31st March 2026 Cyber Update: Ransomware Pressure Builds Across Australian Healthcare

Australia’s healthcare sector faces sustained ransomware pressure, with multiple threat groups exploiting weak controls and legacy systems. Recent breaches highlight systemic gaps, where compromised vendors and undetected lateral movement are driving a rising risk of sector-wide disruption.

31st March 2026 Cyber Update: Ransomware Pressure Builds Across Australian Healthcare

Australia’s healthcare system is now under sustained ransomware pressure, with multiple threat groups exploiting the same structural weaknesses across the sector.

The update

Over the past 18 months, INC Ransom affiliates have quietly moved through at least 11 Australian organisations, many tied to healthcare and essential professional services. Their approach is methodical rather than flashy, gaining access through compromised credentials, elevating privileges to administrator level, and navigating networks with the patience of insiders. By the time encryption payloads are deployed, often disguised as routine system processes, the impact is already embedded within the environment.

On 24 March, the situation shifted again. DragonForce surfaced with a claimed breach of an Australian healthcare software provider, widening the field of risk beyond a single target. The exposure is not limited to one entity and may extend to hospitals and clinics connected through shared platforms, reflecting the level of interdependence across the sector.

Why this is working

These attacks are not succeeding because they are highly advanced. They are succeeding because they are difficult to distinguish from normal operations.

Threat actors are using native system tools such as PowerShell and remote administration utilities already embedded within healthcare networks. This approach removes the need for traditional malware and allows attackers to operate inside environments for extended periods without detection.

The underlying weaknesses are consistent and unresolved:

  • Legacy systems that remain exposed and unpatched
  • Underfunded security capability across clinics and providers
  • Compliance-driven governance that replaces real monitoring
  • Third-party dependencies that amplify a single breach into system-wide risk

Government data confirms the outcome. Healthcare remains one of the most successfully compromised sectors in Australia.

What matters now

This is no longer a series of incidents. It is a systemic condition.

Across Asia-Pacific, ransomware activity is accelerating, with the region now among the most targeted globally. Attacks on healthcare carry consequences beyond financial loss. They degrade national resilience, disrupt frontline services, and place direct pressure on public confidence in essential systems.

Australia’s healthcare network is particularly exposed. Interconnected providers and shared software platforms mean a single point of failure can cascade quickly across the system.

The bottom line

The issue is not awareness. It is execution.

Advisories continue to increase. Outcomes do not.

Core controls such as logging, patching, credential management, and continuous monitoring remain inconsistent. Until healthcare boards treat cyber resilience as a core operational obligation, rather than a delegated IT function, threat actors will continue to operate with a high probability of success.


Get the stories that matter to you.
Subscribe to Cyber News Centre and update your preferences to follow our Daily 4min Cyber Update, Innovative AI Startups, The AI Diplomat series, or the main Cyber News Centre newsletter — featuring in-depth analysis on major cyber incidents, tech breakthroughs, global policy, and AI developments.

Great! You’ve successfully signed up.

Welcome back! You've successfully signed in.

You've successfully subscribed to Cyber News Centre.

Success! Check your email for magic link to sign-in.

Success! Your billing info has been updated.

Your billing was not updated.