Download as pdf or txt
Download as pdf or txt
You are on page 1of 28

Cyber Threat

Report 2021 2022

The National Cyber Security Centre is part of the


Government Communications Security Bureau
CONTENTS

Ngā kaupapa
Foreword / Whakapuakitanga 1
By the numbers / Mā ngā tau 2
Overview / Tirohanga whānui 3
Aotearoa New Zealand threat landscape
/ Te āhuatanga o ngā tuma i Aotearoa 4
International landscape / Te āhuatanga i te ao 11
About our work / Mō ā mātou mahi 16
Conclusion / Whakakapi 22
Glossary / Rarangi kupu 23
NCSC // Cyber Threat Report 2021/2022 1

FOREWORD

Whakapuakitanga
The National Cyber Security Centre (NCSC), part of the Government Communications
Security Bureau (GCSB), supports nationally significant organisations to improve their
cyber security posture and responds to national-level harm. This report provides
our insight into cyber threats impacting the domestic and international landscapes,
and the incidents to which we responded over the 2021/2022 year.

The NCSC deters, detects, disrupts, disruption with the launch of Through our role in supporting
and provides advice about the types Malware Free Networks (MFN). the Director-General of the GCSB in
of malicious cyber activity that could MFN is powered by the NCSC’s unique the Government Chief Information
affect Aotearoa New Zealand’s threat insights specific to Aotearoa Security Officer (GCISO) function,
wellbeing or prosperity. New Zealand. We work with our MFN we are able to provide a single source
partners to detect and disrupt threats of leadership and investment advice
In the 2021/2022 year, we recorded before they impact their customers’ about information security
350 cyber security incidents, compared systems. These partnerships enable us risks across the public sector.
to 404 in 2020/2021. The reduction to significantly scale our cyber defence
in recorded incidents is not unique work programme across a large We will continue to work closely
to Aotearoa New Zealand; other range of Aotearoa New Zealand with our international partners
countries have also observed a similar organisations. to contribute to global efforts
trend. The difference may reflect to reinforce the importance of
a number of contributing factors, Increasing use of technology upholding the norms of acceptable
including the NCSC’s focus on the to deliver services brings many behaviour in cyberspace.
potential impact of cyber activity as advantages, including for cyber
a consequence of Russia’s invasion of resilience. It also increases the While malicious cyber actors
Ukraine and our increasing ability to potential for organisations to continue to find new ways to gain
detect malicious cyber activity before experience significant cyber impacts. access to systems worldwide,
actors compromise victim networks. In 2022, heightened geostrategic the NCSC is adapting to the rapidly
tensions have impacted the changing environment. Every day,
The NCSC stood up a dedicated effort institutions, rules, and norms that we work to protect Aotearoa New
in response to Russia’s February reflect Aotearoa New Zealand’s values Zealand’s nationally significant
2022 invasion of Ukraine. We helped and key national security interests. organisations. I hope our report
Aotearoa New Zealand’s nationally offers useful insight into the cyber
significant organisations understand The NCSC has focused on the potential threats facing Aotearoa New Zealand,
how they could be affected, and we implications for Aotearoa New Zealand and encourages organisations to
examined the role cyber activity networks should malicious cyber continue to review and elevate
plays in hybrid warfare. We released actors attempt to leverage their their cyber resilience strategies.
advisories and threat assessments capabilities for strategic advantage.
in order to encourage Aotearoa In the coming years, there is a realistic Lisa Fong (she/her)
New Zealand organisations to raise possibility geostrategic tensions will Deputy Director-General,
their resilience, and to ease the increase. As the global environment National Cyber Security Centre
potential pressure on incident shifts, the NCSC continues to deliver
responders around the country. timely, relevant guidance and services
to support the cyber resilience of
We have delivered a major uplift Aotearoa New Zealand’s nationally
in national threat detection and significant organisations.
2 NCSC // Cyber Threat Report 2021/2022

BY THE NUMBERS

Mā ngā tau
350
incidents affecting
nationally significant
81
$317m
organisations
(COMPARED TO 404 INCIDENTS incidents, or 23%,
RECORDED IN 2020/2021)
were likely criminal or
Since June 2016, the financially motivated
NCSC has prevented an (COMPARED TO 27% IN 2020/2021)
estimated $317 million
worth of harm to Aotearoa

118
New Zealand’s nationally
significant organisations.
122,000
$33m worth of harm was The NCSC disrupted
of those, or 34%, prevented in 2021/2022. over 122,000 malicious
indicated links to suspected cyber events as part of
state-sponsored actors Malware Free Networks
(COMPARED TO 28% IN 2020/2021) (30 JUNE 2022)

THE NCSC IN A TYPICAL MONTH* THE NCSC


INCREASED AOTEAROA IN THE 2021/2022 YEAR
Detects 7 cyber intrusions NEW ZEALAND’S COLLECTIVE THE NCSC AND GCSB
CYBER RESILIENCE
affecting one or more
Received 179 notifications
nationally significant
organisations through
the NCSC’s cyber
Co-chaired 27 of network change proposals
under the Telecommunications
sector-based Security (Interception Capability and
defence capabilities Information Exchanges Security) Act 2013 (TICSA)

Conducted 19 assessments of
Receives 22 new incident regulated space activities under
reports or requests for
assistance. Of the new
Published 21
reports
the Outer Space and High-altitude
Activities Act 2017 (OSHAA), and
and advisories 55 assessments of regulated radio
incident reports received for customers spectrum activities under the
each month, 14 come from
Radiocommunications Act 1989
international and domestic
partners while 8 come
from victim organisations Delivered 70
incident
Conducted 42 assessments
under the Overseas Investment
self-reporting. reports to customers Amendment Act 2021 (OIAA)

* These numbers represent the incidents that meet the threshold for an NCSC response. Our focus is on incidents with a possible national impact, or incidents that may
affect Aotearoa New Zealand’s nationally significant organisations. For incident reports that do not meet the threshold for an NCSC response, the NCSC will engage with
other domestic organisations that can support the victim organisation.
NCSC // Cyber Threat Report 2021/2022 3

OVERVIEW

Tirohanga whānui
The Cyber Threat Report 2021/2022 provides an overview of the NCSC’s work during the
year 1 July 2021 to 30 June 2022. This report serves as an annual cyber threat barometer,
reflecting changes in both the domestic and international landscapes. It aims to highlight
and contextualise observable trends about the nature of cyber security incidents affecting
Aotearoa New Zealand’s nationally significant organisations. It also offers insight into the
pressure points affecting organisations worldwide that may also impact Aotearoa
New Zealand networks.

The first section of the report focuses in a number of regions, including the Organisations around the world
on the Aotearoa New Zealand cyber Pacific, with some states undermining are increasingly dependent on
threat landscape, and offers insight the rules-based international order digital technologies, yet are still not
into some of the cyber security in pursuit of their strategic objectives. managing their cyber risk effectively.
incidents that caused the most Escalations of geostrategic tensions A key part of the NCSC’s work is
disruption. In the 2021/2022 year, we can have significant impacts on the to issue advisories and guidance
recorded 350 incidents – compared to international cyber threat landscape. to help organisations better
404 incidents recorded in 2020/2021. understand risks and threats,
This section also describes how we Russia’s February 2022 invasion and the actions they may need
define an incident, and how severity of Ukraine transformed the cyber to take to prevent compromise.
ratings are assigned using an security landscape in a matter of
incident categorisation matrix. months. Like many organisations, We help consenting Aotearoa
the NCSC has worked through a New Zealand organisations recover
Of the 350 incidents recorded, 34% protracted period of heightened from cyber security incidents
showed links to suspected state- cyber threat, preparing for a range through prevention work, early
sponsored actors, compared to 28% of likely threat scenarios. The NCSC detection warnings, and incident
in the 2020/2021 year. A further 23% has proactively shared timely and response and recovery. We also
indicated links to suspected criminal or actionable guidance to enable facilitate the secure provision of
financially motivated activity, compared others’ preparation. telecommunications services, and
to 27% in the 2020/2021 year. inform the information security
In February 2022, we advised standards for the public sector.
The remaining 43% of incidents operators of Aotearoa New Zealand’s
either had insufficient information to critical infrastructure to prepare The 2021/2022 year for the NCSC has
make a judgement about attribution, for potential cyber threats amid also been one of new partnerships,
or represented preventative efforts increasing geopolitical tensions in increased information sharing, and
undertaken by the NCSC before the Europe. In April 2022, in coordination collaboration with global cloud service
activity could have a significant impact. with our Five Eyes partners, providers to develop award-winning
The earlier a cyber incident is detected, we warned about the tactics baseline security templates.
the lower the incident response and of Russian state-sponsored and
recovery effort. Conversely, early criminal cyber actors, and the For more information about NCSC
detection and disruption means there threat to critical infrastructure. services or guidance, visit our website
is less information available about (www.ncsc.govt.nz). For readers
the nature and extent of the activity. The final section of the report explains unfamiliar with any of the terms
our mission, vision, objectives, and used, or how the NCSC defines
The second section of the report the services we offer to Aotearoa them, a glossary is provided after
reviews the international cyber New Zealand’s nationally significant the report’s conclusion.
threat landscape. The geostrategic organisations. Improving the resilience
environment is becoming increasingly of Aotearoa New Zealand against
complex. Challenges to sovereignty cyber threats is one of the
and territorial integrity are occurring NCSC’s key priorities.
4 NCSC // Cyber Threat Report 2021/2022

