Posts

Australian Superannuation Funds Hit by Cyber Attacks: What Happened and What It Means for Everyday Australians

Image
  In a week where many Australians logged in to check their super balances, some were met with a chilling sight: a $0 balance. Not a glitch. Not a late deposit. But the aftermath of what’s now shaping up to be one of the most unsettling cyber incidents to hit the superannuation sector in recent memory. With AustralianSuper confirming over 600 attempted cyber attacks in the last month — and at least $500,000 in retirement savings stolen from four members — this event is more than just a technical failure. It’s a wake-up call. Let’s unpack what happened, how it unfolded, and what this means for super funds, regulators, and everyday members who are now understandably asking: “Is my money safe?” What We Know So Far AustralianSuper , the nation’s largest retirement fund with 3.5 million members , was the most significantly impacted, facing a wave of attacks over recent weeks. While the fund says most attempts were repelled, four members still had funds stolen — and the platform...

Medusa Ransomware: How a Malicious Driver Is Silencing EDR Defenses

Image
  The Medusa ransomware group has escalated its tactics, deploying a malicious driver dubbed ABYSSWORKER to disable endpoint detection and response (EDR) solutions . This attack is part of a growing trend of bring-your-own-vulnerable-driver (BYOVD) techniques , where attackers exploit trusted but vulnerable drivers to gain deep system access. What Happened? Elastic Security Labs recently detailed a Medusa ransomware incident involving a packer-as-a-service (PaaS) tool called HeartCrypt . The HeartCrypt loader deployed a revoked certificate-signed driver — "smuol.sys" , mimicking a legitimate CrowdStrike Falcon driver. Once installed, the ABYSSWORKER driver began systematically terminating or disabling various security tools . The driver was signed using stolen, revoked certificates from Chinese vendors, giving it a veneer of legitimacy and allowing it to bypass traditional security controls . How ABYSSWORKER Works Once deployed, the ABYSSWORKER driver: Registers ...

Rippling vs. Deel: The Largest Corporate Espionage Case of the Century

Image
  The HR technology space is no stranger to competition, but the legal battle between Rippling and Deel has pushed industry rivalries to an entirely new level. Rippling has accused Deel of corporate espionage , alleging that a Deel-planted insider exfiltrated customer data, trade secrets, and competitive intelligence over a four-month period. This case is more than just a lawsuit—it’s a real-world example of how insider threats can go undetected and how businesses can strengthen their security measures to prevent similar breaches. What Happened? According to Rippling’s lawsuit, filed on March 17, 2025 , a former employee —allegedly acting on behalf of Deel—conducted an extensive data theft operation from inside the company. The individual reportedly accessed: Confidential customer data Competitive intelligence stored in Slack, Salesforce, and Google Drive Trade secrets and internal strategies Employee data for targeted recruiting Court documents reveal that on a...

OAuth Attacks: How Malicious Apps Are Targeting Microsoft 365 and GitHub

Image
Cybercriminals are increasingly exploiting OAuth applications as an attack vector to gain unauthorised access to user accounts, steal data, and spread malware . Recent campaigns have shown a growing sophistication in how attackers abuse OAuth permissions to bypass traditional security measures. A recent wave of attacks has leveraged fake OAuth applications impersonating Adobe, DocuSign, and GitHub security alerts . These malicious apps trick users into granting permissions that allow attackers to redirect victims to phishing pages, distribute malware, or gain full access to cloud accounts and repositories . This article breaks down the latest OAuth attack techniques , how they exploit legitimate services , and what organisations can do to mitigate these threats . How Malicious OAuth Attacks Work OAuth is a widely used authorisation framework that allows applications to request access to user accounts without requiring passwords . While OAuth enhances security by reducing crede...

Essential Eight: Why Australian Businesses Should Implement This Cybersecurity Framework

Image
  Cyber threats are increasing in both frequency and sophistication , making it essential for organisations to strengthen their cybersecurity posture. To address these risks, the Australian Cyber Security Centre (ACSC) developed the Essential Eight cybersecurity framework —a strategic approach to mitigating common cyber threats . While the Essential Eight is mandatory for non-corporate Commonwealth entities (NCCEs) , private businesses are strongly encouraged to adopt these security measures. Implementing the framework can significantly reduce cyber risks, prevent financial losses, and enhance overall resilience . This guide will explain the Essential Eight framework, its benefits for businesses , and the practical steps organisations can take to align with its recommendations . What is the Essential Eight? The Essential Eight is a cybersecurity framework developed by the ACSC to help organisations protect their systems from cyber threats . First introduced in 2017, it expands o...

Key Reforms Under the Privacy and Other Legislation Amendment Act 2024

Image
  Key Reforms Under the Privacy and Other Legislation Amendment Act 2024 1. New Statutory Tort for Serious Invasions of Privacy The Act introduces a new statutory tort , allowing individuals to sue for serious privacy invasions . This includes: Physical privacy violations and misuse of personal information The invasion must be intentional or reckless and serious The individual must have had a reasonable expectation of privacy A public interest test balancing privacy against competing interests Action Steps for Organisations: ✅ Review and update internal privacy policies to address both data breaches and broader privacy concerns , including physical privacy violations. ✅ Conduct regular privacy impact assessments for new projects involving personal data. ✅ Train employees on what constitutes intentional or reckless privacy invasions and how to prevent them. 2. Stronger Enforcement Powers for the OAIC (Office of the Australian Information Commissioner) The OAIC now has enhanced ...