Skip to content

Cyber Threats Escalate: Australian Organisations Under Siege

In the ever-evolving landscape of cybersecurity, the past week has delivered a stark reminder of how rapidly threats can emerge and escalate. From critical infrastructure vulnerabilities to sophisticated malware campaigns, Australian organisations are facing a barrage of risks that demand immediate attention and action.

SharePoint Under Siege

Microsoft SharePoint has become ground zero for a wave of cyberattacks. Exploits like CVE-2025-53770 and CVE-2025-49704 are being actively used in the “ToolShell” attack chain, allowing remote code execution and ransomware deployment. Over 75 organisations globally have been impacted, including government and telecom sectors. Alarmingly, 323 vulnerable SharePoint servers have been identified in Australia alone.

The Australian Cyber Security Centre (ACSC) has issued urgent guidance: patch immediately, enable AMSI, and isolate outdated systems. These vulnerabilities are being weaponised by Chinese-backed espionage groups such as Linen Typhoon and Storm-2603, underscoring the geopolitical dimension of these threats.

Malware Gets Smarter

Malware is no longer just malicious—it’s intelligent. Koske, an AI-generated Linux malware, is targeting misconfigured servers for cryptomining, using image-based payloads to slip past detection. Meanwhile, EncryptHub is luring Web3 developers with fake AI platforms, and Lumma Stealer continues to thrive post-FBI takedown, proving that takedowns don’t always mean the end.

Australian websites haven’t been spared either. Over 3,500 WordPress sites globally have been compromised by stealth JavaScript miners, with several local sites caught in the crossfire.

Ransomware’s Double Punch

Ransomware actors are upping the ante with double extortion tactics. Interlock ransomware encrypts systems and exfiltrates sensitive data, negotiating ransoms via hidden .onion URLs. Other strains like KAWA4096 and Crux are exploiting network drives and RDP credentials, respectively, to infiltrate systems.

The ACSC has flagged SharePoint vulnerabilities as a key entry point for ransomware, reinforcing the need for robust segmentation, multifactor authentication, and proactive threat detection.

Espionage in the Shadows

Nation-state actors are no longer just a distant concern—they’re here. Chinese groups like APT41 and Salt Typhoon are exploiting SharePoint and infiltrating critical infrastructure, including African IT providers and US National Guard networks. Iranian-linked MuddyWater is deploying spyware disguised as VPN apps, targeting dissidents and journalists.

Australia’s government and critical systems are in the crosshairs, and the need for coordinated defence and intelligence sharing has never been greater.

Supply Chain: The Silent Risk

Supply chain attacks are quietly wreaking havoc. Compromised npm packages and fake GitHub repositories are enabling remote code execution and data theft. Even trusted platforms like Arch Linux have had to remove infected packages.

Australian organisations must scrutinise their dependencies, enforce two-factor authentication for developers, and monitor for signs of compromise. The cascading impact of these attacks—from phishing to unpatched software—makes supply chain security a top priority.


Final Thoughts

Cyber threats are evolving faster than ever, and Australia is not immune. Whether it’s a zero-day exploit in SharePoint or a stealthy miner hiding in a WordPress plugin, the message is clear: patch fast, monitor constantly, and never underestimate the adversary.

Organisations must move beyond reactive defence and embrace proactive cybersecurity strategies. The stakes are high, and the time to act is now.