AUNZ Intelligence Insights Report, January 2026
← Research Hub

AUNZ Intelligence Insights Report, January 2026

Monthly actionable threat intelligence and sharp insights into ransomware, hacktivisim, infostealers and financial fraud curated by Group-IB’s Threat Intelligence team for Australia and New Zealand (ANZ).

ANZ faces a rapidly evolving cyber threat environment with ransomware operators, hacktivist groups and financially motivated threat actors all active in the region. Group-IB’s January 2026 ANZ Newsletter provides a deep dive into ransomware, hacktivism, compromised accounts and financial fraud with local context, named victims and adversary profiles specific to the ANZ market.

Unlike aggregated open-source reports, this intelligence is drawn directly from Group-IB’s proprietary telemetry, dark web monitoring and infostealer tracking.

Key Findings & ANZ Cybersecurity Trends in January 2026

CI0P Returns with a Vengeance — 11 Australian Victims in a Single Month. CI0P Returns with a Vengeance — 11 Australian Victims in a Single Month.

ANZ recorded 20 ransomware incidents in January 2026 - a 42.86% increase from December 2025. CI0P drove the surge with 11 confirmed Australian attacks - up from zero in December 2025 - targeting Etto Australia, Podiatry WA, and NextPhaze among others. Lynx added 5 further incidents. Professional services, manufacturing, and financial services were the most targeted sectors. Australia sits 6th globally for ransomware exposure - outside the top five, but firmly in range.

Adversary of the Month: CI0P. Adversary of the Month: CI0P.

One of the largest ransomware operations in history, active since 2019 and responsible for 973 Data Encrypted for Impact events globally. CI0P deploys Clop ransomware to encrypt sensitive files and demands Bitcoin ransom, using dedicated leak sites to pressure victims. In January 2026 the group executed 11 successful attacks in Australia alone, targeting organisations across financial services, manufacturing, healthcare, software, and over 391 other industries across 54+ countries.

Australian Water Infrastructure Under Active OT Attack. Australian Water Infrastructure Under Active OT Attack.

The pro-Russian hacktivist group Z-Pentest Alliance claimed successful access to Aquacorp's control systems in January 2026, including sanitization schedule settings, time and level controls, and alarm history. This follows their December 2025 compromise of the Burnt Hut facility in Australia, where the group gained full control over pump operations and liquid delivery parameters. HellR00ters separately claimed a DDoS attack on Victoria Police on 1 January 2026. New Zealand recorded no DDoS or hacktivist events during the month.

Alleged AUKUS and US Department of Defense Data Breach Listed for Sale. Alleged AUKUS and US Department of Defense Data Breach Listed for Sale.

On 12 January 2026, threat actor Kraxs posted a thread on BreachForums advertising allegedly compromised data from the US DoD and AUKUS partnership for sale. The listing claims to include national government planning documents, assessments of regional tensions covering Ukraine, Taiwan, and South-East Asia; as well as information relating to US Space Force and AUKUS weaponry. No sample data has been published. Group-IB is monitoring this activity and full details including recommendations are available on our Threat Intelligence Portal.

Vidar and LummaC2 Drive the Majority of Infostealer Activity with 215,584 ANZ Accounts Compromised.Vidar and LummaC2 Drive the Majority of Infostealer Activity with 215,584 ANZ Accounts Compromised.

Compromised accounts in ANZ fell 13.86% from December 2025. Vidar and LummaC2 together drove over 60% of all incidents. Vidar is distributed primarily through private Telegram channels and supergroups. The most affected account domains were Roblox, Google, Discord and Facebook - platforms with high consumer and employee overlap across the region.

ANZ Bank Card Fraud Surges 96.48% - Australia Jumps to 7th Place Globally. ANZ Bank Card Fraud Surges 96.48% - Australia Jumps to 7th Place Globally.

