Cybersecurity1 hr ago

NSW Government Confirms Treasury Data Breach, Police Recover Alleged Stolen Files

NSW declares major cyber incident after Treasury employee data transfer; police recover alleged stolen files, report no external compromise.

Peter Olaleru/3 min/NG

Cybersecurity Editor

TweetLinkedIn
NSW Government Confirms Treasury Data Breach, Police Recover Alleged Stolen Files
Source: My PersonaltrainerOriginal source

TL;DR The NSW Government declared a significant cyber incident after detecting an alleged data transfer involving a Treasury staff member; police have since recovered the purportedly stolen data and report no external system compromise.

Context NSW Treasury reported the matter to NSW Police on Sunday after internal monitoring flagged a suspicious transfer of a large cache of documents to an external server. The files reportedly contain confidential commercial and financial information from multiple state departments and projects. Police launched an investigation under Strike Force Civic, leading to overnight charges.

Key Facts The alleged breach was discovered through the Treasury’s internal security monitoring, which detected the unauthorized external transfer. Police believe all alleged stolen data has been located, secured, and that there was no external compromise to the agency’s systems. The NSW Treasurer thanked NSW Police and Cyber Security NSW for their actions since Sunday. No impact to any NSW Government service has been reported.

What It Means The incident highlights the risk of insider‑threat vectors, even when no external breach is confirmed. While the data appears recovered, the event underscores the need for robust monitoring of data exfiltration attempts and rapid incident response coordination across agencies.

Mitigations Organizations should review and enforce least‑privilege access controls, monitor for unusual data transfers using tools that flag large or atypical outbound traffic, and ensure endpoint detection and response (EDR) solutions are tuned to detect credential misuse. Apply the latest patches for known vulnerabilities (e.g., CVE‑2023‑XXXX) and test alerts against MITRE ATT&CK technique T1041 (Exfiltration Over Command and Control Channel). Conduct regular insider‑threat awareness training and validate data‑loss‑prevention (DLP) policies.

Watch for any further updates from NSW Police on the investigation’s progress and potential policy changes to the state’s cyber security plan.

TweetLinkedIn

More in this thread

Reader notes

Loading comments...