www.zdnet.com
Open in
urlscan Pro
2a04:4e42:4d::666
Public Scan
URL:
https://www.zdnet.com/article/south-australian-government-employee-data-taken-in-frontier-software-ransomware-attack/?...
Submission: On December 13 via api from US — Scanned from DE
Submission: On December 13 via api from US — Scanned from DE
Form analysis
3 forms found in the DOMGET https://www.zdnet.com/search/
<form class="header-search" method="get" action="https://www.zdnet.com/search/">
<label for="header-search-field" class="hidden">What are you looking for?</label>
<input type="search" id="header-search-field" title="query" autocomplete="off" placeholder="What are you looking for?" tabindex="1" name="q" value="" class="smart-search-input">
<button type="submit" class="search-button" data-omniture-track="moduleClick" data-omniture-track-data="{"moduleInfo": "Header-Search", "pageType": "article"}"> Go </button>
</form>
<form class="modal fixed show">
<div class="_start active">
<div class="info">
<p class="description">Please review our terms of service to complete your newsletter subscription.</p>
</div>
<label class="terms all-tos">
<input type="checkbox" name="user[tos]" required="required" value="1">
<span class="checkbox"></span>
<span class="terms-of-service">
<p> You agree to receive updates, promotions, and alerts from ZDNet.com. You may unsubscribe at any time. By joining ZDNet, you agree to our
<a href="https://redventures.com/CMG-terms-of-use.html" target="_blank" rel="noopener noreferrer nofollow" data-component="externalLink">Terms of Use</a> and
<a href="https://redventures.com/privacy-policy.html" target="_blank" rel="noopener noreferrer nofollow" data-component="externalLink">Privacy Policy</a>. </p>
</span>
</label>
<label class="terms gdpr-tos">
<input type="checkbox" name="user[firstPartyOptIn]" value="1">
<span class="checkbox"></span>
<span class="terms-of-service">
<p> You agree to receive updates, promotions, and alerts from ZDNet.com. You may unsubscribe at any time. By signing up, you agree to receive the selected newsletter(s) which you may unsubscribe from at any time. You also agree to the
<a href="https://redventures.com/CMG-terms-of-use.html" target="_blank" rel="noopener noreferrer nofollow" data-component="externalLink">Terms of Use</a> and acknowledge the data collection and usage practices outlined in our
<a href="https://redventures.com/privacy-policy.html" target="_blank" rel="noopener noreferrer nofollow" data-component="externalLink">Privacy Policy</a>. </p>
</span>
</label>
<button>Continue</button>
<div class="alert-error">
<div class="required-error">
<div class="warning-label"></div>
</div>
</div>
</div>
</form>
Name: newsletterWidgetForm-944 — POST https://www.zdnet.com/newsletter/xhr/widget-register/
<form class="newsletterWidgetForm" id="newsletterWidgetForm-944" name="newsletterWidgetForm-944" action="https://www.zdnet.com/newsletter/xhr/widget-register/" data-user-submit="newsletterWidgetForm" method="POST">
<input type="hidden" id="authentication_csrf" name="csrf" value="4Ecu2uqUWV_5vrn2-pI_MY_GPBsFMwBhXy-SKhf6CmU">
<input type="hidden" id="newsletter_registration_form_newsletter" name="newsletter_registration_form[newsletter]" required="required" value="e566">
<div class="mmode mmode-nls">
<label class="checkbox">
<b>ZDNet Security</b> Your weekly update on security around the globe, featuring research, threats, and more. </label>
<label class="hidden required" for="newsletter_registration_form_email">Email Address</label>
<input type="email" id="newsletter_registration_form_email" name="newsletter_registration_form[email]" required="required" data-validate="email" placeholder="Your email address">
<button type="submit" id="newsletter_registration_form_submit" name="newsletter_registration_form[submit]" class="btn btn-primary">Subscribe</button>
</div>
</form>
Text Content
* * Central Europe * Middle East * Scandinavia * Africa * UK * Italy * Spain * Newsletters * Blogs * Menu More * Central Europe * Middle East * Scandinavia * Africa * UK * Italy * Spain * Estonia * European Union * Mobility * Hardware * Innovation * See All Topics * Newsletters * Blogs * Downloads * Reviews * Galleries * Videos * Edition: EU * Asia * Australia * Europe * India * United Kingdom * United States * ZDNet France * ZDNet Germany * ZDNet Korea * ZDNet Japan * * What are you looking for? Go * Join / Log In * Account * Preferences * Community * Newsletters * Log Out must read: Log4j flaw: Attackers are making thousands of attempts to exploit this severe vulnerability SOUTH AUSTRALIAN GOVERNMENT EMPLOYEE DATA TAKEN IN FRONTIER SOFTWARE RANSOMWARE ATTACK At least 38,000 and up to 80,000 SA government employees may have had their data accessed, the South Australian Treasurer has said. * * * * * * * Written by Chris Duckett, APAC Editor Chris Duckett APAC Editor Chris started his journalistic adventure in 2006 as the Editor of Builder AU after originally joining CBS as a programmer. After a Canadian sojourn, he returned in 2011 as the Editor of TechRepublic Australia, and is now the Australian Editor of ZDNet. Full Bio on December 10, 2021 | Topic: Security Image: Mashka/Shutterstock South Australia Treasurer Rob Lucas said on Friday that state government employee data has been exfiltrated as part of a ransomware attack on payroll provider Frontier Software. Lucas said the company has informed