Hacking Back

Overview and Background

“Hacking back” generally refers to proactive steps taken by the victim of a cyberattack to retaliate against an assailant. Such measures may include:
  • identifying the source of an attack, for example by probing an attacker’s infrastructure for weaknesses or information revealing attribution;
  • thwarting or stopping the crime, such as disabling malware or launching denial-of-service countermeasures; or
  • destroying or recovering stolen material, for instance by remotely accessing a target’s servers to delete or retrieve stolen data.

The term is used interchangeably with "active defence,' "counter-hacking," and "retaliatory hacking". It encompasses actions that blur the line between defensive and offensive cyber activity, and raises legal and policy concerns about attribution, collateral damage, escalation, and accountability.

In November 2022, following the Optus and Medibank breaches (see LitigationAndInvestigations), the Commonwealth announced a Joint Standing Operation Against Cyber Criminal Syndicates (JSO) between the Australian Federal Police (AFP) and the Australian Signals Directorate (ASD) to “hack the hackers.” The JSO was framed as targeting ransomware groups and criminal syndicates, with ministers promising day-to-day disruption of operations. Commentators noted that it largely extended existing disruption practices, but the announcement of the JSO iteslf signalled a more assertive posture.

In Australia, hacking back by private entities is unlawful. Part 10.7 (Computer Offences) and Part 10.8 (Financial Information Offences) of Schedule 1 of the Criminal Code Act 1995 (Cth) (the Criminal Code) (as inserted by the Cybercrime Act 2001 (Cth)) make it an offence to:
  • access, modify or impair restricted data or electronic communications without authorisation (ss 477.1477.3, 478.1478.3);
  • create or distribute malicious software (s 477.2); and
  • dishonestly obtain or deal in personal financial information (s 480.4).
Some national security and law enforcement agencies may exercise powers that resemble hacking back:
  • Australian Security Intelligence Organisation Act 1979 (Cth) (ASIO Act):
    • Under s 25A (computer access warrants), the Attorney-General may authorise ASIO to access a specified computer to collect intelligence relevant to a defined “security matter”. Such warrants may permit adding, copying, deleting or altering data where necessary to obtain access or conceal activities, but not for general disruption.
    • Related warrants include s 27A (foreign intelligence warrants) and s 27C (identified person warrants).
  • Surveillance Devices Act 2004 (Cth) (following changes effected by the Surveillance Legislation Amendment (Identify and Disrupt) Act 2021 (Cth)), Part 2, Divisions 4–6 provide for:
    • computer access warrants (s 27D), permitting covert entry to data;
    • data disruption warrants (s 27KA), expressly authorising modification, deletion or disruption of data to frustrate serious offences; and
    • network activity warrants (s 27KK), enabling the mapping of criminal networks.
    • These provisions empower the AFP and ACIC, under judicial or Australian Review Tribunal authorisation, to engage in disruption activities that fall within the concept of hacking back.
  • Intelligence Services Act 2001 (Cth):
    • The ASD, ASIS and AGO are generally restricted to operations outside Australia (ss 67).
    • ASD’s functions include preventing or disrupting cybercrime by persons overseas (s 7(1)(c)).
    • Ministerial authorisation under ss 89 may extend powers in limited circumstances, but the Act prevents agencies from exercising activities that fall within ASIO’s warrant-based remit.

Regulatory & Policy Framework

Relevant Organisations

Industry Materials

This site is powered by FoswikiCopyright © by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding AustLII Communities? Send feedback
This website is using cookies. More info. That's Fine