NZ Defence Force investigates potential data exposure after reports of Iranian-backed cyberattacks on Australian defence contractors. Integration risks are asse
The New Zealand Defence Force (NZDF) has launched an investigation to determine if any of its sensitive information has been compromised by hackers. This proactive inquiry stems from recent disclosures in Australian media, which reported significant cyberattacks targeting contractors embedded within Australia's critical defence supply chain.
Reports suggest these sophisticated attacks, allegedly supported by Iranian state-sponsored actors, successfully breached security protocols and published classified blueprints. Notably, these exposed documents are said to detail plans for a new infantry fighting vehicle. Given the strategic emphasis on greater operational integration between New Zealand and Australia in governmental defence plans, the NZDF is taking these reports very seriously.
A spokesperson for the NZDF confirmed the ongoing efforts to RNZ, stating, "The NZDF is making inquiries to determine if any NZDF information has been exposed." They further clarified that public comment would be withheld until a thorough assessment ascertains the full scope of any potential data exposure or specific risks to NZDF information.
When questioned about whether the increased integration between the defence forces of New Zealand and Australia elevates cyber security risks, the spokesperson highlighted the robust frameworks governing the NZDF's approach to risk. They explained that the Defence Force's "appetite for risk" is strictly defined by the NZ Information Security Manual and Protective Security Requirements. These comprehensive guidelines establish a rigorous process for the approval and management of all operations, including those involving international collaboration, specifically designed to mitigate potential vulnerabilities and safeguard national security interests.