Australia recorded a near-doubling of compromised bank cards in January 2026, moving to 7th place globally from 10th in December 2025. Telegram and cybercrime forums were the two dominant distribution sources, together accounting for the overwhelming majority of leaked card data. Mastercard made up 54% of compromised cards, followed by Visa at 43%. This sharp rise follows a period of relative calm and signals renewed focus by financially motivated threat actors on the Australian market.

Frequently asked questions

What are the top ransomware threats targeting Australia and New Zealand in January 2026?

arrow_drop_down

CI0P is the dominant threat, executing 11 confirmed attacks in Australia in January 2026 alone – a 1,100% increase from zero in December 2025. Lynx was the second most active group with 5 incidents, followed by Qilin (2) and INC Blog (1). Professional services, manufacturing and financial services were the most targeted sectors. Australia sits 6th globally for ransomware exposure; and New Zealand, while currently lower in the rankings, should not be treated as immune given the breadth of active groups operating across the region.

What is CI0P and why is it the Adversary of the Month for January 2026?

arrow_drop_down

CI0P is one of the largest ransomware operations in history, active since February 2019. The group deploys Clop ransomware to encrypt victim files and demands Bitcoin ransom, using dedicated data leak sites to pressure organisations into payment. Most recently, the group has used Get2 downloader to deliver the SDBbot backdoor for reconnaissance and lateral movement before deploying ransomware. In January 2026, CI0P executed 11 successful attacks across Australia, targeting organisations including Etto Australia, Podiatry WA and NextPhaze.

How serious is the threat to Australian water and critical infrastructure?

arrow_drop_down

Very serious, and worsening. In January 2026, the Z-Pentest Alliance – a pro-Russian hacktivist group – claimed access to Aquacorp’s operational technology control systems, including the ability to manipulate sanitization schedules and alarm settings. This is the same group that gained full control of pump and liquid delivery systems at the Burnt Hut facility in December 2025. These are OT Access attacks targeting ICS, SCADA, and HMI interfaces, enabling covert tampering without triggering alarms. ANZ organisations operating water, irrigation, or industrial infrastructure should treat this as an active and ongoing threat.

What local data breaches and dark web activity should ANZ organisations be aware of?

arrow_drop_down

January 2026 saw several significant ANZ-specific dark web incidents. CI0P published evidence of Whole IT’s breach on January 27th, threatening sensitive data disclosure. Threat actor Big-Bro listed domain access to an unspecified Australian grocery retailer for sale on January 17th. On January 15th, user tree_lover listed scraped Linktree profile data on BreachForums. Group-IB also confirmed that a widely circulated “Database Australia” national data leak was a re-branding of the 2021 Oxfam breach – not a new incident. The alleged AUKUS and US DoD data listing by Kraxs on January 12th remains under active monitoring.

Why has ANZ bank card fraud increased so sharply in January 2026?

arrow_drop_down

Australia’s jump from 10th to 7th globally in compromised bank card rankings reflects renewed targeting by financially motivated criminal groups. Telegram and cybercrime forums are the two primary distribution channels, jointly accounting for the vast majority of leaked card data in the region. Mastercard and Visa are the most compromised card types. The sharp increase follows a period of relatively lower activity in Q4 2025 and may reflect seasonal targeting patterns as well as broader shifts in carding market activity across ANZ and the broader APAC region.

Who Should Read This Newsletter

An essential 15-minute read for ANZ Security and Risk Professionals:

Chief Information Security Officers (CISOs), Chief Information Officers (CIOs) and Heads of Security.Chief Information Security Officers (CISOs), Chief Information Officers (CIOs) and Heads of Security.

Fraud, Risk and Compliance Leaders.Fraud, Risk and Compliance Leaders.

Government and Law Enforcement Professionals.Government and Law Enforcement Professionals.

Security Operations Center (SOC), Incident Response (IR) and Threat Intelligence (TI) Teams.Security Operations Center (SOC), Incident Response (IR) and Threat Intelligence (TI) Teams.

Board Level and Executive Decision Makers.Board Level and Executive Decision Makers.

 

If you are responsible for protecting digital assets, customers or national infrastructure in Australia or New Zealand, this newsletter is for you.