Executive Summary
As we close out 2025, the Australian cyber threat landscape remains volatile. This week (21–28 December 2025) has been defined by a significant ransomware attack on critical telematics infrastructure, continued fallout from defence supply chain compromises, and a "Perfect 10" severity vulnerability in a widely used web framework.
Threat actors are aggressively targeting the convergence of IoT and critical infrastructure, while the Education and FinTech sectors face renewed pressure from data extortion groups. Below is your detailed briefing on the threats impacting Australian organisations this week.
Sector Intelligence
Government & Critical Infrastructure: The Netstar Incident
The most significant incident this week involves Netstar Australia, a Melbourne-based GPS and telematics provider heavily used by government and critical infrastructure operators. On 22 December 2025, the Black Shrantac ransomware group listed Netstar on its dark web leak site, claiming to have exfiltrated 800GB of data.
- Impact: Netstar provides fleet tracking for essential services. The compromise of real-time location data and customer databases poses a severe physical security risk.
- Threat Actor: Black Shrantac is a relatively new group (first detected September 2025). This is their first major Australian victim, signalling a shift towards targeting operational technology (OT) and IoT intermediaries.
- Defence Fallout: The sector is also managing the ongoing impact of the IKAD Engineering breach (reported earlier in December), where the J Group gang stole sensitive data related to the Hunter Class frigate program. These incidents highlight a critical weakness in the Australian defence and government supply chain.
Education: University of Sydney Breach
The University of Sydney is managing a serious data breach notified to staff and students on 18 December 2025, with containment efforts continuing this week.
- Vector: Unauthorised access to an online IT code library.
- Data Exposed: Historical data belonging to 13,000 staff, donors, and alumni.
- Analysis: This incident underscores the risk of "shadow IT" and forgotten repositories. Educational institutions remain high-value targets due to the vast amounts of PII and intellectual property they hold.
Healthcare: Ransomware Persistence
The healthcare sector remains the top target for data breaches in Australia.
- Point Lonsdale Medical Group (PLMG): Recently disclosed a cyber attack compromising patient information.
- Trend: Ransomware groups are moving away from pure encryption to "extortion-only" attacks, threatening to release sensitive medical records if payment is not made. With the Antidot Banker malware also circulating, healthcare apps on employee devices are at increased risk of credential theft.
FinTech & SaaS: Wealth Management Targeted
- Austin’s Financial Solutions: The Kairos ransomware group claimed responsibility for a breach this week, allegedly stealing 147GB of data, including employee passports and payroll records.
- SaaS Risk: FinTech platforms are on high alert due to the React2Shell vulnerability (see below), which allows attackers to execute code on servers running modern web applications.
Technical Spotlight: Critical Vulnerabilities
Security teams must prioritise the following exploited vulnerabilities identified this week:
1. React2Shell (CVE-2025-55182)
- Severity: Critical (CVSS 10.0)
- Target: Web Applications & SaaS
- Details: A remote code execution (RCE) vulnerability in React Server Components (versions 19.0 – 19.2.0).
- Risk: This flaw allows unauthenticated attackers to execute arbitrary code by sending a malicious payload to the server. It is being actively exploited by Chinese state-sponsored actors and cybercriminal syndicates to compromise Next.js applications commonly used in FinTech and eCommerce.
- Action: Patch immediately to version 19.2.1 or later.
2. WatchGuard Firebox (CVE-2025-14733)
- Severity: Critical
- Target: Network Edge / IoT
- Alert Date: 22 December 2025 (ASD ACSC Alert)
- Details: Active exploitation of a vulnerability in WatchGuard Firebox devices.
- Action: Apply emergency firmware updates. This is a primary vector for initial access into corporate networks.
3. Fortinet Cloud SSO Bypass (CVE-2025-59718)
- Severity: Critical
- Target: Cloud Management
- Details: An authentication bypass vulnerability in FortiCloud SSO.
- Risk: Allows attackers to gain administrative access to cloud-managed security appliances, effectively turning security tools into backdoors.
4. n8n Workflow Automation (CVE-2025-68613)
- Severity: Critical (CVSS 9.9)
- Target: AI Systems & Automation
- Details: RCE via expression injection in the n8n workflow tool.
- Relevance: As organisations rush to adopt AI automation, tools like n8n are becoming critical single points of failure. An attacker can use this to steal API keys and pivot into connected internal systems.
AI Security Watch
The rapid integration of AI into government systems is raising alarms. Reports this week indicate the Department of Home Affairs is deploying AI on sensitive data, coinciding with new warnings about Prompt Injection attacks. The exploitation of the n8n vulnerability (CVE-2025-68613) demonstrates that the infrastructure supporting AI agents is currently a softer target than the models themselves.
Recommendations for the Week Ahead
- Audit Supply Chain Access: In light of the Netstar and IKAD breaches, review all third-party vendors who have physical or digital access to your infrastructure.
- Patch React Environments: If your organisation uses Next.js or React Server Components, verify that the patch for CVE-2025-55182 has been applied. This is a "drop everything" patch.
- Secure Code Repositories: The University of Sydney incident serves as a reminder to scan public and private code repositories for hardcoded credentials and sensitive historical data.
Contact us for a quote for penetration testing service or adversary simulation.

