{"id":25366,"date":"2019-02-18T01:26:00","date_gmt":"2019-02-18T01:26:00","guid":{"rendered":"http:\/\/4705efc3-ed0f-49a8-b628-3fccf6a1ca3d"},"modified":"2019-02-18T01:26:00","modified_gmt":"2019-02-18T01:26:00","slug":"australian-political-parties-also-hit-by-state-actor-in-parliamentary-network-attack-pm","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/australian-political-parties-also-hit-by-state-actor-in-parliamentary-network-attack-pm\/","title":{"rendered":"Australian political parties also hit by state actor in parliamentary network attack: PM"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/r\/2018\/12\/11\/52b22f1f-bf38-45e5-80c6-a382ed9aed96\/thumbnail\/770x578\/5275511ca6489b26fc203cf7efe773e9\/istock-hacker-hands-doing-the-cyber-crimes-and-hacking.jpg\" class=\"ff-og-image-inserted\"\/><\/div>\n<p>The soft underbelly of Australian political computing has been targeted by what Prime Minister Scott Morrison has branded a &#8220;sophisticated state actor&#8221;, as the PM disclosed that the nation&#8217;s political parties were also hit in an <a href=\"https:\/\/www.zdnet.com\/article\/australian-government-computing-network-reset-following-security-incident\/\">online attack<\/a> earlier this month that forced a password reset of all Australian Parliament House network users, including politicians and all of their staffers.<\/p>\n<p>Speaking on Monday morning, Morrison said the networks of the Liberals, Labor, and Nationals were affected, that the nation&#8217;s security agencies are securing those systems, and that there is no evidence of electoral interference.<\/p>\n<p>Australia&#8217;s political parties do not have to adhere to the <em>Privacy Act<\/em>, and hence disclose when data on citizens is breached.<\/p>\n<p>Morrison added that the Commonwealth has contacted electoral commissions, anti-virus companies, and state and territory authorities responsible for cybersecurity.<\/p>\n<p>&#8220;The Australian government will continue to take a proactive and coordinated approach to protecting Australia&#8217;s sovereignty, our economy, and our national security,&#8221; Morrison said. &#8220;Our political system and our democracy remains strong, vibrant and is protected.<\/p>\n<p>&#8220;The government has chosen to be transparent about these matters. This is in itself an expression of faith by our government in our democratic system and our determination to defend it.&#8221;<\/p>\n<p>In response, Labor leader Bill Shorten pointed out that political parties are typically small organisations with few full-time staff that have &#8220;large amounts of information&#8221; on voters and communities.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>&#8220;These institutions can be a soft target, and our national approach to cybersecurity needs to pay more attention to non-government organisations,&#8221; Shorten said.<\/p>\n<p>When password reset was initiated by the Department of Parliamentary Services, it said there was no evidence to suggest data has been taken or accessed.<\/p>\n<p>Recently, the Australian Signals Directorate (ASD) said that over the course of the last three financial years, the federal government&#8217;s networks have been the subject of cyber incidents 1,097 times.<\/p>\n<p>&#8220;ASD response is required when an incident achieves any degree of success, which can have varying impacts from significant data exfiltration and degradation of the network through to no harm being realised,&#8221; it wrote.<\/p>\n<p>&#8220;The nature of the response varied depending on the incident, and ranged from telephone conversations through to deployment of staff resources and tools to assist in mitigating the incident.&#8221;<\/p>\n<p>At the same time that the Prime Minister was making his statement to Parliament, the Joint Committee of Public Accounts and Audit announced a new inquiry into the cyber resilience of Commonwealth agencies.<\/p>\n<p>&#8220;Effective implementation of a comprehensive cybersecurity framework across Commonwealth agencies is critical to protect Australians&#8217; privacy and Australia&#8217;s social, economic, and national security interests from emerging cyber threats,&#8221; Senator Dean Smith said in a statement.<\/p>\n<p>Submissions to the inquiry are open until March 4.<\/p>\n<h3>Related Coverage<\/h3>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/australian-government-computing-network-reset-following-security-incident\/\">Australian government computing network reset following security &#8216;incident&#8217;<\/a><\/strong><\/p>\n<p>Department of Parliamentary Services says there is no evidence to suggest data has been taken or accessed, or that the incident is part of a plan to influence electoral processes.<\/p>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/duelling-ghosts-battle-over-encryption-laws-in-a-dying-parliament\/\">Duelling ghosts battle over encryption laws in a dying Parliament<\/a><\/strong><\/p>\n<p>After just two hours of debate, Australia&#8217;s encryption law amendments are now stalled in the Senate until April. Only one key amendment was passed, but both government and opposition can claim a win.<\/p>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/russia-to-disconnect-from-the-internet-as-part-of-a-planned-test\/\">Russia to disconnect from the internet as part of a planned test<\/a><\/strong><\/p>\n<p>Russia&#8217;s internet contingency plan gets closer to reality.<\/p>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/australian-government-lags-uk-in-deploying-dmarc-email-spoofing-prevention\/\">Australian government lags UK in deploying DMARC email spoofing prevention<\/a><\/strong><\/p>\n<p>DMARC email authentication can significantly reduce the risk of phishing attacks, but only 5.5 percent of Australia&#8217;s main government domains have deployed it. That&#8217;s set to change.<\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/australian-political-parties-also-hit-by-state-actor-in-parliamentary-network-attack-pm\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Prime Minister Scott Morrison has said a sophisticated state actor also hit the networks of Australia&#8217;s political parties when it attacked the parliamentary network.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":25367,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-25366","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Australian political parties also hit by state actor in parliamentary network attack: PM 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/australian-political-parties-also-hit-by-state-actor-in-parliamentary-network-attack-pm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Australian political parties also hit by state actor in parliamentary network attack: PM 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/australian-political-parties-also-hit-by-state-actor-in-parliamentary-network-attack-pm\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-18T01:26:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/australian-political-parties-also-hit-by-state-actor-in-parliamentary-network-attack-pm.