• Our Vision

    To be the trusted guardian of
    New Zealand's
    Information Assets

  • Our Goal

    No advanced, technology-borne compromise of the most significant national information infrastructures by June 2016.

NCSC Security Advisory – NCSC-ADV-201507-0110

A leak of  400GB of corporate data from Italian surveillance malware vendor ‘Hacking Team’ in the past week  has  revealed a  number of Adobe Flash Player exploits1.  Adobe has provided a patch for each of these between July 8th and July 15th following the leak which occurred on July 5th.

The NCSC is aware of Flash Player exploits being used in network exploitation. Recent reporting from security companies2,3,4 has shown that high threat APT groups have been quick to leverage the exploits and  use them to compromise targets.  Crime-ware has also taken  advantage of the new exploits and more information is available in reports on-line.

NCSC Advice
The NCSC advises the following actions to aid in protecting your system from these exploits:

  • Maintain up to date patching of operating systems and antivirus.
  • Consider disabling Flash Player in browsers until patched.
  • Explore  methods to control  access  to  webpages utilising Flash Player can limit exposure to potential compromises.
  • Investigate tools like Microsoft’s Enhanced Mitigation Experience Toolkit (EMET)  which aim to prevent vulnerabilities and increase the difficulty of exploiting software.

The NCSC also recommends following the Australian Signal Directorate (ASD) “Top four mitigation strategies to protect your ICT system.”5


[1] Common vulnerability and exposure (CVE) identifiers:





read more

May 2015 New Zealand Information Security Manual

May 2015 New Zealand Information Security Manual

The NZISM is a practitioner’s manual designed to meet the needs of agency information security executives as well as vendors, contractors and consultants who provide services to agencies.  It includes minimum technical security standards for good system hygiene, as well as providing other technical and security guidance for government departments and agencies to support good information governance and assurance practices.

The May 2015 NZISM is now available

This version of the NZISM incorporates new material, principally on Personal Wearable Devices.  Cryptographic requirements (Chapter 17) have been strengthened.  A small number of existing controls have seen wording adjustments and enhancements to improve clarity. Additional explanatory material has been added throughout the document.   

A new chapter (Chapter 20 Data Management) has been inserted to improve searchability and make data management topics simpler to find (previously these resided in several different parts of the NZISM).

As always, comments and suggestions for improvements are welcome.  Please direct these to ism@gcsb.govt.nz





read more

Denial of Service Extortion Campaign Targeting New Zealand Organisations

The NCSC is aware of an extortion campaign currently targeting New Zealand organisations. Several organisations have received extortion emails threatening a sustained Denial of Service attack (DoS) unless a payment is made to the email sender.


If your organisation is currently being targeted, there are a number of measures you can consider taking to reduce the impact of the attack. These measures can be found in the attached NCSC advisory, available here.

read more

CryptoWall Ransomware Campaign Impacting New Zealand Organisations

The  NCSC  is  aware of a  CryptoWall  ransomware  campaign  currently  impacting  New Zealand organisations.  CryptoWall is  malicious software  that encrypts files on  an  infected  computer including any  files  accessible  on  network drives.


The NCSC has provided specific mitigations to protect against this threat.

The full NCSC advisory is available here.

read more

Reporting an Incident

If your organisation has encountered or suspects a cyber-security incident, please complete and return the Cyber Security Incident - Report Form. If you require assistance in dealing with the incident, please complete the Cyber Security Incident – Request for Assistance Form. If required, you can speak with us directly on (04) 498-7654.

Some Interesting Stats

Some interesting stats

In its third year of operation, the NCSC saw an increase in the number of cyber security incidents reported, from a total of 134 in 2012, to a total of 219 in 2013. Scam and spam related incidents were the largest category of reported incidents at 30%. Denial of Service (DoS) attacks and Botnet/Malware activity were the second largest categories, making up 22% and 12% of incidents respectively.

The median number of days a cyber threat was present in victims system before being detected was 299 according to Mandiant’s 2013 MTrends report.  The report says 67 percent of victims were notified of the threat by an external entity. The report is available here.  

Security software provider McAfee log 200 new cyber threats every minute according to their by security software provide McAffee according to their 4th quarter, 2013 threats report. The report is available here.