AOTEAROA NEW ZEALAND THREAT LANDSCAPE

Te āhuatanga o ngā tuma i Aotearoa


In 2022, Aotearoa New Zealand and the rest of the world faced a more complex geostrategic
environment. The NCSC monitored the international threat landscape in an effort to
contextualise information for Aotearoa New Zealand organisations. Following Russia’s invasion
of Ukraine in February 2022, the NCSC did not observe a significant change in the domestic
cyber landscape that could be associated with the invasion. This section of the report will
explore the key cyber threat trends affecting Aotearoa New Zealand organisations in the
2021/2022 year. This includes the continued blurring of the lines between state- and non-
state-sponsored actors, and the potential implications for Aotearoa New Zealand networks.

2021/2022 NCSC incidents

Even with the best cyber defences, geostrategic shifts have presented
cyber security incidents can still occur; opportunities for both state- and
How the NCSC
malicious cyber actors regularly non-state-sponsored cyber actors to
defines incidents
discover new ways to gain access to take advantage of vulnerable systems
An incident can be any malicious
systems. Technological innovation and seek persistent, strategic access
threat to a customer’s network
compels changes in actors’ tactics, to networks. It is a realistic possibility
or information, even where an
which, in turn, drives significant that adversaries typically impacting
actor is unsuccessful or there
changes in the nature of the Aotearoa New Zealand organisations is no confirmed compromise.
malicious cyber activity that victim have turned their attention elsewhere.
organisations experience. Reconnaissance and network
The NCSC has focused on the scanning, possible attempts
This fiscal year, we recorded 350 potential impact of cyber activity to exploit customer
cyber security incidents. This figure as a consequence of Russia’s invasion vulnerabilities, accidental data
is lower than the previous year’s 404 of Ukraine despite no recorded direct leaks, or suspicious events that
recorded cyber security incidents. cyber impact to Aotearoa New Zealand trigger analysis to determine
The difference may reflect a number networks associated with the invasion. if they are malicious might all
of contributing factors, including the While Russian state-sponsored cyber be counted among the NCSC’s
potential impact of cyber activity as activity associated with the invasion total incidents.
a consequence of Russia’s invasion has been focused predominantly
of Ukraine. on Ukrainian targets, the threat We categorise incidents by
of spill-over effects remains considering the scope, size,
Aotearoa New Zealand’s security a significant concern for the and role of the affected victim
interests are being challenged by international community. alongside the possible harm

the international rise of strategic and impact caused by the


incident. Incidents range from
competition; states are more readily Developments in the NCSC’s cyber
category 6, being minor or of
pursuing their strategic objectives defensive capability have allowed us
least concern, to category 1,
in ways that undermine the rules- to scale some services to a significant
being critical.
based international order. These number of organisations.
NCSC // Cyber Threat Report 2021/2022 5

Analysing trends in tactics and techniques

The NCSC uses MITRE ATT&CK as a occurring technique, down from the method of gaining initial access
framework to map cyber security first position in 2020/2021. We also was unknown. Early intervention often
incidents. MITRE ATT&CK is a public regularly observed infrastructure means specific detail about malicious
knowledge base that provides a compromised with botnets. Botnets cyber activity is unavailable. If a
common set of terms to describe the enable a malicious cyber actor to malicious cyber actor pivots through
tactics and techniques used by actors target thousands of devices all over multiple levels of a victim’s system,
during various stages of an intrusion. the world simultaneously. This there is more evidence of tactics and
By mapping recorded incidents to disproportionately high number techniques – or the ‘known knowns’.
MITRE ATT&CK, the NCSC can gain is reflected in the graphic below, If the actor is disrupted partway
insights into common or emerging but does not represent increased through its activity, there are more
trends in actor tactics and techniques. targeting of Aotearoa New Zealand ‘known unknowns’. If the activity
Each malicious incident can include organisations. is not detected, or the actor is
multiple tactics and techniques, proactively blocked before it
depending on the evidence The most commonly recorded impacts the victim network, there
of malicious activity. known method of gaining initial are more ‘unknown unknowns’.
access to a network was by exploiting
Across malicious incidents from the a public-facing application, which
2021/2022 year, vulnerability scanning mirrors 2020/2021 findings. Yet,
was the second most commonly there were more incidents where

Most recorded MITRE ATT&CK tactics and techniques


observed by the NCSC in 2021/2022*

11% Compromise infrastructure - botnet

11% Reconnaissance - scanning

5% Initial access - unknown

5% Exploit public-facing application

4% Phishing

3% Data encrypted for impact

3% Command and control - web-based communication


For further information
about MITRE ATT&CK tactics
3% Web shell
and techniques and their
specific ID numbers, refer
3% Denial-of-service to the MITRE ATT&CK
website (attack.mitre.org).

3% Exfiltration - unknown

*
This graphic only represents recorded NCSC incidents where MITRE ATT&CK tactics and techniques were observed with a high degree of confidence.
6 NCSC // Cyber Threat Report 2021/2022

Incidents by category 2021/2022

The annual number of recorded A national cyber emergency (C1) is The year’s two most severe
incidents is a useful measure, but it defined as an incident that causes incidents were rated C2. These
does not reflect changes in the cyber severe disruption to a core Aotearoa incidents were connected; analysis
landscape; the context behind each New Zealand service, and/or affects revealed that after the malicious
incident is critical to determining the key sensitive data, and/or undermines cyber actor compromised the
overall impact of malicious cyber the economic or democratic stability first organisation, it used its
activity on the domestic landscape. of Aotearoa New Zealand. At the access to target the second
For example, 20 highly significant other end of the scale, a minor victim organisation days later
incidents in a fiscal year would incident (C6) is defined as an incident by exploiting the trusted
more radically change the domestic causing a known or likely impact on relationship between the
landscape than 400 minor incidents, an individual/individuals, or precursor two organisations.
because the potential impact on activity against an individual/
critical services, society, and the individuals, or a small or medium
economy would be greater. enterprise. In the middle, a significant
incident (C3) is defined as an incident
The volume and percentages causing a known or likely impact on
of how incidents are identified a large commercial enterprise, wider
government, or supply chain to core SEVERITY
varies over time. Incidents recorded
OF IMPACT
by the NCSC come from a range of Aotearoa New Zealand services.
sources, including through our cyber
detection capabilities, reporting Highly significant incidents (C2)
from our international and domestic consume a substantial measure
C1
0 National
partners, and direct requests from of time and resources, but even
emergency
victim organisations. Over the course significant (C3) or moderate incidents
of an average month in 2021/2022, (C4) can take a number of weeks to
the NCSC handled 29 incidents. resolve, and will generally involve C2
Of those, about half came from complex responses across a number 2 Highly
a domestic or international partner of teams. For minor or routine significant
alerting us to the possibility of incidents (C5 or C6), the NCSC might incident

an incident, about a quarter respond by providing general advice


were detected through our own or alerts to customers. During the
C3
capabilities, and another quarter 2021/2022 year, the NCSC delivered 15 Significant
came from victim organisations 70 cyber security incident reports incident
self-reporting suspicious activity. or incident analysis reports to
specific customers, and provided
21 general advisories or guides.
C4
78 Moderate
incident

C5
101 Routine
incident

C6
154 Minor
incident
NCSC // Cyber Threat Report 2021/2022 7

Support to major events

The GCSB contributes cyber security Cooperation (APEC) 2021 forum. The resilience advice, and engagement
support to multi-agency efforts on NCSC assisted the agencies involved with the Electoral Commission to
major national events. Planning for to ensure the virtual hosting platforms ensure appropriate incident response
major events involves preparing used to facilitate online meetings processes were in place.
for the possibility a cyber security were secure, and that risk assessment
incident could cause disruption and mitigation processes were in The NCSC will continue to look for
and/or reputational harm. place to protect participants. opportunities to contribute cyber
security support to organisations
In 2021/2022, the GCSB, through the The NCSC also supported the during major national events such
NCSC, provided cyber security support Electoral Commission’s delivery of a as the forthcoming census and
to a number of events, including by-election in the Tauranga electorate. General Election.
the virtual Asia-Pacific Economic This included the provision of cyber

Confidentiality

To protect relationships of confidence and trust, the NCSC does not generally comment publicly about whether
it is involved in providing investigation or incident response support to victims of malicious cyber activity.
Any incidents reported to the NCSC are treated as commercial-in-confidence.

