Trending

HomeBlog
The New Era of Cybercrime in Australia — AI-Powered Attacks and How to Stay Ahead 
Australia

The New Era of Cybercrime in Australia — AI-Powered Attacks and How to Stay Ahead 

AI-driven cyberattacks are rising in Australia, with 50+ threat groups active in 2025 and a 13% spike in major incidents across key sectors.

AI is driving a rapid increase in sophisticated cyberattacks, and Australia’s high median wealth, abundant resources, and geopolitical influence make it a prime target for both cybercrime groups and advanced persistent threats (APTs). 

Cyble has documented more than 50 threat groups active in Australia in 2025, including ransomware and cybercrime groups, hacktivists, and APTs linked to China, Russia, Iran, and North Korea. 

Cyble dark web researchers have investigated 71 major cyber incidents in Australia this year through mid-August, up 13% from the same period in 2024 – in line with the growth in cybercrime for 2023-2024 reported by the Australian Signals Directorate’s Australian Cyber Security Centre (ASD/ACSC). 

Facing such significant – and growing – cyber threats requires strong preparation and automation by organizations that may find themselves a target of financially or ideologically motivated threat actors

The Growing Use of AI by Threat Groups 

Threat groups are using AI for everything from making phishing and social engineering attacks more convincing to modifying malware to make it more difficult to detect. Uses include: 

  • Improved reconnaissance and scanning for vulnerable environments, particularly by APT groups 
  • Using malicious LLMs such as GhostGPT to develop and refine malware and to evade security defenses 

To meet those challenges, security teams will need to implement robust defenses and AI-driven, automated security defenses. 

report-ad-banner

Sophisticated Cyberattacks Targeting Australia 

The 71 major cyber incidents targeting Australian organizations that Cyble researchers have documented thus far in 2025 have been spread across many sectors, such as energy, IT, telecom, construction, political, insurance, financial, transportation, and healthcare organizations. 

One of the more widely publicized recent incidents involved illicit access to a Qantas call center and third-party customer servicing platform that may have been part of a broader campaign targeting the airline industry by the Scattered Spider threat group. Scattered Spider is known for advanced social engineering strategies such as vishing, often impersonating help desk or IT staff to steal credentials. 

Another recent incident is part of an alarming trend of growing software supply chain attacks. A threat actor on the English-language cybercrime forum DarkForums leaked source code belonging to an Australian SaaS company that offers a comprehensive Loan Management System (LMS) and an electronic document signing tool. According to the threat actor, the leaked source code included authentication modules, document generation components, administrative and dashboard interfaces, API endpoints, and database administration access. Such cyberattacks can be particularly hazardous because they can expose downstream customers of a company. 

Another incident of note involved a threat actor (TA) on DarkForums who claimed to possess data belonging to a wholesale broadband network infrastructure project in Australia owned by the government. The TA claimed to be in possession of approximately 306 GB of data, consisting of network maps and designs, cable details, equipment documentation, information on implementation and installation methods, field inspection reports, drilling reports, work order forms and execution files, as-built checklists, and technical performance test reports. To corroborate their claims, the TA shared a few sample images comprising various network maps and designs. 

Defending Against AI Cyberattacks 

Defending against AI-powered attacks and other advanced threats can be daunting. Fortunately, cybersecurity best practices and good cyber hygiene can help, and they often don’t cost more than the time it takes to get them right. 

Those best practices include: 

  • Knowing what your critical assets are, and segmenting and protecting them 
  • Removing or protecting web-facing assets 
  • Implementing Zero-Trust access principles and multi-factor authentication 
  • Having backups of critical data that are immutable and air-gapped 
  • Hardening endpoints, infrastructure, and configurations 
  • Monitoring and protecting network, endpoint, and cloud infrastructures 
  • Developing – and rehearsing – incident response plans 
  • Training employees to recognize phishing and other social engineering attacks – and ideally, filtering malicious emails before they ever get to employees 

Getting the basics right can limit the impact of any cyberattacks that do occur, but beyond that, the only thing that can keep pace with AI-powered threats is AI-powered cyber defenses, for continuous, adaptive monitoring, detection, and endpoint protection. 

Cyble’s comprehensive attack surface management solutions can help by scanning network and cloud assets for exposures and prioritizing fixes, in addition to monitoring for leaked credentials and other early warning signs of major cyberattacks. 

Disclaimer: This blog is based on our research and the information available at the time of writing. It is for informational purposes only and does not constitute legal, financial, or professional advice. While we strive for accuracy, we do not guarantee the completeness or reliability of the content. If any sensitive information has been inadvertently included, please contact us for correction. Cyble is not responsible for any errors, omissions, or decisions made based on this content. Readers should verify findings and seek expert advice where necessary. All trademarks, logos, and third-party content belong to their respective owners and do not imply endorsement or affiliation. All content is presented “as is” without any guarantee that it is free of confidential, proprietary, or otherwise sensitive information. If you believe any portion of this content contains inadvertently shared or sensitive data, please contact us immediately so that we may address and rectify the issue. No Liability for Errors or Omissions Due to the dynamic nature of cyber threat activity, this [blog/report/article] may include partial, outdated, or otherwise incorrect information due to unverified sources, evolving security threats, or human error. We expressly disclaim any liability for errors or omissions or any potential consequences arising from the use, misuse, or reliance on this information.

Get Threat Assessment Report

Identify External Threats Targeting Your Business​
Free

Threat Landscape Reports 2025

Upcoming Webinars

CISO's Guide to Threat Intelligence 2024

CISO’s Guide to Threat Intelligence 2024: Best Practices

Stay Ahead of Cyber Threats with Expert Insights and Strategies. Download Free E-Book Now

Share the Post:
Scroll to Top

Discover more from Cyble

Subscribe now to keep reading and get access to the full archive.

Continue reading