• Advertise
  • About us
  • Terms and Conditions
  • Contact us
Saturday, May 17, 2025
Australian Times News
  • News
    • Weather
    • Sport
    • Technology
    • Business & Finance
      • Currency Zone
    • Lotto Results
      • The Lott
  • Lifestyle
    • Entertainment
    • Horoscopes
    • Health & Wellness
    • Recipes
  • Travel
  • Expat Life
  • Move to Australia
No Result
View All Result
  • News
    • Weather
    • Sport
    • Technology
    • Business & Finance
      • Currency Zone
    • Lotto Results
      • The Lott
  • Lifestyle
    • Entertainment
    • Horoscopes
    • Health & Wellness
    • Recipes
  • Travel
  • Expat Life
  • Move to Australia
No Result
View All Result
Australian Times News
No Result
View All Result
Home News

Holding the news to ransom? What we know so far about the Channel 9 cyber attack

On Sunday afternoon, Channel 9 posted a cryptic tweet indicating it was under attack. The accompanying video acknowledged that the failure to run the Weekend Today show that morning was attributed to a major cyber incident.

The Conversation by The Conversation
30-03-2021 22:15
in News
Photo by Lewis Kang'ethe Ngugi on Unsplash

Photo by Lewis Kang'ethe Ngugi on Unsplash

Paul Haskell-Dowland, Edith Cowan University

On Sunday afternoon, Channel 9 posted a cryptic tweet indicating it was under attack. The accompanying video acknowledged that the failure to run the Weekend Today show that morning was attributed to a major cyber incident.

Reporting also confirmed the situation had affected the network’s ability to “produce its news and current affairs content”.

Emails and editing systems were all impacted by the incident, in what was described as an unprecedented attack against a mainstream media organisation in Australia. In a follow-up article, 9 News described the outage as a “sophisticated and calculated attack” that has “fundamentally disrupted how the network delivers and presents news”.

The disruption was so significant that many Channel 9 staff were instructed to work from home. They were also warned to avoid turning on or restarting computers until the problems were addressed.

Screenshot from Channel 9 news clip
Screenshot from Channel 9 news clip. Channel 9 news clip

As is often the case in the early stages of a major cyber incident, details are scarce, and it’s very hard to know who is behind it.


What happened?

There is no official statement of cause, but it is clear that malware spread between devices at Channel 9’s Sydney headquarters, leaving data and production systems inaccessible.

AlsoRead...

The Predictive Infrastructure: How BOF’s Neuro Finance System Reengineers Market Forecasting

The Predictive Infrastructure: How BOF’s Neuro Finance System Reengineers Market Forecasting

5 May 2025
McGrocer opens direct access to British household brands for shoppers across Australia.

UK Grocery delivery platform McGrocer expands services to Australian Market

2 May 2025

The speed with which the malware spread through system may indicate a concerted effort to misuse Channel 9’s systems. Some experts have pointed to the possibility of fraudulent “IT updates” being sent out to users’ computers to spread the infection. This suggests the attacker(s) may have had prolonged access to Channel 9’s systems before the events on Sunday.

Although live television broadcasts resumed quickly, it is likely that a full recovery behind the scenes will take considerably longer. It could potentially cost significant time and money to fix the existing problems and address the underlying vulnerabilities that allowed the attack to be so effective.

How did it happen?

Ransomware attacks often start with a phishing attack, in which large numbers of emails are sent to staff at an organisation.

These emails often replicate the look of a legitimate message, and can include seemingly privileged information (such as staff names and internal departments) in an attempt to appear genuine.

These emails aim to deceive individuals into clicking on a link or installing a file, perhaps by claiming this is a necessary patch to repair an issue with their computer.

Once installed, ransomware will typically encrypt important files or even entire systems, rendering them inaccessible. The malware will often target common file types such as Word documents, PDFs, spreadsheets or emails.

Screenshot of WannaCry ransom demand.
A ransom demand from the infamous WannaCry malware. Wikimedia

Many cyber-criminals have a financial motive, and will typically ask for a ransom in exchange for releasing the locked-out data. The “key” to unlock the data will usually be transmitted to a remote server and then deleted from the compromised system.


Another possibility is cyber-sabotage by a foreign state actor. In this context, the attack may be meant as a statement, retribution, or have some other political motivation. In such cases, it is probable that the “key” used to encrypt data is discarded on creation, rather than kept as a bargaining chip. This is distinct from financial cyber-extortion, as the intent is to wreak havoc by permanently denying access to the resources (thus this malware is sometimes referred to as “wiperware”).

