Connect with us

UAE News

Cybersecurity Incident Disrupts Australian Ports Operated by DP World

The Australian government is investigating a "significant" cybersecurity breach involving numerous DP World Australia ports.

The Australian government is addressing a “significant” cybersecurity incident affecting multiple ports operated by DP World Australia. 

Home Affairs Minister Clare O’Neil confirmed the incident and stated that the government is coordinating a response to understand the impacts and work with DP World Australia.

Ports Affected and Duration of Disruption:

The cyber incident has impacted ports in Sydney, Melbourne, Brisbane, and Fremantle. 

National Cyber Security Coordinator Darren Goldie noted that the disruption is expected to continue for several days, affecting the movement of goods into and out of the country.

DP World Australia Restricts Access During Investigation:

DP World Australia has restricted access to its port operations in the affected cities in response to the incident while investigating. 

The Australian Cyber Security Centre provides technical advice and assistance to the port operator.

Goldie mentioned that the National Emergency Management Agency and National Coordination Mechanism will convene on Sunday to streamline the crisis response. 

Additionally, the Federal police have initiated an investigation into the cybersecurity breach.

Background on Cybersecurity Coordination in Australia:

The National Cyber Security Coordinator Darren Goldie was appointed last July in response to a series of notable cyberattacks. 

This incident follows a global trend of heightened cybersecurity concerns, impacting various sectors, including critical infrastructure.

The recent incident adds to the cybersecurity challenges faced by Australia. 

A little over a year ago, a cyberattack on Optus, a major telecommunications provider, resulted in more than nine million customers’ stolen personal data. 

The Australian government continues to enhance its cybersecurity measures to address evolving threats.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *