Threat Intelligence Warns of Growing Initial Access and Ransomware Activity in Australia and New Zealand

Threat Intelligence Warns of Growing Initial Access and Ransomware Activity in Australia and New Zealand

Cybercriminal activity targeting Australia and New Zealand is increasingly being fuelled by the sale of initial network access and the expansion of ransomware campaigns, according to recent threat intelligence findings.

Security researchers say threat actors are exploiting compromised websites, web applications, and remote access systems to gain entry into corporate networks, before selling that access to ransomware operators and other criminal groups.


Initial Access Brokers Enable Ransomware Operations

Initial access brokers (IABs) specialise in gaining unauthorised entry into organisations and selling that access on underground forums. In Australia and New Zealand, attackers have increasingly targeted:

  • Vulnerable websites and web applications
  • Exposed Remote Desktop Protocol (RDP) services
  • Stolen credentials obtained through phishing campaigns
  • Unpatched internet-facing software

Once access is established, it is often sold to ransomware groups, significantly lowering the barrier for large-scale attacks.


Ransomware Campaigns Expand Across the Region

Ransomware groups have continued to target organisations across both countries, affecting sectors including:

  • Professional services
  • Healthcare and education
  • Manufacturing and logistics
  • Government-linked service providers

Threat actors typically move laterally from compromised web-facing systems into internal networks, deploying ransomware after conducting data exfiltration and reconnaissance.


Web Applications Remain a Key Entry Point

Analysts say insecure web applications and content management systems remain a major risk factor, particularly where:

  • Security patches are delayed
  • Authentication controls are weak
  • Monitoring of application activity is limited

Compromised web infrastructure is often used as a foothold to access backend systems, databases, and cloud environments.


Increased Sophistication of Threat Actors

Security teams have observed attackers using more advanced techniques to evade detection, including:

  • Living-off-the-land tools
  • Encrypted command-and-control traffic
  • Legitimate cloud and hosting services
  • Blending malicious activity into normal web traffic

These methods make early detection more difficult, especially in organisations with limited visibility into website and application behaviour.


Ongoing Risk for Regional Organisations

Threat intelligence teams warn that cyber activity targeting Australia and New Zealand remains active and evolving, with no indication of a slowdown. Organisations operating public-facing websites and web applications are considered at elevated risk.

Experts note that preventing initial access remains one of the most effective ways to reduce exposure to ransomware and large-scale cyber incidents.


About Entivel
Entivel develops secure websites, web applications, and custom software solutions, providing cybersecurity, penetration testing, and web application security services for organisations operating in Australia, New Zealand, and beyond.

Read more