AUNZ Intelligence Insights Report, March 2026
← Research Hub

AUNZ Intelligence Insights Report, March 2026

Insights Monthly actionable threat intelligence and sharp insights into ransomware, hacktivism, infostealers and financial fraud curated by Group-IB's Threat Intelligence team for Australia and New Zealand (ANZ).

ANZ faces a rapidly evolving cyber threat environment with ransomware operators, hacktivist groups and financially motivated threat actors all active in the region. Group-IB’s March 2026 ANZ Threat Landscape provides a deep dive into ransomware, hacktivism, compromised accounts and financial fraud with local context, named victims and adversary profiles specific to the ANZ market.

Unlike aggregated open-source reports, this intelligence is drawn directly from Group-IB’s proprietary telemetry, dark web monitoring and infostealer tracking.

Key Findings & ANZ Cybersecurity Trends in March 2026

Healthcare Becomes the Primary Ransomware TargetHealthcare Becomes the Primary Ransomware Target

ANZ recorded 11 ransomware incidents in March 2026, representing a 10% increase from February 2026. Healthcare absorbed five of those incidents, making it the most targeted sector in the region. Groups including Rhysida, DragonForce and SafePay Ransomware all claimed attacks against Australian healthcare organisations. Qilin led overall activity with three recorded attacks, including a confirmed strike on Fortress Systems. In New Zealand, The Gentlemen claimed the most notable incident, targeting Intra Ltd and disclosing files on their dedicated leak site. Australia sits 19th globally for ransomware exposure, down from 13th in February. New Zealand ranks 78th.

Adversary of the Month: DieNetAdversary of the Month: DieNet

A politically motivated threat actor group active since 2025, DieNet compressed a full year's worth of attack volume into a single month in March 2026. DieNet conducts Network Denial of Service attacks by overwhelming target infrastructure with high-volume traffic from large botnets of compromised devices. Where defences are degraded, defacement follows. In Australia, DieNet has previously targeted the Australian Government, NSW Government, Canva, the University of Western Australia, McGrath Real Estate and Amazon Australia.

Supply Chain Compromise Hits Australian DevSecOps PipelinesSupply Chain Compromise Hits Australian DevSecOps Pipelines

Supply Chain Compromise Hits Australian DevSecOps Pipelines

Australian Financial Data and Retailer Records Sold on Underground ForumsAustralian Financial Data and Retailer Records Sold on Underground Forums

Group-IB identified a database sale from financial services provider Infinity Australia, posted to the exploit[.]in underground forum on 31 March by newly registered threat actor einein786. The leak contained company documents from 2024 including personally identifiable information: passport details, driver's licences, tax file numbers and bank statements. Separately, threat actor 2019 - first seen in February 2026 - posted an alleged database leak from Australian retailer Phonebot containing customer records and loyalty point balances, raising the risk of targeted follow-on fraud against affected customers.

ANZ Bank Card Compromises Rise 17.39% ANZ Bank Card Compromises Rise 17.39%

Australia recorded 4,949 compromised bank cards in March 2026, a 17.39% increase from February 2026, moving to 17th place globally. New Zealand ranked 57th, up from 71st in February 2026. Telegram was the single largest source with 4,003 cards distributed through the platform, followed by Telegram Bots. Visa made up 58% of compromised cards, followed by Mastercard at 37%. Maestro recorded 127 compromises.

Frequently asked questions

What are the top ransomware threats targeting Australia and New Zealand in March 2026?

arrow_drop_down

Qilin is the most active group this month with three recorded attacks, including a confirmed incident against Fortress Systems in Australia. DragonForce and Gunra each claimed two incidents. Lockbit recorded two activities. SafePay and Black Shrantac each claimed one. In New Zealand, The Gentlemen is the most notable actor, having disclosed data from Intra Ltd on their dedicated leak site. Healthcare was the hardest-hit sector with five incidents, followed by Commerce and Retail with three, and Manufacturing and Real Estate each with two.

What is DieNet and why is it the Adversary of the Month for March 2026?

arrow_drop_down

DieNet is a politically motivated threat actor group active since 2025, conducting DDoS, hacktivism and defacement attacks across government, financial services, telecommunications, education, energy and critical infrastructure. In March 2026 alone, they claimed over 192 attacks – compressing the equivalent of their prior 12 months of output into a single month. Their primary MITRE ATT&CK technique is Network Denial of Service. DieNet targets any nation or organisation they perceive as misaligned with their political position, including Australian government agencies, universities and major consumer brands. Their impact profile over the past 12 months includes 401 Network Denial of Service attacks and 12 Exfiltration Over C2 events.

How serious is the supply chain threat to Australian organisations in March 2026?

arrow_drop_down

Serious, and directly relevant to any team running open-source tooling in automated pipelines. The Trivy scanner compromise attributed to TeamPCP on 20 March affected multiple release versions and GitHub Actions workflows simultaneously. The attack succeeded because pipelines use version tags – which attackers can overwrite – rather than cryptographic hashes. The malicious code enabled credential stealing and exfiltration from downstream environments without visible tampering indicators. ANZ organisations should audit all third-party tool dependencies in their CI/CD pipelines, enforce hash-based integrity checks, and review GitHub Actions workflows for unexpected modifications.

What local data breaches and dark web activity should ANZ organisations be aware of in March 2026?

arrow_drop_down

March 2026 produced two significant ANZ-specific underground incidents. Infinity Australia’s financial services data including passport details, driver’s licences, tax file numbers and bank statements were listed for sale on exploit[.]in on 31 March by threat actor einein786. Phonebot customer data, including account-specific loyalty balances, was separately posted by threat actor 2019, a newly active actor specialising in healthcare, ecommerce and business services databases. Both incidents carry risk of follow-on fraud, identity theft and targeted social engineering against affected individuals.

Why have hacktivist groups increased activity against Australia in March 2026?

arrow_drop_down

Hacktivist groups aligned with pro-Iran or pro-Palestine political positions have significantly increased global attack tempo in response to the escalating Iran-Israel-US conflict. By 25 March 2026, Group-IB had recorded more than 500 conflict-linked cyber attacks globally. In Australia, three incidents were recorded in March: RipperSec’s DDoS on ZFA Australia, Z-Pentest’s claimed access to food services surveillance infrastructure in Queensland, and Group 313’s DDoS attack on the Moodle education platform affecting university staff and students. These attacks are motivated by Australia’s perceived geopolitical alignment. Organisations should monitor threat actor chatter and scheduled attack announcements via Group-IB’s Threat Intelligence Platform for early warning of planned operations.

Who Should Read This Report

An essential read for ANZ Security and Risk Professionals:

Chief Information Security Officers (CISOs), Chief Information Officers (CIOs) and Heads of Security.Chief Information Security Officers (CISOs), Chief Information Officers (CIOs) and Heads of Security.

Fraud, Risk and Compliance Leaders.Fraud, Risk and Compliance Leaders.

Government and Law Enforcement Professionals.Government and Law Enforcement Professionals.

Security Operations Center (SOC), Incident Response (IR) and Threat Intelligence (TI) Teams.Security Operations Center (SOC), Incident Response (IR) and Threat Intelligence (TI) Teams.

Board Level and Executive Decision Makers.Board Level and Executive Decision Makers.

 

If you are responsible for protecting digital assets, customers or national infrastructure in Australia or New Zealand, this report is for you.