This helps to encourage organisations to engage with us when they have been subject to a cyber security incident.
It also helps to protect the integrity of any investigations we are involved in. There are occasionally highly significant
incidents where the NCSC and the organisation/s we are assisting may agree that disclosure of our involvement
is appropriate.

Links to state-sponsored actors

In the 2021/2022 year, 34% of the reduction in recorded criminal or activity is less likely to disrupt services
NCSC’s 350 recorded incidents showed financially motivated incidents. or cause obvious harm, and less likely
indications of a connection to state- to enter the public spotlight, but still
sponsored actors (compared to 28% The scale of state-sponsored activity has potentially significant economic
in the previous year). The 2021/2022 against Aotearoa New Zealand and reputational impacts for Aotearoa
number totals 118 incidents of networks makes it challenging to New Zealand. Some states conduct
concern, a similar number to the 113 identify, track, respond, and/or espionage activity to support their
recorded in 2020/2021. The slight attribute the actors involved. State- economic development; this can
increase in this proportion relative sponsored actors regularly adapt their involve theft of information and
to 2020/2021 likely reflects both the tactics in order to escape detection for intellectual property.
lower total incident count, and the as long as possible. State-sponsored

Case study

The NCSC became aware of a sophisticated actor targeting an Aotearoa New Zealand organisation. After contacting
the organisation, we initiated an investigation. Analysis revealed that after compromising the victim organisation,
the malicious cyber actor had used its access to target a second victim organisation only days later by exploiting
a relationship of trust between the two organisations. We assisted both victims and their service providers to evict
the actor and prevent further attempts to compromise their networks. Prompt response efforts and work to identify
the full path of the intrusion contained the compromise for both victims, and reduced its impact.
8 NCSC // Cyber Threat Report 2021/2022

Financially motivated or criminal activity

In the 2021/2022 year, 23% of the activity has been more turbulent barriers to entry, enabling any group
NCSC’s 350 recorded incidents preceding and following Russia’s with purchasing power to conduct
showed indications of a connection to invasion of Ukraine. DDoS activity sophisticated cyber operations.
criminal or financially motivated actors spiked in some states – including
(compared to 27% in the previous Ukraine, Russia, and a number Criminal actors may seek to cause
year). The 2021/2022 number totals of states that opposed Russia’s disruption or engage with media in
81 incidents, which is a noticeable invasion of Ukraine – while it order to pressure victims to pay a
reduction from the 110 recorded decreased elsewhere. ransom, and therefore will focus on
in 2020/2021. The decrease in this targeting victims they consider likely
proportion relative to 2020/2021 A key trend we are observing to respond to their demands.
possibly reflects the increasing year-on-year is the blurring of the
opportunities for actors to target lines between state-sponsored The NCSC anticipates emerging players
systems they identify as valuable and criminal or financially motivated – both state- and non-state-sponsored
following Russia’s invasion of Ukraine. actors. We have increasingly observed – will follow a similar cyber capability
non-state-sponsored actors using development trajectory as traditional
The NCSC observed fewer high-impact capabilities that, until recently, adversaries. The increasing diversity
ransomware and distributed denial-of- were exclusively in the hands of of cyber actors using sophisticated,
service (DDoS) activities in 2021/2022 sophisticated state-sponsored actors. commercially available tools further
than in 2020/2021. It is possible the complicates incident response and
reduction in ransomware and DDoS The growth in sophistication among attribution efforts. (See ‘Calling out
activities targeting Aotearoa non-state-sponsored actors malicious cyber activity’)
New Zealand in 2021/2022 is is particularly concerning because
connected to Russia’s invasion of they are increasingly empowered In the 2021/2022 year, 43% of the
Ukraine. The invasion has almost to have significant impacts on NCSC’s recorded incidents either
certainly disrupted cyber criminals critical networks. Some criminal represented preventative efforts
based in Russia and Ukraine, and likely groups also appear to operate undertaken by the NCSC before the
caused them to reorient their strategic without sanction from ‘safe activity could have a significant impact
objectives. The observed reduction havens’ in their resident countries. or lacked the information needed
in ransomware reflects international The increasing availability of to attribute the malicious activity.
trends for early 2022, while DDoS cyber capabilities reduces technical

Case study

An IT service provider contacted the NCSC after a routine scan


identified suspicious software running on one of its customer’s servers.
The software was a commercial security testing tool often co-opted by
malicious state-sponsored and criminal actors – including ransomware
operators. We worked alongside the organisation to identify the source,
timeline, and extent of the infection. Analysis revealed the network had
been compromised for almost four months. The source was traced back
to two users who inadvertently downloaded a fake version of a
video-conferencing software.

A malicious actor used this counterfeit software to gain an initial foothold


on the network and move laterally. Ultimately, 44 servers were impacted.
The NCSC was unable to find any forensic evidence of data exfiltration or
attempts to deploy ransomware. It remains possible auditing tools did
not capture all of the actor’s activities, or the actor was interrupted before
achieving its ultimate objective.
NCSC // Cyber Threat Report 2021/2022 9

Russia’s invasion of Ukraine

The future trajectory of Russia’s In May 2022, the Director-General In February 2022, we advised
invasion of Ukraine is unclear. The of the GCSB, Andrew Hampton, operators of Aotearoa New Zealand
NCSC assesses the most significant noted the NCSC had not observed critical infrastructure to prepare for
threat to Aotearoa New Zealand a significant change in the domestic potential cyber threats – including
networks from the invasion is indirect cyber landscape that could be destructive malicious software
malicious cyber activity that affects associated with the invasion. (malware), ransomware, DDoS activity,
a critical supply chain. Equally, cyber However, he noted the NCSC was and cyber espionage – amid increasing
criminal actors could opportunistically alert to the fact the situation could geostrategic tensions in Europe.
conduct ransomware or similarly change with no advance warning,
disruptive operations against as both pro-Russia and pro-Ukraine Aotearoa New Zealand publicly
valuable networks, taking advantage cyber activity continued to impact condemned Russia’s invasion of
of the situation. systems around the world. Ukraine and confirmed its support
for Ukraine’s sovereignty. The
Russian cyber activity observed in The NCSC has established a dedicated Government imposed sanctions
Aotearoa New Zealand since Russia’s response to the cyber threats arising against Russian officials responsible
February 2022 invasion of Ukraine from Russia’s invasion of Ukraine. This for malicious cyber activity, and
has reflected international trends. has focused on three areas: sharing subsequently condemned Russia’s
Russia appears to have been careful cyber threat intelligence, using our malicious cyber activity against
not to spread its cyber operations technical cyber security capabilities Ukraine, alongside the European
wider than its intended targets, which to monitor Aotearoa New Zealand Union and international partners.
have been based predominantly in networks for malicious activity, and
Ukraine and neighbouring countries. providing advice and guidance to
(See ‘International landscape’) nationally significant organisations
to build continued resilience.

With the battlefield invasion, has come the cyber offensive, with Russian targeting
of Ukrainian digital infrastructure. It may not have been of the scale or had the
impact some had anticipated, but it is happening.

