Melbourne IT has admitted to hosting and operating both the Queensland Government and AAPT servers that suffered breaches this week at the hands of hackers purporting to be from a Anonymous splinter group.
The group Ops Australia took credit for defacing nine Queensland Government websites related to tourism, science and economic development and stealing a 40 GB trove of customer data from corporate ISP AAPT.
The text-based defacements on Queensland sites were removed shortly after news broke of the attacks. The group is yet to publicly release the AAPT customer data, despite confirmation from the telco that it had been compromised.
The high-profile hacks came in apparent protest to the Federal Government's proposed data retention regime, which would require telcos and internet service providers to collect and store transmission data from users for up to two years.
Attackers exploited an existing vulnerability in the Adobe Cold Fusion application server used to run both live versions of the affected Queensland sites and an old version of AAPT's business website that the company claimed had not been used for more than 12 months.
AAPT claimed that two "historic" data files had been breached with "limited personal customer information" compromised.
Tony Smith, corporate communications general manager at Melbourne IT, told CRN sister site iTnews that the company had first become aware of the vulnerability after the site defacements late on Tuesday and had patched the issue "within the hour".
But the vulnerability had not been closed before "data had been uploaded from that server to the internet".
"The server contained AAPT data that appears to match the data Anonymous is claiming to possess," Smith said.
"At the moment we can't confirm whether it is [Anonymous]; at the moment it's based on suspicion. We're still conducting forensic investigations into the incident and we're continuing to keep the customer informed."
Smith said the vulnerability was cleared from the "handful of servers" it was found on.
Data for the Queensland Government and AAPT were kept on separate, dedicated servers.
Though the Anonymous-linked hackers first threatened to release ISP data as early as 2pm on Tuesday, Smith said it had not approached AAPT until Wednesday afternoon.
The compromised server was later shut down at 9.30pm on Wednesday night.
"It was closed well before [AAPT was notified of the breach]," he said.
He said the company's engineers were still investigating the issue and scanning the hosting provider's remaining servers for the potential Cold Fusion vulnerability.
Smith would not confirm whether the Australian Federal Police had become involved in the issue, but a source in the industry told iTnews it was likely the authorities would investigate.
The AFP referred questions to the federal Attorney-General's department, which said it was "inappropriate to comment" on the issue.
Copyright © iTnews.com.au . All rights reserved.
Issue: 324 | February 2014
Access CRN's extensive online resources including; email bulletins, community discussions and unique online news.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED GOES EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can log on to the CRN website or start posting comments on articles.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain '@crn.com.au' to your white-listed senders.