All cases

Australian Parliament and Political Party Intrusions

January – February 2019

EspionagePeak: IntrusionAttribution: Moderate ConfidenceGovernment
Year
2019
Actor country
Unknown (officially); China (widely assessed)
Target regions
Australia
Unpeace score
5

Executive Summary

Intrusions into the Australian Parliament House network and the networks of three major political parties, discovered weeks before a federal election. Australia's Prime Minister publicly attributed the activity to a 'sophisticated state actor' without naming the responsible country. Reporting widely assessed China as the likely sponsor, though this was never officially confirmed.

Why This Matters

The compromise of a parliament and major parties during an election cycle demonstrated that cyber espionage against democratic institutions is a live risk, even when the collected intelligence is never publicly weaponized.

Escalation Profile

7-Dimension Profile

Escalation Ladder

Probing
Intrusion
Disruption
Degradation
Destruction
Strategic

Phases

2019-02-01
Intrusion

Parliamentary network compromise

Unauthorized access detected on the Parliament House network, prompting a forced password reset for all users.

2019-02-18
Intrusion

Political party network access

Investigation revealed the same actor had also compromised networks of the Liberal, Labor, and National parties.

Threshold Crossings

  • Compromise of a national legislature and ruling/opposition parties during an election period
  • Blurred line between traditional espionage and potential election interference

Restraint Factors

  • No destructive or disruptive actions taken — activity consistent with intelligence collection
  • No public evidence of data weaponization or influence operations

Attribution Assessment

Moderate ConfidenceDescribed by the Australian government as a 'sophisticated state actor'; widely assessed in reporting to be China-linked, but never officially confirmed
Unknown (officially); China (widely assessed)
1. Technical

Threat actor mapped to Unknown (officially); China (widely assessed) based on infrastructure analysis, malware attribution, and operational patterns.

2. Political / Legal
Public Attribution
  • Prime Minister Morrison public statement attributing to a 'sophisticated state actor' (Feb 2019)
  • Australian Signals Directorate led incident response
  • Accelerated Australian Cyber Security Strategy 2020 development

Sources: Australian PM Morrison: Statement on Cyber Incident Affecting Parliament; Australian Cyber Security Centre: Advisory on Parliament Compromise

3. Open Source

No dedicated journalistic sources in dataset. See sources section for full references.

Moderate Confidence” reflects available public evidence. All assessments carry inherent uncertainty and should be read alongside source material.

Unpeace Position

5

Unpeace Score

Composite severity rating on the peace–conflict spectrum

Stable
Contested
Escalatory
03060100

Contributing Dimensions

Escalation peak2/6
Threshold crossings2/4
Governance flags2/8
Sectors affected1/6
Entanglement3/10
Country scope1/6

Coercive Function

Espionage

Intelligence collection — coercive value lies in the information advantage gained and the implicit signal that the adversary can access sensitive systems.

Observed coercive effects

  • Compromise of a national legislature and ruling/opposition parties during an election period
  • Blurred line between traditional espionage and potential election interference

Entanglement Risk

Entanglement score3

Sectors affected

Government

Countries / regions

Australia

Impact summary

Unauthorized access to parliamentary and political party networks; scope of data exfiltration not publicly disclosed.

Infrastructure Meaning

Capability profile

Unauthorized access to parliamentary and political party networks; scope of data exfiltration not publicly disclosed.

3 ATT&CK techniques mapped — see ATT&CK mapping below.

Governance Analysis

Governance Flags

!Norm Violation
APublic Attribution
SSanctions Imposed
IIndictment
UUN Discussion
RRegulatory Change
CInternational Cooperation
DDeterrence Signal

Norms invoked

  • Non-interference in democratic processes
  • UN GGE norms on responsible state behavior in ICT use

Policy responses

  • Prime Minister Morrison public statement attributing to a 'sophisticated state actor' (Feb 2019)
  • Australian Signals Directorate led incident response
  • Accelerated Australian Cyber Security Strategy 2020 development

Regulatory changes

  • Strengthened political party cybersecurity guidance from the Australian Cyber Security Centre
  • Informed the Critical Infrastructure Security Act 2022 (SOCI Act) expansion

Governance impact assessment

Elevated political-party cybersecurity as a democratic integrity issue and contributed to Australia's broader critical infrastructure security reforms.

Sources

G

Australian PM Morrison: Statement on Cyber Incident Affecting Parliament

Government2019-02-18
G

Australian Cyber Security Centre: Advisory on Parliament Compromise

Government2019-02

Sources listed reflect publicly available materials used to construct this case entry. Inclusion does not imply endorsement. Where no URL is provided, the source may be found via its title and date.