Andrew Hampton, Director-General,


Government Communications Security Bureau
(May 2022 - Speech to the Wairarapa branch of the New Zealand Institute of International Affairs)

Common Vulnerabilities and Exposures

The NCSC continues to observe an Malicious cyber actors quickly take


Common Vulnerabilities and increase in the speed and scale of advantage of flaws, scanning for
mass exploitation of recently disclosed and targeting every device and
Exposures (CVEs) are publicly
vulnerabilities. Without effective organisation potentially vulnerable
disclosed information security
controls to safeguard data integrity, to exploitation in order to secure
issues, stored in a database. data will always be vulnerable. This a foothold. Then, once they have
A CVE number uniquely is further challenged by automation, generated enough access vectors,
identifies each vulnerability. in which massive amounts of data they selectively pick targets for
are processed with little to no unspecified future cyber operations.
human involvement. Malicious cyber This scanning activity is not always
actors will continue to find ways to concerning or abnormal. Sometimes,
exploit organisations that have not reconnaissance activity is merely
adequately protected their data. passive information gathering.
10 NCSC // Cyber Threat Report 2021/2022

Apache Log4j ‘Calling out’ malicious cyber activity

Sometimes, however, reconnaissance As part of Aotearoa New Zealand’s vulnerable global servers. This
activity is extremely problematic. commitment to upholding the attribution was underpinned
The most significant CVE disclosed rules-based international order by a GCSB technical assessment.
in the 2021/2022 year was the Apache and internationally accepted norms
Log4j vulnerability. In December of behaviour in cyberspace, the In May 2022, the NCSC provided
2021, a vulnerability was discovered Government may publicly call out advice to the Ministry of Foreign
in Apache Log4j, an open-source actors responsible for malicious Affairs and Trade (MFAT) in support
software library used around the world cyber activity when it is in the of the Minister of Foreign Affairs’
and found in a vast array of Java-based national interest to do so. statement on behalf of the Aotearoa
applications. It left global networks New Zealand Government, publicly
vulnerable to malicious cyber actors The GCSB, through the NCSC, condemning the campaign of
remotely accessing systems, stealing conducts technical attribution of destructive cyber activity against
information, exfiltrating data, and malicious cyber activity and provides Ukraine attributed by our partners
infecting networks with malware. this, usually at a classified level, to the to Russia.
Aotearoa New Zealand Government.
The NCSC shared an advisory with The Government may draw on the The NCSC often becomes aware
its customers which contained NCSC’s technical attribution – as part of malicious cyber activity without
information about mitigating the of an all-of-government process knowing the identity of the actor
vulnerability and detecting malicious – and use this information to publicly responsible, and it is not always
cyber activity. Our MFN capability call out a malicious cyber actor. possible to attribute activity to a
enabled the NCSC to rapidly particular state or malicious cyber
disseminate thousands of indicators In July 2021, the Minister Responsible actor. Cyberspace enables actors
of Log4j-related activity and proactively for the GCSB, on behalf of the to operate with various degrees of
block them in near real-time before Aotearoa New Zealand Government, anonymity. The open architecture
they could harm Aotearoa New publicly condemned malicious cyber of the internet enables threat actors
Zealand organisations. In December activity by state-sponsored actors – who could be anywhere in the
2021 alone, our MFN partners from the People’s Republic of China. world – to route their activity
disrupted over 20,000 Log4j-related The actors targeted ProxyLogon through third-party infrastructure.
events on their customer networks. vulnerabilities in Microsoft Exchange, The identification of devices used
which enabled them to steal by the actors does not guarantee
intellectual property and personal finding the responsible group, either.
information from about 400,000

Case study

The NCSC became aware of malicious cyber activity targeting an Aotearoa New Zealand IT service provider,
and quickly engaged the organisation to provide notification and offer support. The organisation identified
a breach of its identity and access management platform. Investigations determined the organisation had been
running an outdated and vulnerable version of software that the actor was able to compromise to gain initial
network access. The actor installed tools that allowed it to execute commands, elevate privileges, and maintain
remote access to the victim’s systems. It was able to exfiltrate usernames and credentials, as well as technical
information about system configurations – likely intended for use in gaining further access. Swift detection and
containment prevented the actor from establishing persistence on the victim network. The NCSC assisted the
organisation to secure its environment, and provided forensic analysis to help inform and guide the
organisation’s remediation and recovery efforts.
NCSC // Cyber Threat Report 2021/2022 11

INTERNATIONAL LANDSCAPE

Te āhuatanga i te ao
As the geostrategic environment becomes increasingly complex, there is more potential
for Aotearoa New Zealand networks to be targeted by malicious cyber actors attempting
to leverage their capabilities for strategic advantage. There is a realistic possibility
geostrategic tensions will increase over the coming years. Since Russia invaded Ukraine
on 24 February 2022, the international cyber landscape has been impacted.

The invasion roused organisations all over the world to shield their networks and systems. It
also fuelled debate about the role cyber activity plays in hybrid warfare. Governments suddenly
shifted their intelligence priorities and considered new cyber threat scenarios. Beyond the
invasion and other geostrategic tensions, the 2021/2022 international landscape was defined
by supply chain vulnerabilities and the increasing sophistication of non-state-sponsored actors.
The outlook for the international cyber landscape over the next fiscal year is uncertain.

Russia-Ukraine

Russia’s February 2022 invasion of activity emanating from Russia or Pro-Russia cyber actors are not the
Ukraine was supported by cyber Ukraine. The volume of unattributed only participants in cyber activity
activity. In many instances, Russian cyber activity associated with the associated with the invasion. Patriotic
cyber operations coincided with invasion reflects and exacerbates and opportunistic cyber actors are
kinetic operations. Early indications the challenge of attributing activity taking sides, conducting malicious
of cyber activity appeared in the form to a particular actor. It also presents cyber activity on behalf of either Russia
of DDoS activity and the deployment opportunities for states to target or Ukraine. Pro-Ukraine cyber activity
of destructive wiper malware against victim networks while obfuscating has included various cyber operations
a number of Ukrainian targets. In late connections to state involvement conducted by the ‘hacktivist’ collective
March 2022, Russian cyber actors or tasking. Anonymous, and by motivated
disrupted Ukrainian internet service cyber actors volunteering for the
provider Ukrtelecom, which resulted The heightened awareness and IT Army of Ukraine. Pro-Russia cyber
in a widespread internet outage. defensive posture of states around actors engaged in activity related to
Less visible, but with significant the world – including Aotearoa New the invasion has included the groups
impact, Russian information Zealand – is almost certainly helping Killnet, Ghostwriter, and Conti.
operations sowed more chaos into them to ward off malicious cyber
already chaotic circumstances. activity. Incident responders in The proliferation of cyber vigilantes
Ukraine are demonstrating the contributes to the risk of accidental
Russia’s invasion of Ukraine has experience they have earned the escalation. This has presented
put networks around the world at hard way, after years of withstanding challenges around evolving global
a protracted, heightened risk of malicious cyber activity from Russia. cyber norms and what responses
compromise from both state- and to threats from adversary states
non-state-sponsored cyber actors. Importantly, though, Russia is only are considered proportionate
constrained by its decision-makers’ and reasonable.
The cyber threat to global networks desire to be careful to avoid spill-over.
is not limited to malicious cyber This could change at any time.
12 NCSC // Cyber Threat Report 2021/2022

Timeline: A selection of International partnerships


pro-Russia and pro-Ukraine
cyber operations International cooperation across the cyber
landscape has surged in the 2021/2022 year.
13 January 2022 This highlights the importance of states
Discovery of WhisperGate destructive wiper and organisations working in coalition to
malware deployed against Ukrainian targets mitigate threats. There has been a sustained
multilateral effort to provide guidance
14 January 2022 and advisories about what vulnerable
Defacement of Ukrainian government websites organisations should do if targeted.
14 February 2022
Aotearoa New Zealand is a member of the
Successful compromise of Odesa-based
Five Eyes multilateral intelligence sharing
critical infrastructure
arrangement, along with Australia, Canada,
15 February 2022 the United Kingdom, and the United
DDoS activity disables Ukrainian government, States. Being part of a wider international
bank, and radio websites for several hours network with shared interests and values
is fundamental to Aotearoa New Zealand’s
23 February 2022
resilience as a small nation. Through the
HermeticWiper malware impacts Ukrainian finance,
Five Eyes arrangement, which facilitates
IT, and aviation sector organisations
cooperation on issues including cyber, artificial
24 February 2022 intelligence (AI), quantum technology, and
AcidRain wiper malware targets and disrupts space, the GCSB and the NCSC can draw on
the European Viasat KA-SAT satellite service greater support, technology, and intelligence
than would otherwise be available to Aotearoa
24 February 2022 New Zealand.
Russia’s military invades Ukraine
The international community has responded
1 March 2022
to Russia’s invasion of Ukraine with
Defacement of Anonymous’ website
unprecedented solidarity, speed, and strength,
28 March 2022 and has sustained momentum as the situation
Cyber operation against Ukrtelecom leads has evolved. Aotearoa New Zealand’s Five Eyes
to widespread outages across Europe partners quickly declassified intelligence and
made it public. This helped to unify and inform
8 April 2022 groups worldwide working to support Ukraine,
Attempted destructive wiper cyber operation against frustrated the goals of pro-Russia cyber
a Ukrainian energy provider actors by challenging their ability to promote
8 April 2022 false narratives, and enabled the Five Eyes
DDoS activity targets Finland government websites while partnership to more quickly attribute Russian
cyber activity.
the Ukrainian president speaks to the Finnish parliament

22 April 2022
Ukraine’s national postal service targeted
with DDoS activity
While there is a battle on the
9 May 2022 land, in the air, and on the ocean
Russian TV programme breached to screen
raging in Ukraine, there is also
an anti-war message
a battle raging in the cyber and
2 June 2022
information domains.
Ukrainian government organisations
targeted with Cobalt Strike beacons
Andrew Hampton, Director-General,
17 June 2022
Government Communications Security Bureau
DDoS activity delays the Russian president’s speech (May 2022 - Speech to the Wairarapa branch of
at the St. Petersburg International Economic Forum the New Zealand Institute of International Affairs)
NCSC // Cyber Threat Report 2021/2022 13

