Ben Watson | SOC Analyst | 1 February 2025
Welcome to Fortian's January cyber environment update!
This month has seen significant change in the US. The transition from the Biden administration to the Trump administration has brought sweeping changes across multiple policy areas, and cybersecurity has been no exception. Within days of taking office, President Trump quickly moved to reverse or dismantle several initiatives put in place by his predecessor, signalling a possible shift in the U.S. approach to cyber threats and digital security.
Beyond U.S. policy shifts, cybersecurity incidents have continued to escalate globally. In Australia, ransomware attacks on local councils and manufacturing firms highlight the growing vulnerabilities faced by businesses and government entities alike. Meanwhile, new advisories from the Australian Cyber Security Centre (ACSC) warn of emerging threats, from bulletproof hosting services for cybercriminals to insecure operational technology (OT) products being actively targeted by hackers.
The transition from the Biden administration to the Trump administration has been marked by disruption, with cybersecurity policy being no exception. Within days of taking office, President Trump has overturned several initiatives implemented by his predecessor.
Another major cybersecurity initiative now in question is the executive order issued by Biden on January 16, just days before leaving office. This order sought to enhance the nation’s cyber defenses by mandating minimum cybersecurity standards for U.S. government technology contractors and strengthening measures against foreign cyber threats, including those posed by emerging technologies like quantum computing. However, with Trump's focus on deregulation and his swift revocation of previous executive orders, the future of these cybersecurity mandates remains uncertain. (apnews.com)
The early days of the Trump administration have demonstrated a clear pattern of dismantling and reversing Biden-era policies. Whether this approach will enhance or weaken U.S. cybersecurity remains to be seen, but the rapid pace of policy shifts has created uncertainty in an era where cyber threats continue to grow in complexity and scale.
Muswellbrook Shire Council confirms ransomware attack. Muswellbrook Shire Council in NSW suffered a breach allegedly at the hands of ransomware group SafePay. Safepay provided examples of the stolen data on its leak page which reportedly included council correspondence, rate payment details, and personal information related to employees and residents.
This is the third local council breach in under a year after Glenorchy City Council was breached in December last year and Wattle Range Council was breached in August . The breaches highlight a trend of poor security by local councils and emphasise a finding from the NSW Auditor General from March 2024 that local councils lack cyber preparedness. The breaches are concerning as council bodies often collect ratepayer information through third parties like the Valuer-General meaning ratepayers do not have an opportunity to say no to the collection of their data.
Aussie manufacturer Clutch Industries confirms cyber incident
Clutch Industries, an Australian auto parts manufacturer suffered a cyber-attack in January. Ransomware gang Lynx listed the company as a victim on its darknet leak site on 19 January, claiming to have stolen 350GB of data. Online reports suggest the stolen data includes shared user folders, purchasing, stock, engineering, and marketing information but limited personal data. Lynx is a relatively new ransomware group that employs double extortion tactics. Double extortion is where a threat actor both encrypts a victim's data and takes a copy which they threaten to publish if payment is not made. Lynx has been active since only July 2024 but has already targeted over 100 victims.
The ACSC published several interesting articles / advisories in January:
Mobius v Inoteq case on Business Email Compromise (BEC) fraud finds victim responsible for verifying payment details
In January a Western Australian court released a finding on a case involving Business Email Compromise. The court held that even though the payee’s email system was hacked and account details changed via email, the organisation paying the invoice was obliged to take active steps to verify that the account changes were legitimate. Because the payer didn’t take sufficient steps to verify the account changes, it was liable for the loss. We have summarised the facts of the case and provided a list of recommendations based on the court findings here.
Takeaways for Australian organisations
In terms of takeaways for Australian organisations, three key areas demand attention: Business Email Compromise (BEC) fraud, Operational Technology (OT) security, and ransomware resilience.
Request a consultation with one of our security specialists today.
Get in touch