Around 30GB of commercially sensitive data has been compromised in a hack on an Australian government contractor, including details about new fighter planes and navy vessels.
The Australian government has revealed that a hacker a year ago breached a small, domestic national security contractor and stole data relating to multiple military projects.
The report mentions that the Australian Signals Directorate (ASD) had named the advanced persistent threat (APT) as "Alf". Pyne also said the hacker is still unknown.
The Australian defence industry minister has confirmed on Thursday that top secret data about the Joint Strike Fighter programme and other military hardware has been stolen.
Clarke said the attacker accessed the small contractor's systems for five months in 2016, and the "methodical, slow and deliberate", choice of target suggested a nation-state actor could be behind the raid.
The minister also assured the public that the hack was not a risk to national security. The time period between July and November when the contractor was unaware of the hack is being called "Alf's Mystery Happy Fun Time".
Sensitive information about Australia's F-35 stealth fighter and other military hardware was stolen during a cyber-attack a year ago, it has emerged. "The ASD and the cyber security office immediately swung into action", he said.
The password to enter the enter the company's web portal was "admin" and the guest password was "guest", according to ZDNet, which first reported the story.
"Fortunately the data that has been taken is commercial data, not military data", he said.
Australia's cyber security has dubbed the mystery hacker, "Alf", after the beloved Australian TV soap Home and Away.
"We see this all the time".
"Security thinking needs to change; organisations need to move away from the concept of owned and unowned networks or infrastructure and consider only users, applications and secure access - and the security industry must facilitate that shift".
Clarke described the breach Wednesday at an information security conference in Sydney, saying only one person managed all IT-related functions at the small business, and had only been in the position for nine months as staff turnover was high, ZDNet reports. "Which means that, in the inevitability of a breach occurring, the data to which hackers can gain access is constrained".