International norms

The NCSC works closely with its cyber and kinetic operations, Technology plays a key role in global
like-minded partners to promote Aotearoa New Zealand organisations competition. Adversary states will
norms of responsible behaviour in must remain alert to potential cyber shape their cyber calculus based on
cyberspace. International cyber norms threats to their networks. how the international community
are an attempt to gain consensus on responds to Russia’s invasion
acceptable behaviour in cyberspace, Russia’s invasion of Ukraine – and of Ukraine, and how willing the
and more generally to shape the the persistence of both pro-Russia community is to impose costs on
cyber environment. Clarifying and pro-Ukraine cyber activity – will states that conduct malicious cyber
states’ rights and responsibilities continue to challenge the international activity against others. As technological
in cyberspace forms a critical part community’s efforts to uphold innovation continues to drive changes
of managing threats to Aotearoa cyber norms. If the international in actor sophistication, and global
New Zealand networks. community does not maintain a competition more broadly, cyber
consistent approach to state-on-state norms may be further undermined.
In the current geostrategic cyber activity, cyber norms may be
environment, in which states are inadvertently undermined.
targeting other states with both

Hybrid threats

A key theme in the 2021/2022 Russia has strategically used cyber


landscape has been the threat of operations alongside traditional Technology is accelerating
hybrid warfare – and, specifically, how kinetic operations in pursuit of the pace and intensity
Russia might use its hybrid warfare its goals in Ukraine. The malicious
toolkit against Ukraine. Hybrid threats cyber activity observed so far has
of world events, not vice
are a mix of military, non-military, challenged, and will continue to versa; and cyber security
covert and overt activities by state- challenge, assumptions about the is a lead indicator for
and non-state-sponsored actors that role cyber activity plays in hybrid
occur below the line of conventional warfare. One thing is clear: the
world events. What we see
warfare. Cyber as a component use of cyber operations in warfare unfolding in cyberspace
of hybrid warfare could appeal to exacerbates the ever-present threat is then evidenced in the
aggressor states because the potential to internet-connected devices and
attack surface is constantly increasing. the services they support globally.
real world.

The adoption of AI, internet-of-things Malicious cyber activity is


Lisa Fong, Deputy Director-General,
(IoT), telecommunications systems, unconstrained by state borders,
National Cyber Security Centre
machine learning, and quantum and cyber activity can indiscriminately (May 2022 – Speech at CYBERUK,
computing promises technological spill over to target systems all over the United Kingdom Government’s
innovation, but simultaneously the world. This increases the risk of flagship cyber security event)

threatens all internet-connected collateral damage and accidental


systems. Additionally, hybrid warfare escalation caused by misattribution
instils anxiety and undermines public or unintentional disruption of critical
confidence in state security because infrastructure. Notably, North Atlantic
targets are pursued from multiple Treaty Organisation (NATO) Secretary
angles. Cyber security best practice General Jens Stoltenberg said in
and improved information sharing February 2022 that malicious cyber
are needed to help counter the activity could trigger Article 5, the
evolving and adaptive nature Treaty’s principle of collective defence.
of hybrid threats.
14 NCSC // Cyber Threat Report 2021/2022

International standards Supply chain

International standards reflect Cyber security weaknesses, conflict, worldwide increasingly exposed to
best practice and offer a core and climate change, and COVID-19 have a range of potential cyber-related
evolving reference from which all had major impacts on global impacts. A recent development in
organisations internationally can supply chains. In today’s world, it is no supply chain compromise involves
build their security practices. longer sufficient for organisations to the exploitation of software updates
ensure the cyber security resilience of as a means of establishing a
We engage with international their own networks – they must also presence in customer systems.
standards bodies and keep up-to-date consider the security of the entire
with new approaches and challenges, supply chain. The rapid global uptake An example of this is the December
which we take into account when of IoT devices and connected systems 2020 SolarWinds Orion supply chain
updating the New Zealand Information means all organisations are dependent compromise, which had widespread
Security Manual (NZISM). on services that extend beyond what international impact. Malicious cyber
they can oversee and control. The actors strategically compromised a
Internationally, organisations face outsourcing of technology services legitimate software update prior to its
a range of new security issues from can increase productivity and security, distribution by the software provider.
emerging technology. Notable but it can also expose organisations Aotearoa New Zealand attributed the
challenges include the large-scale to more risk by increasing the activity, along with its international
migration of applications to cloud- potential attack surface. partners, to Russian state-sponsored
hosting services, quantum computing, actors in April 2021.
and increasingly dispersed and
interdependent infrastructure. A SUPPLY CHAIN COMPROMISE Malicious cyber actors are shifting
to establish more strategic access
targets software, hardware,
We are working with our partners through the compromise of critical
to better understand the threats
or an IT service provider with supply chains. State-sponsored actors
emerging technology presents to the ultimate aim to exploit are likely pre-positioning on networks
the cyber threat landscape, and downstream customers. beyond their strategic objectives by
the security measures required to gaining access to multiple networks
manage these new risks and threats. globally to enable future exploitation.
The interconnectedness of the It takes a significant amount of time
online environment, together with and resource to develop mechanisms
the comprehensive nature of global to gain access, and maintain
supply chains and interoperability long-term, persistent access,
of technology, leaves networks to multiple networks.

We are committed to the international rules-based order,


which, amongst other things, stipulates global conventions
about accepted behaviour in cyberspace. There are a
number of nation states that routinely operate outside of
those norms. Their activity, and that of sophisticated cyber
criminals, drives an ever-evolving threatscape we engage
with our partners to defend against.

Lisa Fong, Deputy Director-General, National Cyber Security Centre


(April 2022 – Speech, delivering the Royal United Services Institute’s (RUSI) annual
Gallipoli Memorial Lecture)
NCSC // Cyber Threat Report 2021/2022 15

The NCSC assesses both state- and minimum access permissions needed
non-state-sponsored groups will likely to perform its intended function. Zero The guiding principles
continue to seek ways to exploit the trust is an ‘assume breach’ posture, of ZERO TRUST are
digital transformation of organisations, which protects systems from a number

1
and to infiltrate supply chains via of levels of compromise. This is
weak access points. As organisations especially important for online supply
strengthen their own cyber security, chains, where the shift to cloud-based
their exposure to cyber threats in the platforms will increasingly expose weak
supply chain increasingly becomes identity authentication processes. never trust, always verify

their weakest point. Adversaries will The large-scale migration of

2
compromise suppliers to get past applications to cloud-hosting services,
the security controls of the target combined with a global workforce
organisation. This could occur via gravitating towards hybrid work,
vulnerability scanning, the use of presents a number of risks to cyber
privileged access controls held by the security. In a world of increasingly employ a least
supplier, the compromise of legitimate sophisticated cyber threats, the privilege access strategy
software updates, or DDoS activity. NCSC’s advice and standards are
based on a zero trust approach.

3
Supply chain security can be
strengthened with zero trust
architecture. The zero trust model Supply chain risk
leverages the ‘principle of least Read our guidance online at assume breach
privilege’, in which every user www.ncsc.govt.nz/resources/
or device is only given the bare

Disinformation

While disinformation does not fall into While the NCSC has a limited role
the scope of the NCSC’s work, it poses when it comes to disinformation,
challenges to analysis of the cyber we are responsive to reporting from
The war itself is challenging
threat landscape. Malicious cyber our security partners and the public
actors often spread disinformation regarding disinformation campaigns. our notions of conflict
to create confusion and exploit and demonstrating how
divisions among target audiences.
Disinformation multifaceted warfare now
Preceding and following the The deliberate, intentional is, with cyber attacks and
Russian invasion of Ukraine, Russian spread of false and misleading prolific disinformation now
leadership spread disinformation
information designed to accompanying the more
and misinformation worldwide about
achieve a strategic purpose.
Ukraine and its allies in an attempt to traditional forms of combat.
promote their preferred narrative.
Misinformation
The unprecedented declassification Incorrect or misleading Rt Hon Jacinda Ardern,
of intelligence from our Five Eyes Aotearoa New Zealand Prime Minister
information that is not (July 2022 - Speech at the Lowy Institute
partners in response to Russia’s
produced and distributed in Sydney, Australia)
invasion of Ukraine has been
with an underlying purpose.
critical in efforts to counter
Russian disinformation.
16 NCSC // Cyber Threat Report 2021/2022

ABOUT OUR WORK

Mō ā mātou mahi
Our people work at the heart of Aotearoa New Zealand’s cyber defence. We protect our
country’s wellbeing and prosperity as we work towards our vision of a safer and more
resilient digital world for Aotearoa New Zealand. The NCSC supports nationally significant
organisations to improve their cyber security, and we respond to national-level harm and
advanced threats.

