Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Critical Fortinet FortiSandbox Flaw Allows Vulnerability Enables
May 12, 2026
Fortinet Patches Five Vulnerabilities in Forti Across FortiAP
May 12, 2026
Top MSSPs Prevent Incidents with Live Threat Visibility
May 12, 2026
Home/Threats/Ransomware & Initial Access Fuel Australia/NZ Cyber Threats
Threats

Ransomware & Initial Access Fuel Australia/NZ Cyber Threats

Australia and New Zealand’s cyber threat environment has entered a critical phase throughout 2025. Threat actors are orchestrating increasingly sophisticated attacks, primarily focused on the...

Emy Elsamnoudy
Emy Elsamnoudy
January 9, 2026 2 Min Read
9 0

Australia and New Zealand’s cyber threat environment has entered a critical phase throughout 2025. Threat actors are orchestrating increasingly sophisticated attacks, primarily focused on the sale of compromised network access.

The Cyble Research and Intelligence Labs documented 92 instances of compromised access sales affecting organizations across both regions during the year, revealing a mature and commercialized underground marketplace where stolen credentials and network entry points are openly traded on cybercrime forums.

These attacks have disproportionately impacted data-rich industries, with threat actors maintaining a strategic focus on retail, banking, financial services, insurance, professional services, and healthcare organizations.

The targeting strategy reflects attackers’ understanding of which sectors hold the greatest value, whether measured by customer data volumes, financial information, or downstream access opportunities to additional networks.

Cyble analysts identified that retail organizations emerged as the primary target, accounting for 31 incidents or approximately 34% of all observed initial access sales, a figure more than three times higher than competing sectors.

The BFSI sector followed with nine compromised access listings, while professional services firms experienced seven documented incidents.

Understanding Access Brokerage Market Structure and Attack Patterns

The initial access marketplace demonstrates a highly fragmented ecosystem rather than a centralized operation controlled by a small number of actors.

The threat actor known as cosmodrome emerged as the most prolific seller of compromised access during the reporting period, closely followed by an actor operating under the alias shopify.

However, these prominent sellers collectively controlled only approximately 26% of total observed listings, with the remaining activity originating from dozens of opportunistic participants posting access for sale on Russian-language forums like Exploit and English-language platforms such as Darkforums.

Real-world incidents illustrate the tangible consequences of this underground market activity.

In June 2025, the threat group Scattered Spider orchestrated a sophisticated attack against a major Australian airline, compromising a customer service portal and exposing records belonging to nearly six million customers, including names, email addresses, phone numbers, dates of birth, and frequent flyer numbers.

Earlier in March, the actor Stari4ok advertised access to a large Australian retail chain containing approximately 250 gigabytes of data, including a 30-gigabyte SQL database with 71,000 user records, listed with an opening price of USD 1,500.

This decentralized access marketplace demonstrates that initial access sales have become an accessible revenue stream for a diverse range of threat actors globally, reinforcing the scalability and resilience of the underground economy while exposing organizations across Australia and New Zealand to heightened cyber risk throughout 2026.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitransomwareThreat

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

New Microsoft Teams Admin Role for External Collaboration Settings

Next Post

MuddyWater APT Delivers RustyWater via Word, Ev Weaponizing Documents

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
SAP Patches Critical SQL Injection Flaw in S/4 Vulnerability S/4HANA
May 12, 2026
Zoom Rooms Vulnerabilities Allow Attackers to Escalate
May 12, 2026
Vidar Stealer Campaign Evades EDR to Stealthy Bypass
May 12, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us