Cybersecurity1 hr ago

NSW Government Declares Cyber Incident After Alleged Treasury Data Exfiltration

NSW Government confirms a cyber incident after detecting an alleged external transfer of Treasury files; police say data recovered, no external breach.

Peter Olaleru/3 min/NG

Cybersecurity Editor

TweetLinkedIn
Logo des Unternehmens LBS Immobilien GmbH NordWest

Logo des Unternehmens LBS Immobilien GmbH NordWest

Source: KleinanzeigenOriginal source

TL;DR: The NSW Government declared a significant cyber incident after detecting an alleged external transfer of Treasury files; police say all data has been recovered and no external breach occurred.

Context: NSW Treasury notified police on Sunday after internal security monitoring flagged a large outbound transfer of confidential commercial and financial documents. The files spanned multiple NSW Government departments and projects. The matter was handed to Strike Force Civic, which laid criminal charges overnight.

Key Facts: Security teams observed a suspected external transfer of a substantial cache of data. Police confirmed the investigation is ongoing but believe all alleged stolen data has been located, secured, and that there was no external compromise of the agency’s systems. The NSW Chief Cyber Security Officer is coordinating a whole‑of‑agency response under the state cyber security plan, and the government states there is currently no impact to any public service.

What It Means: The incident highlights the risk of insider‑threat data exfiltration, where legitimate credentials are used to move sensitive information outward. Defenders should watch for anomalies such as unusually large file transfers, access outside normal hours, or use of uncommon protocols—behaviors mapped to MITRE ATT&CK techniques T1041 (Exfiltration Over Command and Control Channel) and T1048 (Exfiltration Over Alternative Protocol). While no external breach was confirmed, the event underscores the need for robust monitoring and rapid response.

Mitigations / What Defenders Should Do: Enforce least‑privilege access and review privileged account usage regularly. Deploy data loss prevention (DLP) controls to detect and block large outbound transfers. Enable multi‑factor authentication on all administrative and sensitive accounts. Monitor network traffic for exfiltration signatures, including unusual DNS or HTTP requests, and correlate with user behavior analytics. Ensure patching of known vulnerabilities per ACSC’s Essential Eight and maintain up‑to‑date incident response playbooks.

What to watch next: The outcome of the police investigation, any formal charges, and updates from Cyber Security NSW on lessons learned and potential policy changes.

TweetLinkedIn

More in this thread

Reader notes

Loading comments...