Our strategic objectives

Defend National Security Raise Cyber Resilience Facilitate Digital


New Zealand’s information New Zealand’s digital Transformation
security culture is globally environment is able to New Zealand organisations
respected and trusted; withstand adversity, and embrace technology
New Zealand’s values and organisations play an active role responsibly and securely.
way of life are protected. in protecting themselves.

What the NCSC does objectives by streamlining our work the CORTEX initiative and MFN
into four multi-layered areas: detect, service. We use our capabilities
The NCSC is Aotearoa New Zealand’s disrupt, advise, and deter. to protect organisations from
lead organisation for responding malicious cyber activities including
to cyber threats that could have ransomware, DDoS, intellectual
Detect
an impact on national security and property theft, customer data loss,
economic wellbeing. Every day, we and the destruction or dissemination
work to protect Aotearoa New Zealand The NCSC’s cyber security of private communications. We only
and its interests. Our mission is to deploy our capabilities with consenting
technologies find and share
protect Aotearoa New Zealand’s organisations, and do not disclose the
wellbeing and prosperity through
indications of malicious identities of individual organisations
trusted cyber security services. activity or vulnerabilities by receiving our protection.

detecting anomalies and signs


When potentially high-impact cyber The NCSC’s capabilities supplement
security incidents happen, we take of compromise on consenting commercial service offerings because
action to reduce the impact and customer networks. they are tailored to the specific
prevent future harm. We uplift threats Aotearoa New Zealand
cyber resilience throughout Aotearoa Cyber defence is facing. MFN is powered by the
New Zealand, which, in turn, deters The NCSC works with Aotearoa New NCSC’s unique threat insights.
Aotearoa New Zealand’s adversaries Zealand’s nationally significant public
by raising the costs of targeting and private sector organisations We work with our MFN partners to
Aotearoa New Zealand systems. to deploy defensive capabilities, detect and disrupt threats before
We focus on meeting our strategic including those developed through they impact their customers’ systems.
NCSC // Cyber Threat Report 2021/2022 17

These partnerships enable us to


significantly scale our cyber defence
effort across a large range of Aotearoa
New Zealand organisations. We
continue to form partnerships with
private sector organisations in order Disrupt Advise
to facilitate information sharing and
better contribute to cyber resilience
uplift across the board.
What do
we do?
The NCSC’s cyber defence pursues
a future in which Aotearoa New
Zealand’s information security
culture is globally respected and
trusted, and its values and ways Detect Deter
of life are protected.

Disrupt

The NCSC disrupts malicious We deliver MFN in partnership with organisations being compromised,
internet service providers, managed malicious cyber actors continue
cyber activity from harming
service providers and cyber security to find new ways to gain access
its customers’ environments service providers. MFN partners use to systems. Speed of response
by blocking harmful activities our automated threat feed to detect is critical to limiting damage to a
and disrupt threats before they victim’s network and supporting its
through its active disruption
impact their customers’ systems. recovery. We provide a 24/7 incident
capabilities. When required, They provide telemetry back to coordination and response function
our incident responders us, so we can understand the to assist organisations respond to

support customers to evict effectiveness of the MFN threat and recover from potentially high-
intelligence and gain greater impact cyber security incidents.
malicious cyber actors from understanding of the domestic
their networks, and support cyber threat environment. In the event of an incident, we will
the organisation/s through triage the incident, engage with the
MFN now has 11 private sector victim in order to understand the
service restoration and
partners who have live services extent of the activity, and then
recovery. This can involve utilising the MFN threat intelligence; support the victim throughout the
on-site deployment. a range of other organisations have incident’s lifecycle. Our support
enquired about becoming a partner. – which supplements inputs from
Malware Free Networks commercial providers – can include
In November 2021, the NCSC As of 30 June 2022, MFN has now on-site incident response, forensic
launched its MFN capability. This disrupted more than 120,000 threats. analysis, threat intelligence, and
cyber defence tool provides a cyber This figure reflects disruptions of communications advice and guidance.
threat intelligence feed that contains potentially malicious activity with the For significant incidents, we work
indicators of malicious activity, potential to cause significant harm to within the National Security
generated from a range of sources. Aotearoa New Zealand organisations. System to ensure a coordinated,
MFN is a malware detection and all-of-government approach to
disruption service that enables us to Incident response services supporting the incident response.
significantly scale our cyber defence Despite the cyber resilience-raising
effort across a large range of Aotearoa activity undertaken by the NCSC
New Zealand organisations. to prevent Aotearoa New Zealand
18 NCSC // Cyber Threat Report 2021/2022

What’s the harm?

In 2021/2022, detection and disruption networks associated with the invasion. at a point before its value is able
activities undertaken by the NCSC Equally, we recorded a decrease in to be reflected in this calculation.
prevented an estimated NZ$33 million cyber security incidents classified However, there were several instances
of harm to Aotearoa New Zealand’s as highly significant, significant, and in the 2021/2022 year where activity
nationally significant organisations. routine incidents compared with last detected by the MFN capability was
This figure reflects incidents where year. Another potential contributing significant enough to become an
NCSC engagements protected factor is the difference in victim incident. Those incidents are reflected
nationally significant networks from organisations, and the varying in this calculation.
imminent threats, or where our criticality of their roles and services.
response prevented or reduced the The model factors in important
harm caused by targeted attempts to In 2016, the NCSC commissioned impacts such as losses caused
compromise customer organisations. independent research to devise a by intellectual property theft, including
model that could measure the benefits copyright and patent infringement.
The potential factors affecting provided by our interventions. The While assigning a dollar value to
the difference from 2020/2021’s model was reviewed and updated harm prevention can provide a useful
NZ$119 million dollar harm reduction in 2020 to ensure it better reflects benchmark, many of the impacts
calculation are myriad. The decrease international studies about the of cyber harm are intangible. Loss
may reflect our focus on the average cost of cyber security of public confidence and trust,
potential impact of cyber activity as incidents to specific sectors. reduced health and wellbeing, and
a consequence of Russia’s invasion The pre-emptive and preventive hesitance to adopt new technologies
of Ukraine despite no recorded direct nature of our MFN capability means can all eventuate when cyber
cyber impact to Aotearoa New Zealand the impact of MFN generally occurs resilience is low.

Advise

As trusted, independent activity, and manage risks. New Zealand networks. They may
incorporate technical indicators of
advisors, the NCSC reduces We also work to help inform compromise and mitigation advice
the costs of cyber security the information security security teams can use to strengthen
their defences. In the 2021/2022 year,
issues and improves standards for the public
we disseminated 16 NCSC security
Aotearoa New Zealand’s sector, and to ensure advisories and seven international
guidance and advice drives partner security advisories.
information security
maturity by equipping our changes in the public sector. We also contributed to, and co-
customers with actionable badged, the publication of five security
Advisories and alerts advisories with our international
advice. We assess the The NCSC supports Aotearoa New partners. The advisories provided
cyber threat environment Zealand organisations to respond to guidance about: Russian state-
changes in the cyber and technology sponsored and criminal cyber threats
and drive evidence-based threat landscapes by publishing a to critical infrastructure; top routinely
decisions by providing cyber range of security advisories and alerts exploited vulnerabilities; protecting
about potential or current threats. against cyber threats to managed
threat advice that guides
service providers; weak security
our customers to protect Security advisories for our customers controls and practices routinely
share information about specific exploited for initial access; and
their valuable information,
vulnerabilities or types of malicious PowerShell security measures.
prepare for suspicious cyber activity seen targeting Aotearoa
NCSC // Cyber Threat Report 2021/2022 19