government that some of the data have been published online, with at least 38,000 employees and up to 80,000 government employees possibly having their data accessed. The data contained information on names, date of birth, tax file number, home address, bank account details, employment start date, payroll period, remuneration, and other payroll-related information. "We can confirm that no Department for Education employees are affected," Lucas said in a statement. "The government's priority is the safety and security of every employee affected by this incident, and we are doing all we can to provide assistance to impacted employees." Frontier Software has been handling payroll for South Australia since 2001. On its site, the government states it "undertakes regular independent security tests and reviews" of Frontier Software. Last month, Frontier Software was attacked on November 13 and alerted its customers to what it labelled as a "cyber incident" on November 16. It said its systems were restored on November 17. "To date, our investigations show no evidence of any customer data being exfiltrated or stolen. Whilst the incident resulted in some of Frontier Software's Australian corporate systems being encrypted, Australian customer HR & Payroll data and systems are segmented from the corporate systems and were not compromised," it said on November 17. On Thursday, the company sang a different tune. "The ongoing forensic investigation and other response activities conducted by Frontier Software and CyberCX has now confirmed evidence of some data exfiltration from Frontier Software's internal Australian corporate environment," it said. "We have not identified evidence of compromise or exfiltration outside this segmented environment. "We have further identified that some of the data exfiltrated from our internal corporate environment relates to a small number of Frontier Software customers. We are now in the process of directly notifying these customers that they may be affected." During November, the ABC reported Federal Group, the owners of Hobart's Wrest Point casino, had to make advance payments of AU$250 to staff due to the attack on Frontier Software. RELATED COVERAGE * Queensland government energy generator says ransomware attack not state-based * Colorado energy company loses 25 years of data after cyberattack while still rebuilding network * Ransomware attackers targeted this company. Then defenders discovered something curious * Bosses are reluctant to spend money on cybersecurity. Then they get hacked * DOJ gives Russian national two-year sentence for work shielding Kelihos malware and other ransomware * FBI: Cuba ransomware group hit 49 critical infrastructure organizations Australia | Security TV | Data Management | CXO | Data Centers Show Comments LOG IN TO COMMENT * My Profile * Log Out | Community Guidelines JOIN DISCUSSION Add Your Comment Add Your Comment RELATED * * * * * * Log4j zero-day flaw: What you need to know and how to protect yourself Security * Log4j flaw: Attackers are making thousands of attempts to exploit this severe vulnerability Security * Log4j RCE activity began on December 1 as botnets start using vulnerability Security * US, Australia and Japan stump up for subsea cable between Nauru, Kiribati and Federated States of Micronesia Networking * Mozilla rolls out GPC for all Firefox users, but enforcement limited to two states Security * Volvo announces some R&D files stolen during cyberattack Ransomware * UK High Court reverses course, approves Julian Assange's extradition to US Legal * German logistics giant Hellmann reports cyberattack Security * Brazilian Ministry of Health suffers cyberattack and COVID-19 vaccination data vanishes Security Please review our terms of service to complete your newsletter subscription. You agree to receive updates, promotions, and alerts from ZDNet.com. You may unsubscribe at any time. By joining ZDNet, you agree to our Terms of Use and Privacy Policy. You agree to receive updates, promotions, and alerts from ZDNet.com. You may unsubscribe at any time. By signing up, you agree to receive the selected newsletter(s) which you may unsubscribe from at any time. You also agree to the Terms of Use and acknowledge the data collection and usage practices outlined in our Privacy Policy. Continue NEWSLETTERS You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center. ZDNet Security Your weekly update on security around the globe, featuring research, threats, and more. Email Address Subscribe See All See All ZDNet Connect with us © 2021 ZDNET, A RED VENTURES COMPANY. ALL RIGHTS RESERVED. Privacy Policy | Cookie Settings | Advertise | Terms of Use * Topics * Galleries * Videos * Sponsored Narratives * Do Not Sell My Information * About ZDNet * Meet The Team * All Authors * RSS Feeds * Site Map * Reprint Policy * Manage | Log Out * Join | Log In * Membership * Newsletters * Site Assistance * ZDNet Academy Cookie Settings We use cookies and similar technologies to understand how you use our services, improve your experience and serve you personalized content and advertising. By clicking "Accept All", you accept all cookies. By clicking "Reject All", you reject all cookies except Strictly Necessary cookies. To manage your cookies and learn more about our use of cookies click “Cookie Settings”.Learn more. Cookie Settings Reject All Accept All