The attack reportedly targeted the e-mail system for Australia's Parliament House, which is used for nonsensitive communications among parliament members.
2
The user authentication system (nonsensitive information).
3
Only "jump boxes," servers that bridge the divide between sensitive manufacturing control systems and nonsensitive IT systems, connected them.
4
Therefore, if you want to truly "erase" a drive or volume, you must somehow write new nonsensitive data on top of it.