We have a formal process for The GCISO leverages the technical cloud environments against the
assessing and triaging CVEs based capabilities of the NCSC, identifies NZISM controls. The templates make it
on their perceived impact to Aotearoa efficient solutions to common security easier for organisations to ensure the
New Zealand. Where a vulnerability challenges, ensures effective policy security of their cloud deployments.
may impact Aotearoa New Zealand, settings are in place across the public
we take a number of actions, one of sector, supports national incident The NZISM Baseline Security
which is to alert nationally significant response efforts, and provides Templates provide a powerful
organisations. In the 2021/2022 system-level information, security demonstration of how the NCSC
year, we disseminated seven critical policy, strategic advice and support can leverage its information security
vulnerability alerts to our customers, across government organisations. expertise and knowledge of the
highlighting nine critical CVEs. domestic cyber landscape to work
Although NCSC alerts are not The GCISO’s efforts are focused with global cloud service providers to
a replacement for organisations’ on supporting the secure digital improve the value of the services they
internal vulnerability monitoring, transformation of the public offer to Aotearoa New Zealand public
they reinforce existing decisions and service. In addition, it is responsible sector organisations. The collaboration
support out-of-cycle patching and for identifying systemic risks and with providers has enabled the GCSB
changes where the vulnerability vulnerabilities; for co-ordinating the to develop templates which are easy
may have a business impact. Government’s approach to information to deploy and cost-effective for
security; and for establishing minimum organisations to implement
The Government Chief information security standards and and manage.
Information Security Officer expectations.
The Director-General of the GCSB Success has been measured by
holds the role of the Government This includes establishing the Aotearoa the deployment of templates;
Chief Information Security Officer New Zealand Government information so far, more than 415 templates
(GCISO), and is responsible for security standards and guidance, have been deployed. As a tool, the
providing a single source of as set out in the New Zealand templates are tangible and useful,
leadership and investment advice Information Security Manual (NZISM). helping government organisations
about information security risks The GCISO utilises the specialised address the hardest part of security
across the public sector. The GCISO knowledge of international best by translating the ‘what’ into the
is able to draw on the unique insights practice and Aotearoa New Zealand’s ‘how’. The templates provide
and observations from the GCSB, threat landscape to help inform the government organisations with
particularly the NCSC, to help inform information security standards for a solution for continuous assurance,
the public sector about risks associated the public sector in a manner that is and, ultimately, increase Aotearoa
with emerging technology. appropriate, responsive, and relevant. New Zealand’s cyber security maturity.
The templates will be regularly
Recent Cabinet papers now support The team responsible for the delivery updated as the NZISM changes,
a mandate that includes visibility of the NZISM has developed two major offering up-to-date recommendations.
of public sector investments in cyber versions for release this year. Version
security alongside the data and digital 3.5 provided updated guidance
In November 2021, the GCSB
system leads. Working with the other for agencies using cloud services,
won the award for the best
system leads, advice can be provided and added zero trust concepts and
both to agencies and the Treasury terminology. Version 3.6 builds on security project at the annual
to ensure cyber security risks the secure use of public cloud for iSANZ (information security)
are addressed. government organisations (released awards. The award recognised
in September 2022). This ties security the GCSB’s work developing
To support the GCISO, a Deputy standards back to the system-level the NZISM Baseline Security
Government Chief Information work the GCISO carries out to support Templates in collaboration with
Security Officer (Deputy GCISO) role the secure digital transformation Amazon Web Services (AWS) and
has been established to carry out of the public service.
Microsoft Azure cloud services.
day-to-day activities and to help direct
This latest award follows the
strategies and objectives. The key Baseline templates
focus of the Deputy GCISO is to engage The primary objective of the templates GCSB’s iSANZ win in 2018,
across the public sector on information is to increase cyber resilience across when its CORTEX capability
security matters, and to ensure Aotearoa New Zealand by helping was named the ‘best security
guidance and advice drives changes public and private sector organisations project or initiative’.
in the public sector. better assess the compliance of their
20 NCSC // Cyber Threat Report 2021/2022

Security Information Exchanges group and participants from various (HIBP). HIBP is an online resource that
and cyber security exercises government organisations. compiles open-source information
Threat information and best practice The NCSC also supported GridEx, about data breaches into a searchable
guidance is also generated by public an industry-led exercise. This database. The service is being used to
and private sector organisations, provided lessons for the National understand potential vulnerabilities
and the information security industry. Cyber Security Exercise, as well as within public sector organisations and
The NCSC facilitates information an opportunity for industry to engage to enable better protection against
sharing among organisations facing directly with government and gain incidents that leverage credential-
similar threats and challenges, a clearer understanding of based targeting.
especially where sharing requires government response processes.
a high level of trust. This primarily A pilot has been successfully delivered
takes place through Security to 15 organisations and has provided
Information Exchanges (SIEs) focused Cyber Security insights into their existing cyber
on critical infrastructure. In the Emergency Response security practices through data
2021/2022 year, we co-chaired 27 Plan (CSERP) analytics, trend reporting,
SIEs across the following six sectors: and tailored guidance. Insights from
critical infrastructure, finance, CSERP sets the framework for HIBP data analysis and organisations’
government, network-provider, the Government’s response to a engagement is also being used to
university, and transport and logistics. improve the NCSC’s approach to
cyber security emergency, and
public sector resilience uplift, policy
prescribes the NCSC as the lead
The NCSC also facilitated the National and guidance.
agency in Aotearoa New Zealand
Cyber Security Exercise. The focus
of the national exercise was testing for incidents categorised as By proactively engaging with
Aotearoa New Zealand’s Cyber Security cyber emergencies. organisations and helping to identify
Emergency Response Plan (CSERP), potential vulnerabilities, we aim to
and verifying it is fit for purpose. While collectively uplift the cyber security
the NCSC led the national exercise, Have I Been Pwned resilience of Aotearoa New Zealand.
it included an interagency steering In early 2022, the NCSC announced its
partnership with Have I Been Pwned

Deter

The NCSC raises the cost the secure provision of public telecommunications
networks to networks in Aotearoa
of targeting Aotearoa telecommunications services.
New Zealand or overseas. Part 3 of
New Zealand networks TICSA establishes a framework under
Regulatory functions
and deters adversaries by Aotearoa New Zealand’s
which telecommunications network
operators are required to engage
providing world-leading telecommunications networks are
with the GCSB, via the NCSC, about
information security services a core part of Aotearoa New Zealand’s
network changes or developments
critical national infrastructure.
to customers. This, in turn, that intersect with national security.
Organisations and individuals rely
makes it more difficult Many of these changes are currently
on network providers for safe and
driven by cloud adoption, increased
for malicious cyber actors secure access to digital capabilities,
demand for remote working, the
and the secure provision of
to target our customers. rollout and expanded capacity
telecommunications services.
This includes work such as: of fibre optic cabling, and the
transition to 5G services.
securing our customers’ The purpose of the
Telecommunications (Interception
sensitive information; public In the 2021/2022 year, the GCSB
Capability and Security) Act 2013
attribution; supporting (TICSA) in relation to network security
received 179 notifications for
assessment of network changes.
robust technology is to prevent, mitigate, or remove
A significant number of these related
investment across Aotearoa security risks arising from the design,
to the continued rollout of 5G, the
build, and operation of public
New Zealand’s critical telecommunications networks,
diversification of market offerings,
international capacity increases,
systems; and supporting or from the interconnection of
and hardware lifecycle upgrades.
NCSC // Cyber Threat Report 2021/2022 21

The GCSB’s other regulatory The GCSB provides technical their cloud service products, making
mandates are derived from the inspection services and advice, and it easier for those standards to be
Outer Space and High-altitude seeks to ensure these facilities are free applied. Through our MFN service, we
Activities Act 2017 (OSHAA), the from vulnerabilities that would allow partner with cyber security providers
Overseas Investment Amendment unauthorised access to information. to make cyber threat intelligence
Act 2021 (OIAA), and the available to help those providers
Radiocommunications Act 1989, Who the NCSC works with defend their customer networks.
which is administered by the Radio (See ‘Malware Free Networks’)
Spectrum Management (RSM)
We work with a number
team at the Ministry of Business, Our work supports the Aotearoa New
Innovation and Employment (MBIE).
of partner organisations Zealand Government’s wider digital
Under both OSHAA and RSM, the to build a cohesive line and data goals. Our work contributes
NCSC and GCSB assist NZSIS and of cyber defence. to some key strategies: the Digital
other organisations in assessing Strategy for Aotearoa, the Strategy
space activities, high-altitude activities, Our primary international for a Digital Public Service, the Data
and radio communications for national relationships are with the cyber Investment Plan and the National
security risks. In the 2021/2022 year, security components of the Australian Cyber Security Strategy, led by
the GCSB conducted 19 assessments Signals Directorate (ASD), the colleagues in the DIA, MBIE, Statistics
of regulated space activities and Canadian Security Establishment (CSE), New Zealand, and the NCPO.
55 assessments of regulated radio the United Kingdom’s Government
spectrum activities. Communications Headquarters Privacy Act 2020
(GCHQ), and the National Security
The GCSB’s growing regulatory role Agency (NSA) and the Department On 1 December 2020, Aotearoa New
also includes supporting the NZSIS of Homeland Security (DHS) in the Zealand’s Privacy Act 2020 came into
to provide advice to the Overseas United States. Respectively, their force. Organisations that carry out
Investment Office about national cyber security components include business in Aotearoa New Zealand are
security risks associated with the Australian Cyber Security Centre bound by the Act regardless of where
proposed overseas investment. (ACSC), the Canadian Centre for Cyber they are based. The law requires
In 2021/2022, the NCSC conducted Security (CCCS), the United Kingdom’s organisations that suffer a significant
42 assessments under the national National Cyber Security Centre (UK breach that either has caused or is
security and public order NCSC), and NSA Cybersecurity and likely to cause anyone serious harm
notifications regime of the OIAA. the Cybersecurity and Infrastructure to report that incident to the Privacy
Security Agency (CISA). Commissioner.
Technical counter surveillance
The NCSC’s Technical Counter- Domestically, we work with CERT When high-impact incidents prompt
Surveillance Unit (TCU) helps NZ, which provides general support the NCSC’s assistance, incident
ensure the Government’s most to businesses, organisations, and responders can provide the forensic
sensitive communications are not individuals affected by cyber security support and expertise required to
intercepted or compromised. incidents; government organisations identify whether personal information
involved in CSERP; and with New has been leaked or stolen, and to
The TCU provides a number of Zealand Police, which is responsible what extent. In 2021/2022, five cyber
services to government, including for investigating crimes that happen security incidents prompted our
technical surveillance counter-measure online. We also work closely with assistance because they possibly
inspections, emanations testing regulators and government advisors, involved a breach of privacy.
and inspections, and advice about including the MBIE, the Overseas
the standards required for sensitive Investment Office, the Department
compartmented information (SCI) site of International Affairs (DIA), and the Personal information
and system accreditation. The TCU National Cyber Policy Office (NCPO).
is information about an
provides recommendations to the
Director-General of the GCSB about the identifiable individual. The
We also collaborate with the private
accreditation of SCI sites and systems. sector, including suppliers to victim
purpose of the Privacy Act
The Director-General of the GCSB is the organisations to support service 2020 is to promote and protect
Government’s accreditation authority restoration. We work with global cloud individual privacy.
for highly classified information service providers to enable them to
systems and sites. build our cyber security standards into
22 NCSC // Cyber Threat Report 2021/2022

