28 Mar 2024, by Slade Baylis
A while ago – back in November of 2022 – we covered the data breaches of Optus, Medibank, and Harcourts - explaining how each of them were preventable by fairly basic changes to their systems and policies. We wanted to let our readers know that these things aren’t inevitable, but also to provide our readers with the knowledge of what they can do in order to protect themselves from similar types of threats happening to them.
In response to the Optus breach in particular though, the Australian Federal Police (AFP)1 - in a multi-jurisdictional partnership between law enforcement and the private sector – started Operation Guardian to “supercharge the protection of more than 10,000 customers whose identification credentials have been unlawfully release online”. The goal of the operation was to identify and protect the more that 10,000 customers who had more that 100 points of identification leaked.
After the Optus breach, when Medibank had a similar data-breach targeting their customers, they put out another media release2, stating that the operation had been expanded to also encompass the customers affected in that breach as well. Unfortunately, it’s now been revealed in a new report from the AFP that as many as 11,000 cybercrime incidents or more have been linked specifically to the Medibank data breach.
In the days following the Optus breach in late 2022, the government was already moving quickly to help those customers who were affected by it. As we reported3, state and federal governments had immediately responded by making it easier for those affected to replace identity documents that may have been compromised during the breach. In fact, they were also looking at urgent reform with regards to cyber-crime, to make it easier to alert organisations such as banks as to which customers were at higher-risk or actively compromised.
As mentioned though, one other action they took was to launch Operation Guardian – which is a joint partnership between law enforcement, the private sector and industry to combat the growing threat of cybercrime. The aim of this operation was to offer multi-jurisdictional and multi-layered protection from identity crime and financial fraud, with a priority placed on the 10,000 individuals who potentially had 100 points of identification or more leaked in the breach.
The AFP stated that several methods would be used to help the affected customers, including:
In the months following the launch of the new operation, in November 2022, its scope was expanded to encompass more than just the affected Optus customers, due to several more high-profile breaches occurring. Whilst not as large as the Optus breach, the Medibank breach – which affected 500,000 customers rather than the over ten million that were affected by the Optus breach – was serious enough for the AFP to expand the scope of the operation to include their affected customers too2.
It wasn’t the only breach to end up being included, as in March 2023, the operation was further expanded to also include the customers affected by the Latitude Services breach. They stated that whilst there was no evidence to date that the personal details of Latitude Services customers were available or being sold online, they were already working with public and private sector agencies to “scour the internet and known criminal online sites to identify those who wo are attempting to buy or sell personally identifiable information (PII)”.
Unfortunately, customers of Medibank have not been so lucky. As of March 2024, IT News4 has reported that Operation Guardian has linked “over 11,000 cybercrime incidents” to the Medibank data break specifically. That figure comes from a submission from the Victoria Police to a federal cybercrime inquiry, and it’s not clear whether the figure is just for Victoria alone or for the entire country. However, what it does do, is it helps demonstrate the scope of the damage that results from these sorts of breaches – which is why it’s vital for organisations to take steps to prevent them.
Within our previous article covering the Optus, Medibank, and Harcourts breaches, we included information about what could have been done to prevent each breach. We did that to help reassure our readers that these sorts of data breaches aren’t inevitable and can be prevented with relatively simple precautions.
Here are some things that can be done to help protect your organisation from similar types of attacks:
For more details on each of these points, we recommend checking out our Concerned about all the recent data breaches? Use these tips to protect yourself! article, as we go into more depth on each of them.
If you have any questions about this article or want to have a chat about how best to secure your infrastructure, let us know! Each business is different and will require a different strategy and we’ll be able to create a plan that works best for you.
You can contact us via phone on 1300 769 972 (Option #1) to have a chat about your requirements, or alternatively reach out to us via email at sales@micron21.com
1, Australian Federal Police, “Operation Guardian delivers specialised protection for Optus customers”, <https://www.afp.gov.au/news-centre/media-release/operation-guardian-delivers-specialised-protection-optus-customers>
2, Medibank, “AFP media release - Operation Guardian expanded to protect stolen information of Australians”, <https://www.medibank.com.au/livebetter/newsroom/post/afp-media-release-operation-guardian-expanded-to-protect-stolen-information>
3, Micron21, “Optus, Medibank, and now Harcourts – If they can be breached, what can you do to prevent it?”, <https://www.micron21.com/blog/optus-medibank-and-now-harcourts-if-they-can-be-breached-what-can-you-do-to-prevent-it>
4, IT News, “Australian police link "over 11,000 cybercrime incidents" to Medibank breach”, <https://www.itnews.com.au/news/australian-police-link-over-11000-cybercrime-incidents-to-medibank-breach-606023>
5, Micron21, “With 80% of malware evading antivirus applications, signature-based protection isn’t enough anymore”, <https://www.micron21.com/blog/with-80-of-malware-evading-antivirus-applications-signature-based-protection-isn-t-enough-anymore>