As a senior penetration tester actively engaged in adversary simulation and defensive analysis across Australia, I am observing a rapid escalation in both the sophistication and frequency of cyber threats. For our daily briefing on 18 April 2026, we analyse the critical threats, prominent actors, and exploited vulnerabilities that have surfaced and accelerated over the past 24 hours. Recent intelligence, including urgent warnings from ASIO regarding critical infrastructure and the latest 2026 threat reports, paints a volatile picture for Australian organisations.
Prominent Threat Actors & Emerging Tactics
Over the last 24 hours, our telemetry and national incident advisories have highlighted two distinct tiers of threat actors dominating the Australian landscape:
- Nation-State Adversaries (Volt Typhoon & Salt Typhoon): ASIO has reiterated warnings regarding these advanced persistent threat (APT) groups. Their behaviour focuses heavily on establishing deep, undetected persistence within Australian critical infrastructure, government, and telecommunications networks. They are moving away from noisy "smash and grab" tactics, instead favouring "living off the land" techniques to execute long-term espionage and prepare for potential operational disruption.
- Ransomware-as-a-Service (RaaS) Syndicates (INC Ransom): Financially motivated groups like INC Ransom are aggressively targeting Australian professional services. Cyber extortion has now officially eclipsed Business Email Compromise (BEC) as the primary incident type. Attackers are heavily leveraging low-cost, AI-driven Phishing-as-a-Service (PHaaS) kits to execute Adversary-in-the-Middle (AiTM) session hijacking, effectively bypassing traditional Multi-Factor Authentication (MFA).
Sector-Specific Threat Landscape
- Healthcare: Healthcare remains the most targeted sector in Australia today. We are seeing threat actors actively exploit legacy web applications and unauthenticated endpoints to deploy ransomware, exfiltrate sensitive patient records, and extort providers.
- SaaS Providers: Supply chain attacks are escalating. Threat actors are exploiting unpatched vulnerabilities in the cloud environments of major global SaaS and legal intelligence providers. A breach in a trusted SaaS platform now immediately cascades to downstream Australian clients, making third-party risk a critical vulnerability.
- FinTech & eCommerce: Financial services are the primary victims of AiTM attacks and session hijacking. Threat actors are targeting payment APIs and checkout web applications, exploiting broken object level authorisation (BOLA) to scrape customer financial data and manipulate transactions.
- Government: Federal and state entities are actively defending against state-sponsored espionage. While the rapid adoption of passkeys on platforms like myGov is a massive step forward for identity assurance, legacy on-premises systems and misconfigured cloud active directories remain highly vulnerable.
- Education/EdTech: EdTech platforms are experiencing opportunistic data theft. Attackers are exploiting poorly configured cloud storage buckets and insecure APIs to harvest student data. Furthermore, as universities aggressively integrate AI into learning platforms, we are logging early attempts at prompt injection to bypass academic guardrails and access administrative backend systems.
- IoT: With Australia recently mandating minimum security standards for connected devices, attackers are scanning frantically to compromise legacy IoT fleets before they are decommissioned. We are seeing active exploitation of hardcoded credentials and insecure firmware update mechanisms in industrial programmable logic controllers (PLCs) and commercial IoT sensors.
Exploited Vulnerabilities: Web, API, Cloud, and AI Systems
From a penetration testing perspective, the vulnerabilities leading to these breaches share common architectural flaws:
- AI Systems: The most immediate risk we see is insider behaviour—staff inadvertently uploading sensitive, proprietary data to public AI platforms. Externally, prompt injection and data poisoning attacks are transitioning from theoretical to practical threats against newly deployed enterprise AI assistants, allowing attackers to manipulate poorly sanitised inputs to extract backend database information.
- Web Applications & APIs: Valid accounts obtained via infostealers are the primary initial access vector. However, once inside, attackers are exploiting API business logic flaws and Insecure Direct Object References (IDOR) to pivot laterally and access unauthorised data stores.
- Cloud Infrastructure: Misconfigured Identity and Access Management (IAM) roles and exposed external remote services are facilitating rapid cloud environment takeovers. In cloud environments, Server-Side Request Forgery (SSRF) vulnerabilities in web applications are being abused to query cloud metadata services, extracting highly privileged IAM credentials.
Strategic Defence Recommendations
The days of relying solely on standard MFA and basic vulnerability scanning are over. Australian organisations must adopt phishing-resistant authentication (such as passkeys), rigorously govern their AI tooling, segment their operational technology (OT) from corporate networks, and continuously validate their external attack surface and cloud security posture through offensive testing.
Contact us for a quote for penetration testing service or adversary simulation.

