falconfeeds
Features
Solutions
Resources
Plans
Contact US
© 2025 T-Sanct Technologies Pvt Ltd.
falconfeeds
Features
Solutions
Resources
Plans
Contact US
© 2025 T-Sanct Technologies Pvt Ltd.

HOME | BLOGS | CATEGORY | Cyber Attacks in Australia (January - September 2024): A Comprehensive Analysis

Oct, 24 2024
17 mins read

Cyber Attacks in Australia (January - September 2024): A Comprehensive Analysis

Cyber Attacks in Austarlia

Introduction

Australian cyberspace has faced significant challenges from cyber attacks in 2024. Between January and September, 309 incidents were recorded, revealing the high volume and varied nature of cyber threats. With data sourced from FalconFeeds.io, this analysis explores monthly trends, attack types, impacted industries, and platforms involved. The findings underscore the urgent need for strengthened cybersecurity measures to protect both businesses and governmental institutions from rising cyber threats.


Monthly Incident Distribution

The number of cyber attacks fluctuated across the months, with August standing out as the peak month (43 incidents) and May experiencing the lowest count (26 incidents). This trend points to an increase in cybercriminal activity as the year progresses, highlighting the need for vigilant monitoring and proactive defenses.

Incident Count

Incident Count

Category-Wise Incident Analysis

The data reveals Access Sales as the leading attack category, with 80 recorded incidents, followed by Data Breaches (66) and Ransomware (62). The frequency of access sales suggests a high demand for unauthorized access, while data breaches and ransomware continue to pose critical risks, reflecting ongoing challenges in securing sensitive information.

Ransomware

Ransomware

Ransomware and Access Sale Trends

Ransomware and Access Sale incidents together underscore the persistent cyber threat landscape in Australia. Ransomware attacks spiked from May to August, peaking in August with 12 incidents, while earlier activity surged in April with 11 incidents, highlighting the ongoing focus of ransomware operators on Australian sectors. Access Sales, similarly, posed a consistent threat throughout the period, with the highest incidents recorded in January (15) and only a slight decrease after April. Together, these trends reflect the demand for unauthorized access and highlight the critical need for improved defenses against both ransomware and unauthorized access sales across industries.

Ransmomware & access sales

Ransmomware & access sales

Data Breach and Data Leak Trends

Data Breaches and Data Leaks together highlight the ongoing data security challenges within Australian organizations. Data breaches remained steady, with the highest counts in April and June (10 each), reflecting persistent vulnerabilities in protecting sensitive information. Data leaks, though less frequent, spiked in August (10 incidents), posing significant risks as leaked information often surfaces on underground forums. Combined, these trends emphasize the critical need for stronger security frameworks to prevent unauthorized access and the exposure of valuable data across various industries.

Data breach vs Data leak

Data breach vs Data leak

DDoS and Defacement Trends

Distributed Denial-of-Service (DDoS) attacks and defacements occurred sporadically, with a peak in DDoS incidents in May (9). Defacement activity was also notable in June and September, indicating an ongoing interest from hacktivists or cybercriminals in disrupting websites, particularly those in the public sector.

Data leak vs DDoS attack

Data leak vs DDoS attack

Industry-Wise Incident Distribution

Among affected industries, Technology & IT Services was most impacted (27 incidents), followed closely by Consumer Services & Goods (22) and Manufacturing & Industrial (20). The high exposure of these sectors reflects their importance to cybercriminals, whether for the digital assets of technology firms or the critical role of manufacturing in the supply chain.

Industry

Industry

Platform-Wise Incident Distribution

Breach Forums (70 incidents) and Exploit Forums (73 incidents) were prominent platforms for leaking, selling, or trading compromised data. The active use of these forums by cybercriminals illustrates the underground market’s role in facilitating cybercrime.

Chart

chart

Notable Ransomware Groups

1. RansomHub

  • Incident Count: 9
  • Overview: RansomHub surfaced in February 2024 as a new Ransomware-as-a-Service (RaaS) group and quickly made a significant impact. The group primarily targeted key sectors such as Building & Construction, Consumer Services & Goods, Business & Professional Services, and Education. Its rapid rise in activity underscores its growing threat potential within the region. The group's ability to penetrate multiple sectors in a short period raises concerns about its future trajectory and the increasing risks it poses to Australian industries.

