Yazılar

Accenture to Acquire Australian Cybersecurity Firm CyberCX in $650 Million Deal

Accenture (ACN.N) announced on Thursday that it will acquire Australian cybersecurity company CyberCX in what represents its largest-ever deal in the sector. The Australian Financial Review reported the transaction is valued at over A$1 billion ($650 million).

The deal highlights the growing demand for advanced cybersecurity services as businesses face increasingly sophisticated digital threats. Australia has seen a series of high-profile cyberattacks, including the 2022 Optus breach that exposed data of up to 10 million users, and a Medibank hack affecting nearly 10 million customers. In July, Qantas Airways also reported a breach of one of its call centres, impacting six million customers.

Melbourne-based CyberCX was created in 2019 through the merger of 12 smaller cybersecurity firms backed by private equity firm BGH Capital, which is selling the company. CyberCX employs around 1,400 staff and operates security operations centres across Australia and New Zealand, with additional offices in London and New York.

The company is led by John Paitaridis, formerly managing director of Optus Business, and Chief Strategy Officer Alastair MacGibbon, who previously served as Australia’s national cybersecurity coordinator. Their experience is notable given Optus’ 2022 data breach that compromised names, dates of birth, addresses, phone numbers, emails, and passport and driver’s license information.

Accenture has been actively expanding its security services, completing 20 acquisitions in the sector since 2015, including Brazilian firm Morphus, MNEMO Mexico, and Spain-based Innotec Security. Domestically, Accenture signed a $700 million collaborative agreement with Telstra in February to implement AI capabilities across the telecommunications company.

US, UK, and Australia Target Russia-Based Zservers Over Lockbit Ransomware Attacks

The United States, joined by the United Kingdom and Australia, has taken coordinated action against Zservers, a Russia-based service provider linked to supporting the notorious Lockbit ransomware attacks. The U.S. Department of Treasury announced the sanctions on Tuesday, highlighting national security concerns related to ransomware operations.

Designations and Actions:

The U.S. Treasury’s Office of Foreign Assets Control (OFAC) added two Russian nationals to its sanctions list, accusing them of being key administrators for Zservers, a company that provides bulletproof hosting services (BPH) commonly used by cybercriminals. These services enable cyber actors, including ransomware groups, to carry out attacks on critical infrastructure both in the U.S. and internationally.

Bradley Smith, acting Under Secretary of the Treasury for Terrorism and Financial Intelligence, emphasized that third-party providers like Zservers play a crucial role in facilitating the operations of cybercriminals, including those behind Lockbit attacks.

Broader Context:

This move is part of a broader effort to combat cybercrime, following similar actions last year that saw joint sanctions from the U.S., UK, and Australia against the Evil Corp ransomware group. The sanctions are aimed at disrupting the infrastructure that supports cybercriminal activities globally.

Chinese Cyberattacks on Taiwan Government Surge in 2024, Report Reveals

Cyberattacks on Taiwan’s government doubled in 2024, with an average of 2.4 million attacks per day, according to a report from Taiwan’s National Security Bureau. The majority of these cyberattacks were attributed to Chinese cyber forces, marking a significant increase from the previous year, which saw 1.2 million daily attacks.

These attacks are part of what Taiwan sees as China’s ongoing “grey-zone harassment” campaign, which includes daily military drills, surveillance balloons, and escalating cyberattacks. These actions coincide with China’s growing political and military pressure on Taiwan to accept its sovereignty claim. The Government Service Network (GSN), a key Taiwanese infrastructure, was one of the primary targets of these cyberattacks, with sectors like telecommunications, transportation, and defense being particularly targeted.

Despite many of the attacks being effectively blocked, the report highlights the increasingly severe nature of China’s cyber activities. Some of the attacks were timed to coincide with Chinese military drills around Taiwan, including distributed denial-of-service (DDoS) attacks aimed at disrupting access to Taiwan’s transportation and financial institutions. The purpose of these attacks was seen as part of a broader strategy to intimidate Taiwan through military and cyber harassment.

The report also detailed efforts by China’s cyber forces to exploit advanced persistent threats and backdoor software to infiltrate Taiwan’s critical infrastructure, including highways and ports. These tactics aim to disrupt government operations and gain strategic advantages in various sectors, including politics, military, technology, and the economy.

China has repeatedly denied involvement in cyberattacks but has been frequently accused by foreign governments, including the U.S., of cyber espionage. Taiwan’s report pointed out that China’s cyberattacks included efforts to steal sensitive information from Taiwanese civil servants’ emails and involved social engineering tactics.