Optus Outage Causes Chaos in Australia before Services Restored

Australian communications company Optus was hit by a major service outage on Wednesday. Saeed KHAN / AFP
Australian communications company Optus was hit by a major service outage on Wednesday. Saeed KHAN / AFP
TT

Optus Outage Causes Chaos in Australia before Services Restored

Australian communications company Optus was hit by a major service outage on Wednesday. Saeed KHAN / AFP
Australian communications company Optus was hit by a major service outage on Wednesday. Saeed KHAN / AFP

An outage at No.2 Australian telco Optus left nearly half the population without internet or phone on Wednesday, throwing payment, transport and health systems into chaos and raising questions about the fragility of the country's core infrastructure.
The outage was first reported about 4 a.m. local time (1700 GMT on Tuesday) and it was not until almost 5.30 p.m. that Optus said services had been restored, Reuters reported.
Some 10 million Australians, 40% of the population, are Optus customers and could not use smartphones, broadband internet or landlines for much of the day.
Hospitals couldn't take phone calls, small businesses were unable to process electronic payments and train networks and ride share services were down simultaneously in some cities.
The incident sparked criticism about the robustness of Australia's telecommunications network and in particular about Optus, which is owned by Singapore Telecommunications.
"Customers are clearly frustrated about it and Optus should respond to that accordingly," said Communications Minister Michelle Rowland.
No cause of the failure was given but "it has occurred deep within the network (and) it has wide ramifications across mobile, fixed, and broadband services for Optus customers", Rowland added.
Optus reported one of the country's biggest cyber breaches 14 months ago, but CEO Kelly Bayer Rosmarin said she did not believe the latest outage was the result of a hack.
"I mean, it's highly unlikely. Our systems are actually very stable," she said. "This is a very, very rare occurrence."
Under laws introduced in the fallout of the 2022 Optus cyber attack, Australian companies must report to the government within 72 hours if they believe they have experienced a cyber attack.
Industry analyst Paul Budde said the incident showed telecoms companies should be required to accept customers from rival carriers on their networks in emergencies - a reform he said the industry had long resisted.
"These networks aren't just commercial operations," he said in a blogpost. "They are vital infrastructure for our society and economy. Protecting the national interest in the face of serious network failures is paramount."
Parent company SingTel said earlier this year that after the cyber attack Optus made several investments to lift its capabilities and provide additional protection for customers. In a short statement, SingTel confirmed the incident without explanation and noted Optus had apologized.
SingTel shares were down 4.8% on the Singapore stock market.
CUT OFF & FRUSTRATED
Chaos ensued as almost half of Australia was disconnected, one of the biggest network outages the country has witnessed.
"Without my phone I pretty much can't do anything. I'm looking for a bank, and when you can't go onto your phone and Google pretty much you are lost," said Angela Ican, a security officer, in Sydney's central business district.
Melbourne's train networks were forced to shut down for about 30 minutes due to the outage, resulting in delays during the morning rush, media reported.
Hospitals and emergency services across the country were also affected. No. 1 private hospital owner Ramsay Health Care said phone services to its 70 hospitals and clinics were impacted. Emergency triple zero ("000") calls were not working from Optus landlines.
Banking services, including some ATMs using Optus, were also impacted. Commonwealth Bank, the country's biggest lender, said some customers may encounter difficulties with its services.
"Maybe this incident will cause us to have a closer look at how we want to run this critical national infrastructure across multiple private companies," said Bill Corcoran, an Australian Research Council Future Fellow at Monash University.



US Judge Finds Israel's NSO Group Liable for Hacking in WhatsApp Lawsuit

Israeli cyber firm NSO Group's exhibition stand is seen at "ISDEF 2019", an international defense and homeland security expo, in Tel Aviv, Israel June 4, 2019. REUTERS/Keren Manor/File Photo
Israeli cyber firm NSO Group's exhibition stand is seen at "ISDEF 2019", an international defense and homeland security expo, in Tel Aviv, Israel June 4, 2019. REUTERS/Keren Manor/File Photo
TT

US Judge Finds Israel's NSO Group Liable for Hacking in WhatsApp Lawsuit

Israeli cyber firm NSO Group's exhibition stand is seen at "ISDEF 2019", an international defense and homeland security expo, in Tel Aviv, Israel June 4, 2019. REUTERS/Keren Manor/File Photo
Israeli cyber firm NSO Group's exhibition stand is seen at "ISDEF 2019", an international defense and homeland security expo, in Tel Aviv, Israel June 4, 2019. REUTERS/Keren Manor/File Photo

A US judge ruled on Friday in favor of Meta Platforms' WhatsApp in a lawsuit accusing Israel's NSO Group of exploiting a bug in the messaging app to install spy software allowing unauthorized surveillance.

US District Judge Phyllis Hamilton in Oakland, California, granted a motion by WhatsApp and found NSO liable for hacking and breach of contract.

The case will now proceed to a trial only on the issue of damages, Hamilton said. NSO Group did not immediately respond to an emailed request for comment, according to Reuters.

Will Cathcart, the head of WhatsApp, said the ruling is a win for privacy.

"We spent five years presenting our case because we firmly believe that spyware companies could not hide behind immunity or avoid accountability for their unlawful actions," Cathcart said in a social media post.

"Surveillance companies should be on notice that illegal spying will not be tolerated."

Cybersecurity experts welcomed the judgment.

John Scott-Railton, a senior researcher with Canadian internet watchdog Citizen Lab — which first brought to light NSO’s Pegasus spyware in 2016 — called the judgment a landmark ruling with “huge implications for the spyware industry.”

“The entire industry has hidden behind the claim that whatever their customers do with their hacking tools, it's not their responsibility,” he said in an instant message. “Today's ruling makes it clear that NSO Group is in fact responsible for breaking numerous laws.”

WhatsApp in 2019 sued NSO seeking an injunction and damages, accusing it of accessing WhatsApp servers without permission six months earlier to install the Pegasus software on victims' mobile devices. The lawsuit alleged the intrusion allowed the surveillance of 1,400 people, including journalists, human rights activists and dissidents.

NSO had argued that Pegasus helps law enforcement and intelligence agencies fight crime and protect national security and that its technology is intended to help catch terrorists, pedophiles and hardened criminals.

NSO appealed a trial judge's 2020 refusal to award it "conduct-based immunity," a common law doctrine protecting foreign officials acting in their official capacity.

Upholding that ruling in 2021, the San Francisco-based 9th US Circuit Court of Appeals called it an "easy case" because NSO's mere licensing of Pegasus and offering technical support did not shield it from liability under a federal law called the Foreign Sovereign Immunities Act, which took precedence over common law.

The US Supreme Court last year turned away NSO's appeal of the lower court's decision, allowing the lawsuit to proceed.