst - and it's incumbent on you to do your best.
But remember: security is a team sport so get the help and support you need both internally in your company, externally from partners, and even from Government.
Stay safe.