Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityCybersecurity News

New Australian task force to "hack the hackers"

By Security Staff
ransom-freepik1170x658v7.jpg
November 16, 2022

Following the latest Medibank data leaks, Australia’s Cyber Security Minister Clare O’Neil said the government was considering a law that would make it illegal to pay ransoms, according to Australian ABC News. 


O’Neil noted that there were compelling reasons to make it illegal for companies to “try to buy their way out of trouble” while praising Medibank’s decision not to pay a $15 million ransom to prevent the release of user data. 


“The idea that we’re going to trust these people to delete data that they have taken off and may have copied a million times is just frankly silly,” she told Insiders on Sunday. 


She also announced the formation of a new Australian task force, which combines the expertise of the Australian Federal Police (AFP)) and the country’s cyber spy agency, the Australian Signals Directorate, designed to “hack the hackers.” O’Neil said the task force is an entirely new operating model for the two organizations and a permanent standing force of 100 of the “best and most capable cyber experts in [Australia]” that will be undertaking this task for the first time.


“What they will do is scour the world, hunt down the criminal syndicates and gangs” that target Australia in cyberattacks, and disrupt their efforts, O’Neil said. “This is Australia standing up and punching back. We are not going to sit back while our citizens are treated this way and allow there to be no consequences for that.”


When asked to elaborate on the expectations of the task force, O’Neil emphasized that Australia must “shift away from the sense that the only good outcome here is someone behind bars,” noting that the main goals of the government would be to disrupt hacking operations and not allow Australia to be a soft target.


While this approach has been considered for a long time in other parts of the world, “it hasn’t been broadly implemented. This is primarily because it does not work,” says Casey Ellis, Founder and CTO at Bugcrowd. “If a business is existentially threatened by denial-of-access then it’s likely that they’ll opt for breaking the law in the interest of survival. Secondly, organizations now face the unintentional consequence of giving ransom operators more points of leverage, not fewer, in receiving payment. Australia and the ASD have world-renowned offensive and counter-offensive cyber capabilities, as we have seen with their work to actively disrupt offshore scammer infrastructure during the onset of COVID in 2020.”


While there are legal and authorization issues surrounding these types of hack-back or proactive offensive operations, Ellis adds that if there’s one thing that appears to be effective at interrupting Ransomware as a Service (RaaS) or ransomware gangs, “it is exposing their operations and turning them against each other. This would be well within reach of the attack team [the minister] is alluding to here.”

KEYWORDS: cyber security data protection information security ransomware risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Opened padlock on computer keyboard

10 Data Breaches to Know About (April 2026)

Laptop with desktop screen showing

Research: Microsoft Edge Loads Stored Passwords in Cleartext

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

Laptop in darkness

Reframing MFA Bypass: Four Identity Gaps Attackers Exploit

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

SEC 2026 Benchmark Banner

Events

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

June 10, 2026

Applying Agentic AI in Security Operations for Faster Decisions & Better Outcomes

Security teams have never had more visibility. We’ll explore how a new decision layer is helping security teams move from detection to decision. Turn alerts into decision-ready context, reducing reliance on manual triage and enabling faster action.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Related Articles

  • ransomware cyber

    New ransomware task force seeks to disrupt ransom payments

    See More
  • keyboard illuminated in red

    New DHS task force will use AI to mitigate threats

    See More
  • New York Cyber Task Force launches report revealing national cybersecurity response readiness

    See More

Related Products

See More Products
  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • The Complete Guide to Physical Security

  • into to sec.jpg

    Introduction to Security, 10th Edition

See More Products

Events

View AllSubmit An Event
  • October 8, 2025

    How to Support the Security Guard Force in Challenging Environments

    ON DEMAND: In this webinar, learn how organizations are fostering trust among their security guard force to improve security posture and the safety of sites, processes and the officers themselves.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing