1st December 2025 Cyber Update: Australian Defence Supply Chain Breached

A series of cyber attacks on Australian defence supply chain contractors has exposed sensitive material relating to major weapons programs, including the Redback infantry fighting vehicle.

1st December 2025 Cyber Update: Australian Defence Supply Chain Breached
IKAD Engineering

Cyber News Centre's cyber update for 1st December 2025: A series of cyber attacks on Australian defence supply chain contractors has compromised material relating to Australia's weapons programs.

IKAD Engineering, a key player in the Australian defence industry, and overseas contractors involved in the ADF’s new Redback infantry fighting vehicle programme have been affected. The breaches have exposed sensitive data and highlight significant vulnerabilities in the nation’s defence industry and critical infrastructure.

The Update and Why It Matters

Update: A series of cyber attacks on defence industry supply chain contractors has exposed threats to Australia's weapons programs. Recently it was revealed that a hacker group shared material about Australia's $7 billion Land 400 military program after allegedly breaching several Israeli defence companies. The Cyber Toufan group posted images and details on Telegram about the Australian Defence Force's (ADF) next-generation Redback infantry fighting vehicle.

Another group, J Group, claimed responsibility for a cyber attack on IKAD Engineering, a key player in the Australian defence industry. The ransomware gang alleges it infiltrated the company's systems for five months, exfiltrating 800GB of data, including information relating to Australian naval contracts, such as the Hunter Class frigate and Collins Class submarine programs. IKAD Engineering chief executive Gerard Dyson confirmed the incident, stating an "external third party" had gained unauthorised access to a portion of its internal IT systems.

Why it Matters: These incidents are a stark reminder of the importance of supply-chain cyber-resilience. The breaches highlight a structural problem in defence and high-security industries: the entire supply chain constitutes the attack surface. Even data that the supplier characterises as “non-sensitive” can hold strategic value.

Metadata, file structure, subcontractor networks, and project timelines may provide malicious actors with a roadmap to more critical systems. The timing of these breaches coincides with heightened warnings from Australia’s intelligence community. The head of ASIO recently stated that state-backed hacking groups are intensifying efforts to infiltrate Australia’s critical infrastructure and defence supply chains.


Get the stories that matter to you.
Subscribe to Cyber News Centre and update your preferences to follow our Daily 4min Cyber Update, Innovative AI Startups, The AI Diplomat series, or the main Cyber News Centre newsletter — featuring in-depth analysis on major cyber incidents, tech breakthroughs, global policy, and AI developments.

Great! You’ve successfully signed up.

Welcome back! You've successfully signed in.

You've successfully subscribed to Cyber News Centre.

Success! Check your email for magic link to sign-in.

Success! Your billing info has been updated.

Your billing was not updated.