Privacy week 2025: Navigating New Zealand’s Evolving Privacy and Cyber Landscape

Intelligence Update. A question of timing: examining the circumstances surrounding the Nauru Police Force hack and leak

Intelligence Update

CyberCX Cyber Intelligence is actively monitoring the cyber threat landscape for threats associated with Australia’s upcoming federal election. This Intelligence Update provides situational awareness of the cyber activities surrounding a recent leak of sensitive emails allegedly held by the Nauru Police Force. CyberCX has not reviewed the contents of the stolen emails in detail and does not intend to. This Update focuses on anomalies in the leaker’s activities that warrant scepticism about their motivations, the integrity of the leaked data and further investigation by journalists and other experts.

Key Points

  • On 2 May 2022, 285,631 files stolen from the Nauru Police Force, including some relating to alleged human rights abuses in Australia’s offshore processing centres, were leaked.
  • CyberCX assesses that the leak, published less than three weeks before an Australian federal election—and exactly one week before early voting opened—is intended to influence Australian politics. The leak also comes at a time of diplomatic tension between Australia and other Pacific countries, particularly Solomon Islands.
  • At this time, there is insufficient evidence to definitively attribute this incident. CyberCX has high confidence that it was not conducted by hacking collective Anonymous as some media outlets have claimed.
  • There are several anomalies that invite scepticism about the motivations of the threat actor and the integrity of the leaked data that warrant further investigation.
  • Hack-and-leak operations are criminal activities (unlike whistleblowing, journalism or political speech) and have been used by malign actors to undermine open and transparent political debate and democratic processes, including elections.

Background

 

Unusual Timeline

CyberCX has developed the following timeline of the Nauru Police Force data leak.

Figure 1 – Timeline of events surrounding the Nauru Police Force leak. Times are in UTC

 

Threat Actor Identity and Motivations

Enlace Hacktivista
Figure 2 – All contributions to Enlace Hacktivista by time (UTC), date and user
Figure 3 – Contributions to Enlace Hacktivista by users other than Mx Yzptlk by time (UTC), date and user

DDoSecrets links with Enlace Hacktivista

Threat Actor Statement

 

Figure 4 – The threat actor’s statement and its sources

 

Political and Geopolitical Context of the Hack and Leak

The leak invokes sensitive, long-standing political issues in Australia under three weeks before an Australian federal election and one week before early voting opened.15

The leak occurred against the backdrop of increasing geopolitical tension in the Indo-Pacific and focus on Australia’s diplomatic relationships with countries in the Pacific.

Hacktivism is increasingly prominent in the global cyber threat landscape.

 


 

This Intelligence Update has been prepared by the CyberCX Cyber Intelligence Team.

Read more about our practices and insights:

If you need assistance responding to a cyber incident, please contact our investigation and response team here.

 


 

Guide to CyberCX Cyber Intelligence reporting language

CyberCX Cyber Intelligence uses probability estimates and confidence indicators to enable readers to take appropriate action based on our intelligence and assessments.

Probability estimates – reflect our estimate of the likelihood an event or development occurs
Remote chance Highly unlikely Unlikely Real chance Likely Highly likely Almost certain
Less than 5% 5-20% 20-40% 40-55% 55-80% 80-95% 95% or higher

Note, if we are unable to fully assess the likelihood of an event (for example, where information does not exist or is low-quality) we may use language like “may be” or “suggest”.

 Confidence levels – reflect the validity and accuracy of our assessments
Low confidence Moderate confidence High confidence
Assessment based on information that is not from a trusted source and/or that our analysts are unable to corroborate. Assessment based on credible information that is not sufficiently corroborated, or that could be interpreted in various ways. Assessment based on high-quality information that our analysts can corroborate from multiple, different sources.

 


 

1] https://ddosecrets.substack.com/p/nauru-police?s=r

2] See, e.g., https://twitter.com/YourAnonTV/status/1521870859107020802

3] https://www.hackread.com/anonymous-leak-police-emails-australia-offshore-detention/

4] Nauru Police Force operates night shifts and is likely to have email activity throughout a 24 hour period. See, e.g., http://ronlaw.gov.nr/nauru_lpms/files/gazettes/df95014e184d17e77f5374f0c41f0d87.pdf

5] We assess that Enlace Hacktivista’s website timestamps are highly likely in the UTC time zone. This assessment is based on cross referenced activity on the website with other sources, including social media posts by a likely member of Enlace Hacktivista and cached versions of the website captured by various open source scrapers showing snapshots of activity.

6] https://www.enalcehacktivista.org

7] https://twitter.com/FlokiNETehf/status/1521836418951270400

8] https://twitter.com/search?q=%22enlacehacktivista%22%20until%3A2022-05-01%20since%3A2007-01-01&src=typed_query&f=top 

9] This analysis does not include several advertising spam accounts that appear to have been registered to the site and subsequently detected in February 2022.

10] An online identity created, and used, for purposes of deception

11] https://ddosecrets.com/wiki/About

12] https://ddosecrets.com/wiki/Category:Cyberwar

13] https://ddosecrets.com/wiki/Frequently_Asked_Questions

14] https://twitter.com/NatSecGeek/status/1502352462220570631

15] Up to 50% of Australians are expected to cast their votes in the federal election before election day: https://www.aph.gov.au/About_Parliament/Parliamentary_Departments/Parliamentary_Library/FlagPost/2022/May/Early_voting_at_the_2022_federal_election

16] https://www.dailydot.com/unclick/anonymous-hack-nauru-australian-immigration/

17] https://www.theguardian.com/australia-news/2016/aug/10/the-nauru-files-2000-leaked-reports-reveal-scale-of-abuse-of-children-in-australian-offshore-detention

18]https://www.aph.gov.au/About_Parliament/Parliamentary_Departments/Parliamentary_Library/pubs/BriefingBook45p/FederalElection2016#:~:text=The%202016%20federal%20election%20was%20the%20first%20double,as%20the%20most%20prominent%20issue%20in%20the%20campaign.

19] https://www.afr.com/politics/federal/policy-backflip-to-remove-all-refugees-from-nauru-20220324-p5a7fb

20] https://www.foreignminister.gov.au/minister/marise-payne/media-release/joint-statement-australia-nauru-cooperation-critical-transport-infrastructure

21] http://naurugov.nr/government/departments/nauru-police-force/australian-federal-police-(afp).aspx

22] https://www.abc.net.au/news/2022-05-04/solomon-islands-manasseh-sogavare-criticises-west-praises-china/101038296

23] https://www.sentinelone.com/labs/hacktivism-and-state-sponsored-knock-offs-attributing-deceptive-hack-and-leak-operations/

 

Other Cyber Security Resources

Ready to get started?

Find out how CyberCX can help your organisation manage risk, respond to incidents and build cyber resilience.