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/australian-political-parties-also-hit-by-state-actor-in-parliamentary-network-attack-pm\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/australian-political-parties-also-hit-by-state-actor-in-parliamentary-network-attack-pm\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Australian political parties also hit by state actor in parliamentary network attack: PM\",\"datePublished\":\"2019-02-18T01:26:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/australian-political-parties-also-hit-by-state-actor-in-parliamentary-network-attack-pm\\\/\"},\"wordCount\":611,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/australian-political-parties-also-hit-by-state-actor-in-parliamentary-network-attack-pm\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/australian-political-parties-also-hit-by-state-actor-in-parliamentary-network-attack-pm.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/australian-political-parties-also-hit-by-state-actor-in-parliamentary-network-attack-pm\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/australian-political-parties-also-hit-by-state-actor-in-parliamentary-network-attack-pm\\\/\",\"name\":\"Australian political parties also hit by state actor in parliamentary network attack: PM 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/australian-political-parties-also-hit-by-state-actor-in-parliamentary-network-attack-pm\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/australian-political-parties-also-hit-by-state-actor-in-parliamentary-network-attack-pm\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/australian-political-parties-also-hit-by-state-actor-in-parliamentary-network-attack-pm.jpg\",\"datePublished\":\"2019-02-18T01:26:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/australian-political-parties-also-hit-by-state-actor-in-parliamentary-network-attack-pm\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/australian-political-parties-also-hit-by-state-actor-in-parliamentary-network-attack-pm\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/australian-political-parties-also-hit-by-state-actor-in-parliamentary-network-attack-pm\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/australian-political-parties-also-hit-by-state-actor-in-parliamentary-network-attack-pm.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/australian-political-parties-also-hit-by-state-actor-in-parliamentary-network-attack-pm.jpg\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/australian-political-parties-also-hit-by-state-actor-in-parliamentary-network-attack-pm\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Australian political parties also hit by state actor in parliamentary network attack: PM\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Australian political parties also hit by state actor in parliamentary network attack: PM 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/australian-political-parties-also-hit-by-state-actor-in-parliamentary-network-attack-pm\/","og_locale":"en_US","og_type":"article","og_title":"Australian political parties also hit by state actor in parliamentary network attack: PM 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/australian-political-parties-also-hit-by-state-actor-in-parliamentary-network-attack-pm\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-02-18T01:26:00+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/australian-political-parties-also-hit-by-state-actor-in-parliamentary-network-attack-pm.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/australian-political-parties-also-hit-by-state-actor-in-parliamentary-network-attack-pm\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/australian-political-parties-also-hit-by-state-actor-in-parliamentary-network-attack-pm\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Australian political parties also hit by state actor in parliamentary network attack: PM","datePublished":"2019-02-18T01:26:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/australian-political-parties-also-hit-by-state-actor-in-parliamentary-network-attack-pm\/"},"wordCount":611,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/australian-political-parties-also-hit-by-state-actor-in-parliamentary-network-attack-pm\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/australian-political-parties-also-hit-by-state-actor-in-parliamentary-network-attack-pm.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/australian-political-parties-also-hit-by-state-actor-in-parliamentary-network-attack-pm\/","url":"https:\/\/www.threatshub.org\/blog\/australian-political-parties-also-hit-by-state-actor-in-parliamentary-network-attack-pm\/","name":"Australian political parties also hit by state actor in parliamentary network attack: PM 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/australian-political-parties-also-hit-by-state-actor-in-parliamentary-network-attack-pm\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/australian-political-parties-also-hit-by-state-actor-in-parliamentary-network-attack-pm\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/australian-political-parties-also-hit-by-state-actor-in-parliamentary-network-attack-pm.jpg","datePublished":"2019-02-18T01:26:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/australian-political-parties-also-hit-by-state-actor-in-parliamentary-network-attack-pm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/australian-political-parties-also-hit-by-state-actor-in-parliamentary-network-attack-pm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/australian-political-parties-also-hit-by-state-actor-in-parliamentary-network-attack-pm\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/australian-political-parties-also-hit-by-state-actor-in-parliamentary-network-attack-pm.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/australian-political-parties-also-hit-by-state-actor-in-parliamentary-network-attack-pm.jpg","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/australian-political-parties-also-hit-by-state-actor-in-parliamentary-network-attack-pm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Australian political parties also hit by state actor in parliamentary network attack: PM"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25366","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=25366"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25366\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/25367"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=25366"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=25366"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=25366"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}