The Upsurge in Ransomware Attacks in Australia and Opportunities to Protect Data

There are rare occasions when you open the news and don't find anything about cybersecurity in the headlines. According to the Australian Cyber Security Centre (ACSC), Australia has dealt with a cyberattack every 8 minutes in the financial year 2020-21, with over 67,500 cases of cybercrime registered in the same year.

Studies indicate that ransomware is one of the most frequent and damaging types of malware leveraged by cybercriminals. ACSC’s Annual Cyber Threat Report highlights that over 500 ransomware attacks were reported last year in Australia — a 15% increase in comparison with the year before.

While ransomwares have historically been targeting specific businesses, the recent cases show that these are in fact equipped to handle operations to disrupt critical infrastructure at large of a country and have effects felt by the society. Many words have been written about ransomware. However, there is still a lack of absolute clarity on how these attacks behave, which makes it difficult for companies to develop effective tactics to protect themselves.

In addition, ransomware encryption speed often renders risk mitigation as the primary defence, leaving organisations to manage consequences after an attack. A recent study by SURGe, Splunk’s strategic cybersecurity arm, found that a median ransomware can encrypt nearly 100,000 files or 53.93GB in forty-two minutes and fifty-two seconds. In other words, if an organisation is attacked by a successful ransomware infection, in less than an hour it can lose access to critical IP, employee information, and customer data.

The goal of this research was to understand if organisations were realistically prepared to react in time for effective mitigation in case of a ransomware attack. The timeline provided is clear in showing how limited is the window organisations have to respond in this kind of situation before the encryption is complete and the accesses are lost, especially considering that, as found by the Mandiant M-Trends report, the average time to detect compromise is three days.

With such a limited window, it’s unlikely that most organisations will be able to avoid a total loss of data from a ransomware attack. It also indicates how, more than ever, we must focus our efforts on developing mindful prevention strategies and decrease the reliance on response and mitigation in the event of an attack like this.

There are several practical steps and strategies that can be adopted — from better patching to asset inventory — but it’s clear that it all starts from moving left on the cyber kill chain and detecting delivery or exploitation rather than acting on the objective. Investing in prevention has also proved to be more cost-effective for organisations than the expenses that can be incurred in an attempt to recover from a ransomware infection.

The concerning volume and the advancement in the complexities and sophistication of these attacks combined with the significant uptake of online activities thrust by the pandemic put cybercrime at the heart of the national and international security context. This also makes regular reviews of security procedures and identification of new cyber threat combatting techniques an imperative.

What we can take from this is that risk mitigation must be a proactive and strategic focus from now on. Once attacked, ransomwares do not leave enough time to counteract — and that’s a risk we can’t afford. While governments and corporations across the world are rolling up their sleeves to combat cyberattacks and their impact on critical infrastructure, prevention and protection are essential. As cybercriminals constantly advance their techniques and adapt quickly to changes and disruptions, it is on each of us and every organization to keep up to date and identify innovative and effective ways to shield from these attacks.

----------------------------------------------------
Thanks!
Mark Troselj

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.