Back to Threat Intelligence
Quarterly Report45 pages

Australian Threat Landscape Report Q4 2024

Key Findings

  • 37% increase in ransomware attacks targeting Australian organizations
  • Supply chain attacks doubled compared to Q3 2024
  • Financial services and healthcare most targeted sectors
  • State-sponsored APT groups increasingly targeting critical infrastructure
  • Cloud misconfigurations leading cause of data breaches

Executive Summary

Q4 2024 saw significant escalation in cyber threats targeting Australian organizations. Ransomware attacks increased 37% compared to Q3, with attackers employing more sophisticated tactics including triple extortion and cloud infrastructure targeting. Supply chain attacks doubled, affecting organizations across multiple sectors. State-sponsored actors intensified focus on critical infrastructure, particularly energy, telecommunications, and government sectors. Financial services and healthcare remained primary targets, accounting for 48% of reported incidents.

Ransomware Landscape

Ransomware continued dominating the threat landscape with 37% increase in attacks. Major ransomware groups including LockBit, ALPHV/BlackCat, and Play targeted Australian organizations with increasing sophistication.

  • Triple extortion becoming standard practice
  • Average ransom demand increased to AUD $2.1M
  • Initial access primarily via phishing (45%) and VPN vulnerabilities (32%)
  • Linux/Virtualization platform variants increased 56%
  • Dwell time decreased to average 9 days

State-Sponsored Activity

APT groups attributed to China, Russia, and North Korea intensified operations against Australian targets. Critical infrastructure sectors experienced 78% increase in reconnaissance activities.

  • Energy sector: 134 confirmed targeting attempts
  • Telecommunications: 89 incidents
  • Government agencies: 67 compromises
  • Focus on intellectual property theft
  • Living-off-the-land techniques prevalent

Supply Chain Attacks

Supply chain compromises doubled in Q4, affecting organizations through trusted vendors and software providers. Attackers increasingly target managed service providers (MSPs) for multi-victim access.

  • 23 confirmed supply chain incidents
  • MSP compromises affected average 12 downstream customers
  • Software supply chain attacks increased 145%
  • Third-party risk management gaps exploited

Cloud Security Incidents

Cloud environment breaches increased 42%, with misconfigurations accounting for 75% of incidents. Identity and access management weaknesses remained primary attack vector.

  • Public storage buckets: 234 exposures
  • Excessive IAM permissions exploited in 60% of breaches
  • Multi-cloud environments face elevated risk
  • Cryptocurrency mining increased 89%

Sector-Specific Analysis

Financial services experienced 156 confirmed incidents. Healthcare sector saw 128 incidents with significant impact on patient services. Critical infrastructure incidents increased 78% primarily due to state-sponsored reconnaissance.

Recommendations

  • Implement comprehensive ransomware defenses including network segmentation, immutable backups, and EDR
  • Enhance third-party risk management programs with continuous monitoring
  • Conduct cloud security posture reviews and remediate misconfigurations
  • Deploy advanced threat detection capabilities with focus on living-off-the-land techniques
  • Strengthen identity and access management with MFA and least privilege principles
  • Establish threat intelligence programs for industry-specific insights
  • Conduct regular incident response exercises including ransomware scenarios

Need Help Responding to These Threats?

Our security experts can help you assess your risk and implement effective defenses.