Home Other Australia accuse China stealing telecom data worth $8 Billion

Australia accuse China stealing telecom data worth $8 Billion

0

Australian Security Intelligence Organisation (ASIO) and its Director-General Mike Burgess have publicly stated that Chinese state-linked hackers have probed Australia’s critical infrastructure — particularly telecommunications networks — resulting in estimated losses of about US $8.1 billion (A$12.5 billion) in 2023–24. Reuters+2mint+2

They say two Chinese-associated hacking groups, Salt Typhoon and Volt Typhoon, have targeted Australia’s telecom networks (and U.S. networks) in operations with the potential for espionage and sabotage.

In his remarks, Burgess highlighted that the “telecommunications network was at the top of the nation’s most critical infrastructure list”.

The Chinese government has rejected the allegations, labelling them “false narratives” and diplomatic protests have followed.


Key facts and context

  • The estimated cost of espionage to Australia: A$12.5 billion (~US$8.1 billion) for 2023–24, including about A$2 billion in stolen trade secrets and intellectual property.
  • The targeted sectors mentioned: telecommunications, energy, transport, water infrastructure.
  • The hacking groups: Salt Typhoon (espionage oriented) and Volt Typhoon (probe for sabotage).
  • Australia’s previous move: In 2018 Australia had excluded certain “high-risk” vendors (including Huawei Technologies Co.) from its 5G rollout, citing security concerns.

Why this matters

Strategic & economic risks

If telecom networks are infiltrated, the potential consequences go beyond data theft. According to ASIO, they include:

  • Disruption of services (telecom, power, transport) during key moments.
  • An adversary being able to degrade, manipulate or disable infrastructure during crisis.
  • Ongoing cost to the economy via stolen IP, reduced competitiveness and increased security spending.

Implications for governments and businesses

  • Businesses in Australia are being urged to harden cyber defences, especially in critical infrastructure and telecoms. ABC
  • This issue will likely affect bilateral relations between Australia and China: trade, diplomacy, tech supply-chains.
  • Global reminder: even countries that pride themselves on strong cyber-defence are vulnerable to state-backed threat actors.

What to watch next

  • Verification & further disclosure: How much evidence will Australia publish? Will technical attribution details (which networks, which operators) be made public?
  • Response from China and Australia: Will Australia impose sanctions, or China retaliate diplomatically or economically?
  • Impact on telecoms & infrastructure companies: Will Australia’s domestic operators change procurement policies, exclude “high-risk” vendors further, invest more in cyber-resilience?
  • Global ripple effects: Other countries (especially Five Eyes partners) may raise similar alerts; this could reshape how nations handle telecom security & state-backed cyber threats.

Conclusion

Australia’s accusation that Chinese-state-linked hackers infiltrated its telecom networks and caused around US $8.1 billion in damage highlights the growing scale and sophistication of cyber-espionage in critical infrastructure. It signals a shift from just spying to potential sabotage, and underscores the high stakes for national security in the digital age.

China’s strong denial sets up a tense diplomatic standoff. For Australia (and globally), the episode will likely prompt heightened scrutiny of how telecoms and critical networks are defended — and who helps build and operate them.

NO COMMENTS

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Exit mobile version