2. LockBit 3.0

  • Incident Count: 6
  • Overview: LockBit 3.0 emerged as one of the most active ransomware groups during this period, operating under a Ransomware-as-a-Service (RaaS) model. Despite facing a temporary disruption in February 2024 due to Operation Cronos—an international crackdown aimed at halting their operations—the group displayed remarkable resilience, resuming activities within a week. LockBit 3.0 primarily focused its attacks on the Business & Professional Services, Media, Arts, & Entertainment, Wholesale & Retail, and Government & Public Sector industries, demonstrating its adaptability and continued dominance in the ransomware landscape.

3. Hunters International

  • Incident Count: 5
  • Overview: Hunters International, a Ransomware-as-a-Service (RaaS) group that emerged in the second half of 2023, has quickly gained attention for its sophisticated operations, exhibiting technical similarities to the notorious Hive ransomware group. Hunters International has primarily targeted industries such as Business & Professional Services, Building & Construction, Healthcare, and Technology & IT Services. Its strategic focus on high-value industries highlights its potential for further disruptive attacks and underscores the need for enhanced defense mechanisms in these sectors.

4. Medusa

  • Incident Count: 6
  • Overview: Medusa, a ransomware group that began operating under the name Medusa Blogs in early 2023, has built a significant online presence across social media, the open web, and dark web forums. The group has predominantly targeted Consumer Services & Goods, Energy & Utilities, Science and Research, and Wholesale & Retail sectors. Medusa's widespread activity across diverse industries reflects its broad attack strategy and growing influence in the ransomware ecosystem.

Key Insights

  • Ransomware and Access Sale Dominance: Ransomware spiked in August, suggesting increased activity among ransomware groups or the discovery of exploitable vulnerabilities.
  • Ongoing Data Breaches and Leaks: Technology & IT, Manufacturing, and Consumer Goods industries face persistent data security challenges, with regular incidents of breaches and leaks.
  • DDoS and Defacement Targeting: Although less frequent, these attacks point to a continued interest among cybercriminals and hacktivist groups in disrupting public sector services.
  • Underground Platforms: Breach Forums and Exploit remain key venues for selling stolen data, stressing the need for proactive monitoring on the dark web.

Recommendations

  • Strengthen Ransomware Defenses: Implement regular backups, employee training, and robust endpoint security to mitigate ransomware threats.
  • Enhance Data Security: Conduct routine audits and enforce data protection measures, especially in vulnerable sectors like technology and consumer goods.
  • Dark Web Monitoring: Monitoring Breach and Exploit forums for compromised data can offer early warnings of potential threats.
  • Cross-Sector Collaboration: Collaborative efforts between the private sector, government, and cybersecurity vendors will enhance threat intelligence sharing, strengthening collective resilience.

Conclusion

The rising complexity and persistence of cyber threats in Australia highlight the need for a proactive cybersecurity posture. Across 309 incidents, industries such as Technology & IT Services, Consumer Goods, and Manufacturing have been especially vulnerable to ransomware, data breaches, and access sales. The August spike in incidents signals that cybercriminals are continually evolving, utilizing platforms like Breach forums and Exploit to facilitate their activities.

By prioritizing strong cybersecurity practices, improved data protection policies, and industry collaboration, Australian organizations can better protect themselves against the dynamic cyber threat landscape.

auth_img
Jacob Abraham
Share Article

Simplifying security and compliance at every stage

main_logoFalconFeeds.io
Enabling organisations take the big leap with comprehensive & advanced threat intelligence platform
Sign Up For Our Newsletter
Registered offices
London, UK
Delaware, USA
Banglore, India
Global Headquarters
Tsanct Technologies Pvt Ltd.
No. 21, 1st Cross, Achaiah Shetty Layout, RMV Extension, Bangalore Karnataka, India - 560080
linkedInlinkedInlinkedIn
Defend Today, Secure Tomorrow
© 2025 T-Sanct Technologies Pvt Ltd.