Australia’s healthcare sector faces sustained ransomware pressure, with multiple threat groups exploiting weak controls and legacy systems. Recent breaches highlight systemic gaps, where compromised vendors and undetected lateral movement are driving a rising risk of sector-wide disruption.
NVIDIA turned AI factories into grid assets, China published its AI dominance doctrine, and the US military confirmed using Claude in Iran strikes. From energy infrastructure to battlefield targeting, the AI race this week moved well beyond Silicon Valley.
DragonForce ransomware hit Health Management Systems, an Australian healthcare software provider. Hospitals/clinics urged to check vendor security, isolate backups & train staff vs phishing.
31st March 2026 Cyber Update: Ransomware Pressure Builds Across Australian Healthcare
Australia’s healthcare sector faces sustained ransomware pressure, with multiple threat groups exploiting weak controls and legacy systems. Recent breaches highlight systemic gaps, where compromised vendors and undetected lateral movement are driving a rising risk of sector-wide disruption.
Australia’s healthcare system is now under sustained ransomware pressure, with multiple threat groups exploiting the same structural weaknesses across the sector.
The update
Over the past 18 months, INC Ransom affiliates have quietly moved through at least 11 Australian organisations, many tied to healthcare and essential professional services. Their approach is methodical rather than flashy, gaining access through compromised credentials, elevating privileges to administrator level, and navigating networks with the patience of insiders. By the time encryption payloads are deployed, often disguised as routine system processes, the impact is already embedded within the environment.
On 24 March, the situation shifted again. DragonForce surfaced with a claimed breach of an Australian healthcare software provider, widening the field of risk beyond a single target. The exposure is not limited to one entity and may extend to hospitals and clinics connected through shared platforms, reflecting the level of interdependence across the sector.
Why this is working
These attacks are not succeeding because they are highly advanced. They are succeeding because they are difficult to distinguish from normal operations.
Threat actors are using native system tools such as PowerShell and remote administration utilities already embedded within healthcare networks. This approach removes the need for traditional malware and allows attackers to operate inside environments for extended periods without detection.
The underlying weaknesses are consistent and unresolved:
Legacy systems that remain exposed and unpatched
Underfunded security capability across clinics and providers
Compliance-driven governance that replaces real monitoring
Third-party dependencies that amplify a single breach into system-wide risk
Government data confirms the outcome. Healthcare remains one of the most successfully compromised sectors in Australia.
What matters now
This is no longer a series of incidents. It is a systemic condition.
Across Asia-Pacific, ransomware activity is accelerating, with the region now among the most targeted globally. Attacks on healthcare carry consequences beyond financial loss. They degrade national resilience, disrupt frontline services, and place direct pressure on public confidence in essential systems.
Australia’s healthcare network is particularly exposed. Interconnected providers and shared software platforms mean a single point of failure can cascade quickly across the system.
The bottom line
The issue is not awareness. It is execution.
Advisories continue to increase. Outcomes do not.
Core controls such as logging, patching, credential management, and continuous monitoring remain inconsistent. Until healthcare boards treat cyber resilience as a core operational obligation, rather than a delegated IT function, threat actors will continue to operate with a high probability of success.
Get the stories that matter to you. Subscribe to Cyber News Centre and update your preferences to follow our Daily 4min Cyber Update, Innovative AI Startups, The AI Diplomat series, or the main Cyber News Centre newsletter — featuring in-depth analysis on major cyber incidents, tech breakthroughs, global policy, and AI developments.
Sign up for Cyber News Centre
Where cybersecurity meets innovation, the CNC team delivers AI and tech breakthroughs for our digital future. We analyze incidents, data, and insights to keep you informed, secure, and ahead.
DragonForce ransomware hit Health Management Systems, an Australian healthcare software provider. Hospitals/clinics urged to check vendor security, isolate backups & train staff vs phishing.
A global coalition led by Microsoft and Europol has dismantled the Tycoon 2FA phishing-as-a-service platform, a major criminal enterprise that enabled attackers to bypass multi-factor authentication and compromise nearly 100,000 organisations worldwide.
Stryker is rebuilding after a cyberattack that wiped about 80,000 devices via a compromised Intune admin account, with up to 50TB of data reportedly exfiltrated. As US systems face similar probes, Australia is exposed, increasing pressure on boards to tighten cyber controls and readiness.
Google has issued an emergency patch for a high-severity zero-day (CVE-2026-3910) in its V8 JavaScript engine, which is being actively exploited in the wild. The flaw allows arbitrary code execution, posing a significant risk to billions of Chrome users globally, including in Australia.
Where cybersecurity meets innovation, the CNC team delivers AI and tech breakthroughs for our digital future. We analyze incidents, data, and insights to keep you informed, secure, and ahead. Sign up for free!