Bert Kondruss, KonBriefing Research, Germany
June 08, 2025
The threat from cyberspace remains high: Our website documents reported cyberattacks in Australia in 2024. A chronological overview lists the dates, affected companies and organizations, as well as their locations. The information is based on official statements from the institutions involved, as well as research from newspapers and industry media. However, not every incident has been made public, so the actual number of successful attacks is likely to be significantly higher.

Cyber incident overview

Cyberattacks Australia 2024
Image usable under the license Creative Commons BY 4.0 (Attribution: KonBriefing Research)
 
Diagram in high resolution (License: Creative Commons BY 4.0):

Which companies were affected by a cyber attack?

 
#DateCityStateCompanyTypeStichworte
1January 2024Penrith NSWNSWUniversityNew South Wales, College, University, Research,Western Sydney University
2February 15, 2024Mile End South SASAChainSouth Australia, Groceries, Food,Vili's Family Bakery
3February 18, 2024South Melbourne VICVICTelecommunications providerVictoria,Tangerine Telecom
4March 2024West Perth WAWAMining companyWestern Australia,Northern Minerals
5April 2024Melbourne VICVICCall centersVictoria,OracleCMS
6April 2024Car manufacturerAutomobile, Automotive, Cars,Nissan
7April 2024Darebin VICVICCity governmentVictoria, City administration, City government, municipality, town hall,Administration, Authority, Government, Public sector,Darebin City Council
8April 2024Knox City VICVICCity governmentVictoria, Administration, Authority, Government, Public sector,City administration, City government, municipality, town hall,Knox City Council
9April 2024Manningham VICVICCity governmentVictoria, City administration, City government, municipality, town hall,Administration, Authority, Government, Public sector,Manningham Council
10April 2024Whitehorse VICVICCity governmentVictoria, City administration, City government, municipality, town hall,Administration, Authority, Government, Public sector,Whitehorse City Council
11April 2024Yarra VICVICCity governmentVictoria, Administration, Authority, Government, Public sector,City administration, City government, municipality, town hall,Yarra City Council
12April 2024St. Kilda (Melbourne) VICVICLocal governmentVictoria, Administration, Authority, Government, Public sector,City administration, City government, municipality, town hall,City of Port Phillip
13April 2024Springwood QLDQLDMotorcycle dealerQueensland, Automobile, Automotive, Cars,MotorCycle Holdings / Sherco, Lambretta
14April 2024Wollongong NSWNSWLogistics companyNew South Wales, Transportation,Logistics,Barnett's Couriers
152024 ?Brisbane QLDQLDFinancial service providerQueensland, Finance, Money,Firstmac
16May 2024South Melbourne VICVICService providerVictoria, Healthcare,MediSecure
17May 2024 ?Sydney NSWNSWChildcare providerNew South Wales,Guardian Childcare
18May 2024 ?Sydney NSWNSWTicket salesNew South Wales,Ticketek / TEG Pty
192024Flemington VICVICHorse racing clubVictoria,Victoria Racing Club
202024Perth WAWAMining companyWestern Australia,Iluka Resources
21July 2024 ?Nedlands WAWAMedical research centerWestern Australia, Healthcare,Research and Development,Harry Perkins Institute of Medical Research
22July 2024Brighton VICVICYacht clubVictoria, Boats, Martime, Ships,Royal Brighton Yacht Club (RBYC)
23August 8, 2024Sydney NSWNSWMining companyNew South Wales,Evolution Mining Limited
24August 2024North Geelong VICVICWelfare organizationVictoria,Meli
252024Sydney NSWNSWHealth care providerNew South Wales, Healthcare,I-MED Radiology
26December 2024Muswellbrook NSWNSWAdministrationNew South Wales, Administration, Authority, Government, Public sector,Muswellbrook Shire Council

Hacker attacks statistics

By month

Cyberattacks Australia 2024 by month
Image usable under the license Creative Commons BY 4.0 (Attribution: KonBriefing Research)
 
Diagram in high resolution (License: Creative Commons BY 4.0):

By industry

Cyberattacks Australia 2024 by industry
Image usable under the license Creative Commons BY 4.0 (Attribution: KonBriefing Research)
 
Diagram in high resolution (License: Creative Commons BY 4.0):

Notes

  • The statistics are based on the known incidents listed here.
  • Since only some of the cases become known, the evaluations are not representative.
  • Industries where incidents are immediately visible due to public access (e.g. healthcare) are more represented than others.
  • An incident may be assigned to multiple countries or industries. Also, a country cannot always be assigned. So the totals shown on the charts may be different.
  • The graphics marked in this way may be reused according to the license Creative Commons Attribution 4.0 / CC BY 4.0, also for commercial purposes (Attribution: KonBriefing Research).

