
By Tyler W
February 04, 2025
January 2025 Australian Ransomware Update
Cyberwise Australian Ransomware Update: January 2025
Hello and welcome to the Cyberwise Australian Ransomware Update for January 2025. This month started with a bang, surpassing November’s record high by hitting a total of 16 reported ransomware incidents. Cybercriminals are clearly ramping up their attacks on businesses large and small—and we’re here to give you the most comprehensive, data-driven analysis available.
Below is our monthly roundup, complete with the numbers and trends shaping Australia’s ransomware landscape.
A Surge in Attacks: 16 Confirmed Incidents
In January, we tracked 16 confirmed ransomware attacks spanning healthcare, logistics, community services, construction, and more. Notably:
- Over a quarter targeted healthcare providers, reaffirming that medical and personal data remain prime targets.
- 9 out of these 16 incidents led to stolen data being leaked or partially leaked online—a glaring example of the ‘double extortion’ method many cybercriminals are using.
- One especially notable event on January 28th resulted in the full release of stolen data almost immediately, highlighting how quickly criminals are willing to expose private information.
Healthcare in the Crosshairs
Healthcare bore the brunt this month: independent medical centers, clinics, and imaging providers faced significant downtime, potentially delaying patient care while also risking the exposure of sensitive patient data. We often see these attacks spread to related suppliers or customers, creating “cluster attacks” within the same industry.
Major Hits on Logistics & Energy
Two high-profile attacks in late January struck a major logistics provider and an energy retailer—both linked to the Clop ransomware group. For at least one victim, Clop has already published the stolen data in full. While we lack official statements on the severity, attacks on large organisations can cause ripple effects in supply chains and often inspire supplementary attacks.
No Organisation Is Too Big or Too Small
Smaller nonprofits and professional services weren’t spared, proving that no entity is immune from ransomware assaults. We’ve seen time and again how these groups—often with limited IT resources—can become prime targets.
Top Ransomware Groups This Month
We identified at least nine active ransomware groups in January:
- Morpheus
- Lynx
- Incransom
- Moneymessage
- Safepay
- Spacebears
- DragonForce
- Clop
- Babuk2
Some appear to be rebrands of existing groups, while others are well-known operators continuing their campaigns. Phishing, unpatched software exploits, and social engineering remain the most common methods for initial access.
Ransom Payments & Negotiations
- One Incransom victim’s details disappeared from the group’s leak site—indicating a ransom may have been paid.
- Clop’s website doesn’t list the major energy retailer they reportedly hit, suggesting an ongoing negotiation or potential payment.
- Multiple victims remain in an active negotiation window, so their stolen data hasn’t been publicly exposed… yet.
Key Trends & Takeaways
-
Full Data Leaks on the Rise
In 9 confirmed cases, threat actors posted stolen data online—often containing personal identifiable information (PII) and sensitive corporate documents. -
Healthcare Still a Target
With four confirmed breaches, criminals see healthcare data as both lucrative and, unfortunately, relatively easy to exploit. -
Ransom Payment Indicators
Victim names disappearing from leak sites is a common sign of a successful ransom payment, though not an infallible one. Encouragingly, we’re seeing fewer organisations choose to pay. -
Supply Chain & Infrastructure
Clop’s hits on logistics and energy underscore a focus on high-value operations where disruptions can cascade. This, combined with Ransomware as a Service (RaaS), means no sector is off-limits.
Protecting Your Organisation
While no single defense is foolproof, these four essential measures can help you reduce risk:
-
Employee Training
- Phishing remains a top threat. Regularly train staff to recognise and report suspicious emails.
-
Regular Updates & Patches
- Proactively fix known vulnerabilities, limiting the “open doors” attackers can exploit.
-
Offline Backups
- Adopt the 3-2-1 backup rule (3 copies of your data, 2 stored offline, 1 offsite) to avoid losing everything if production data is encrypted.
-
Segmentation & Access Controls
- Limit lateral movement. A least privilege access mindset can significantly contain an intrusion if attackers breach one part of your network.
Even if attackers manage to steal data, these measures help organisations respond faster and mitigate the overall damage.
Wrapping Up January 2025
That’s the latest on Australia’s ransomware landscape for January 2025. We’ll continue to track evolving threats, monitor leak sites, and report on the fallout from these attacks. If you found this information valuable, please like, share, and subscribe for more insights.
Until then, stay vigilant—and stay Cyberwise.
Have Questions or Updates?
- Reach out to us at [email protected]
Get our latest Media Releases & stay informed & up to date.