Who is to blame?

Although it is too early to definitively attribute blame, media reports have pointed to a foreign state actor. This theory is bolstered by Nine’s statement that “ransomware was used but no ransom demanded”.

Previous state-sanctioned attacks have been attributed to a range of countries, including China, Iran and North Korea. But Russia is considered the most likely aggressor in this instance.

It has been alleged that this attack is a retaliation for Channel 9’s screening of an exposé on politically motivated poisonings attributed to the Russian government.

What next?

Addressing these incidents requires a careful approach. Limiting the spread of the malware is crucial — hence the instruction to staff to avoid turning on devices.

It is also important to identify the specific vulnerability that was exploited, to prevent future outbreaks. If data have been deleted (or rendered permanently inaccessible), backups will need to be retrieved.

While the focus at the moment is on restoring access to systems, the company will also need to conduct a forensic examination of the attack, to ensure lessons are learned.

While Australian news outlets have often reported on previous cyber-attacks, this incident is a wake-up call that they are not immune from becoming targets themselves.


Paul Haskell-Dowland, Associate Dean (Computing and Security), Edith Cowan University

This article is republished from The Conversation under a Creative Commons license. Read the original article.

Tags: SB001
DMCA.com Protection Status

SUBSCRIBE to our NEWSLETTER

[mc4wp_form id=”2384248″]

Don't Miss

Biela.dev is quietly becoming the Infrastructure Layer for the Next Internet

by Pauline Torongo
15 May 2025
Biela.dev is quietly becoming the Infrastructure Layer for the Next Internet
Technology

Biela.dev is not merely a consumer app; it is infrastructure. It could be a layer that powers the next generation...

Read more

The Battle for the Premier League’s Fifth Champions League Spot: Who Will Prevail?

by Fazila Olla-Logday
8 May 2025
Premier-Leagues-Fifth-Champions-League-Janosch-Diggelmann-Unsplash
at

As the Premier League season nears its climax, the race for the coveted Champions League places is tighter and more...

Read more

The Predictive Infrastructure: How BOF’s Neuro Finance System Reengineers Market Forecasting

by Pauline Torongo
5 May 2025
The Predictive Infrastructure: How BOF’s Neuro Finance System Reengineers Market Forecasting
Business & Finance

As global markets become more complex and volatile, BOF Investments has developed Neuro Finance, a predictive system that combines machine...

Read more

UK Grocery delivery platform McGrocer expands services to Australian Market

by Pauline Torongo
2 May 2025
McGrocer opens direct access to British household brands for shoppers across Australia.
Business & Finance

McGrocer, a British online grocery platform, has expanded its international reach by offering direct delivery of UK-sourced goods to Australian...

Read more

Business Gas: 3 Easy Ways to Keep Costs Down

by Fazila Olla-Logday
23 April 2025
Image Source: Unsplash
at

For many businesses, gas is one of those overheads that rarely gets much attention—until the bills start creeping up.

Read more

Top-Rated Compensation Lawyers in Brisbane: Expert Legal Help for Your Claim

by Fazila Olla-Logday
23 April 2025
Business & Finance

"🏅 Explore top-rated compensation lawyers in Brisbane! Offering expert legal help for your claim. Your victory is our priority! ⚖️💼👨‍⚖️"

Read more

The Q: Exciting New Venue will be Transformational for Queensland

by Pauline Torongo
22 April 2025
The Q: Exciting New Venue will be Transformational for Queensland
Sport

Queensland greyhound racing will embark on a new era this month when the first meeting is staged at an exciting...

Read more
Load More

Copyright © Blue Sky Publications Ltd. All Rights Reserved.
australiantimes.co.uk is a division of Blue Sky Publications Ltd. Reproduction without permission prohibited. DMCA.com Protection Status

  • About us
  • Write for Us
  • Advertise
  • Contact us
  • T&Cs, Privacy and GDPR
No Result
View All Result
  • News
    • Weather
    • Sport
    • Technology
    • Business & Finance
      • Currency Zone
    • Lotto Results
      • The Lott
  • Lifestyle
    • Entertainment
    • Horoscopes
    • Health & Wellness
    • Recipes
  • Travel
  • Expat Life
  • Move to Australia

Copyright © Blue Sky Publications Ltd. All Rights Reserved.
australiantimes.co.uk is a division of Blue Sky Publications Ltd. Reproduction without permission prohibited. DMCA.com Protection Status