Details, examples and sources

Flag AustraliaApril 2024
City government in Australia affected by unauthorized access at a call center
Darebin City Council - Darebin, Victoria, Australia
https://www.darebin.vic.gov.au/About-cou...
Flag AustraliaApril 2024
City government in Australia affected by unauthorized access at a call center
Knox City Council - Knox City, Victoria, Australia
https://www.knox.vic.gov.au/whats-happen...
Flag AustraliaApril 2024
City government in Australia affected by unauthorized access at a call center
Whitehorse City Council - Whitehorse, Victoria, Australia
https://www.whitehorse.vic.gov.au/news-a...
Flag AustraliaApril 2024
City government in Australia affected by unauthorized access at a call center
Yarra City Council - Yarra, Victoria, Australia
https://www.yarracity.vic.gov.au/news/20...
Flag AustraliaApril 2024
Local government in Australia affected by unauthorized access at a call center
City of Port Phillip - St. Kilda (Melbourne), Victoria, Australia
https://www.portphillip.vic.gov.au/about...
Flag AustraliaDecember 2024
Cyber attack on an administration in Australia
Muswellbrook Shire Council - Muswellbrook, New South Wales, Australia
https://www.muswellbrook.nsw.gov.au/it-d...

ISMS Tools

Information Security in Australia: Managing Digital Risks Systematically with an ISMS

Australia is one of the most digitally advanced economies in the Asia-Pacific region. At the same time, the threat of cyber attacks continues to grow: from attacks on critical infrastructure and data breaches to complex ransomware operations, Australian businesses, government agencies, and organisations are increasingly facing evolving risks. An Information Security Management System (ISMS) provides a structured framework to identify, assess, and effectively manage information security risks.
The ISMS is based on the internationally recognised ISO/IEC 27001 standard, which is widely adopted across Australia. Using the proven PDCA cycle (Plan-Do-Check-Act), an ISMS ensures that security measures are continuously reviewed, adapted, and improved - essential in a constantly shifting threat landscape.
For Australian organisations, an ISMS is also critical for meeting national legal and industry-specific obligations, including:
  • Privacy Act 1988 (including the Privacy Amendment (Notifiable Data Breaches) Act 2017)
  • Requirements set by the Australian Cyber Security Centre (ACSC)
  • The Essential Eight Maturity Model
  • Obligations under the Security of Critical Infrastructure Act (SOCI Act)
An effective ISMS for Australian businesses typically includes:
  • Asset Management: Protecting sensitive systems, corporate data, customer information, and critical infrastructure
  • Protection Needs Analysis: Assessing which information and systems require the highest level of protection
  • Risk Management: Identifying and managing threats such as ransomware, phishing, social engineering, and system outages
  • Security Controls: Implementing technical and organisational measures in line with ISO 27002 and ACSC guidance
  • Statement of Applicability (SoA): Documenting all applied security controls as evidence for regulators, business partners, and auditors
  • Continuous Improvement: Regularly updating the security strategy to address new technologies, attack methods, and regulatory developments
An ISMS helps Australian organisations proactively manage cyber risks, maintain regulatory compliance, and build trust with customers, business partners, and regulators. In an increasingly digital economy, professional information security management is becoming a key success factor for long-term resilience and competitiveness.

Benefit of an ISMS software

In Australia, information security and data protection are becoming increasingly important, particularly due to regulations such as the Australian Privacy Act, the Notifiable Data Breaches (NDB) scheme, and standards like ISO 27001. Implementing an ISMS is often a complex task, especially when processes are managed manually, for example using Excel. Specialised software solutions offer clear advantages: they provide structured frameworks, automated checklists, and detailed reporting functions that reduce administrative effort and minimise the risk of errors. Thanks to seamless integration with existing IT infrastructures, they ensure a consistent, up-to-date, and compliance-ready data foundation - a key success factor for businesses operating in the Australian market.

About KonBriefing Research

KonBriefing Research is an independent researcher and analyst, specialized in software for information security, risk management and compliance. The company was founded in 2019 and is based in Germany.
One of the main focuses is the market analysis of tools for information security management systems (ISMS tools) in accordance with ISO 27001.

About the author

Bert Kondruss
Author:
Bert Kondruss
Founder and managing director of KonBriefing Research,
a GRC Software analyst company
Germany

Cyber attacks worldwide

Cyber attacks worldwide
(Click the image to open)