CONCLUSION

Whakakapi
In the context of increasing geostrategic
competition, the domestic and international
cyber threat landscapes are entering a new era.

Against the backdrop of pressures The NCSC is focused on building


from Russia’s invasion of Ukraine, relationships in order to achieve
Getting in touch
COVID-19, and rising inflation, greater national resilience. Of the
networks around the world are 29 incidents the NCSC records
If you have any questions
increasingly vulnerable to malicious each month on average, almost
about this report, please
cyber activity. With mounting global half are sourced from international
contact the communications
reliance on complex shared systems and domestic partner reporting.
team at the GCSB.
for the delivery of services, malicious This highlights the criticality of
cyber actors will continue to find new information sharing processes to
The resources and guides
ways to infiltrate weak supply chain our defence of domestic networks.
mentioned in this report can
access points.
be found on the NCSC’s
Aotearoa New Zealand organisations
website: www.ncsc.govt.nz
Looking ahead to 2023 and beyond, must remain alert to potential
Aotearoa New Zealand organisations cyber threats in this geostrategic
To report suspicious activity:
must focus on education to better environment where states are
If your organisation requires
identify and appropriately respond increasingly targeting other states
assistance, please complete
to malicious cyber activity. Cyber with cyber and kinetic operations.
the Cyber Security Incident
security is a continuous improvement We will continue to work closely
‘Request for Assistance Form’
process, rather than an end goal. with our partners to contribute to
(www.ncsc.govt.nz/incidents)
Good cyber security is not only about international efforts to reinforce
You can speak with us
having the right technology; it is also the importance of upholding the
directly, by calling
about having the right processes norms of acceptable behaviour
(04) 498-7654. You can
in place to continuously improve in cyberspace.
also contact us via email
network resilience, and to conduct
at incidents@ncsc.govt.nz.
regular training for staff. All the cyber Malicious cyber actors are becoming
security protections in the world more persistent, more proficient at
For general enquiries,
will not prevent incidents caused identifying vulnerabilities, and more
or to subscribe to
by human error. Implementing zero capable of causing severe impact
NCSC vulnerability
trust architecture reduces risk across to service delivery and information
alerts: Please email
systems by eliminating implicit trust security. In this ever-changing cyber
info@ncsc.govt.nz.
and requiring validation at every landscape, we will continue to defend
access point. Aotearoa New Zealand’s nationally
significant organisations against
International cooperation is also malicious cyber threats in pursuit
more important than ever, as there of our vision of a safer and more
is a realistic possibility geostrategic resilient digital world.
tensions will increase.
NCSC // Cyber Threat Report 2021/2022 23

GLOSSARY

Rarangi
TERM / KUPU DEFINITION / WHAKAMĀRAMATANGA

Advanced A well-resourced, highly skilled cyber actor or group that

kupu persistent threat


(APT) / Tuma
has the time, resources, and operational capability for
long-term intrusion campaigns. Their goal is typically
pakepake arā to covertly compromise a target, and they will persist
atu anō until they are successful. They are very capable of
This glossary of terms is
compromising secured networks using both publicly
included to assist readers’ disclosed, as well as self-discovered vulnerabilities.
understanding. It should
not be interpreted as Cloud service / Provides ubiquitous, convenient, on-demand access to
Ratonga kapua shared pools of computing resources (such as servers,
a comprehensive list of
storage, or online applications).
terms used by the NCSC
to describe the cyber Common A vulnerability is a weakness in software, hardware,
threat environment. vulnerabilities and or a network that can be exploited by an actor.
exposures (CVE) / The Common Vulnerabilities and Exposures (CVE)
Whakaraeraetanga database is a publicly available register of known
vulnerabilities, each assigned a unique identifier
in the format of CVE-xxxx-yyyy.

Credentials / A user’s authentication information used to verify


Whakatūturu identity – typically a password, token or certificate.
pārongo

Cyberspace / The global network of interdependent information


Āteatāurungi technology infrastructures, telecommunication
networks, and computer processing systems in
which online communication takes place.

Cyber security / Measures to protect systems, data, and devices from


Whakahaumaru ā unauthorised access, and ensuring the confidentiality,
ipurangi integrity, and availability of information.

Data breach / The intentional or unintentional release of sensitive


Raraunga wāwāhi or private information into an unsecure environment.

Denial of service An attempt to make an online service unavailable


(DoS) / Whakakore by overwhelming the service with more traffic than
ratonga it can handle.

Disinformation / Ngā The deliberate, intentional spread of false and misleading


kōrero horihori information designed to achieve a strategic purpose.

Exfiltration / Tāhae Where an actor has unauthorised access to private


organisational data (for example, legitimate credentials
or intellectual property), and copies it from a system.

Hybrid threat / Tuma A mix of military, non-military, covert and overt activities
momorua by state- and non-state-sponsored actors that occur
below the line of conventional warfare.
24 NCSC // Cyber Threat Report 2021/2022

TERM / KUPU DEFINITION / WHAKAMĀRAMATANGA

Incident / Maiki An occurrence or activity that appears to have degraded


the confidentiality, integrity, or availability of a data
system or network.

Malicious cyber actor An individual or group of people who seek to exploit


/ Nanakia tūkino computer systems to steal, destroy, or degrade an
mōhiohio organisation’s information. Actors may be individual
computer hackers, part of an organised criminal group,
or state-sponsored.

Malware / Pūmanawa Malicious software or code intended to have an


kino adverse impact on organisations or individuals’ data,
such as viruses, Trojans, or worms.

Mitigation / Ārai Steps that organisations and individuals can take


mōrea to minimise and address cyber security risks.

Nationally significant Organisations such as government agencies, key


organisation / economic generators, niche exporters, research
Whakahaere hira institutions and operators of critical national
ā-Motu infrastructure. If these organisations were affected
by a cyber security incident, the impact could lead
to national-level harm.

Personal information Information about an individual, including name,


/ Ngā mōhiohio date of birth, biometric records, medical, educational,
whaiaro financial, and employment information.

Phishing / The use of fake, deceptive, or alluring messages to solicit


Hītinihanga a behaviour from the recipient – such as clicking a link
or divulging personal information or credentials.

Public attribution A tool used by governments and private sector


/ Whakahuatia organisations to deliberately release information about
whānuitia nō hea the source of a cyber intrusion, primarily to uphold
norms about what constitutes acceptable state behaviour
in cyberspace.

Ransomware / A type of malware designed to disrupt the use of


Pūmanawa utu uruhi computer systems and files until a ransom is paid.

Supply chain A form of attack that targets software, hardware, or an


compromise / Poke IT service provider, where the ultimate aim is exploit
ara ratonga downstream customers.

Virtual private A portion of a large physical server divided into virtual


server (VPS) / Tūmau spaces available for temporary use.
tūmataiti mariko

You might also like