The Update: A comprehensive cybersecurity study by New Zealand firm nWebbed Intelligence has revealed that nearly 200,000 active login credentials from New Zealand organizations are currently for sale on the dark web. The nWebbed NZ Cybersecurity Study analyzed over 30 billion compromised credentials and found more than 150 million linked to New Zealand, affecting over 198,000 local organizations. The exposed data includes credentials from more than 18,000 government workers, 3,200 banking staff, and 2,000 privileged healthcare accounts.
Julian Wendt, founder of nWebbed Intelligence, confirmed that these are "real emails and passwords, sitting in the wild" that are "searchable, for sale and vulnerable to exploitation".
The study highlights that many organizations remain unaware their data has been compromised, with some staff credentials exposed in multiple separate breaches over extended periods. Expert Michael Murphy noted that New Zealand's cybersecurity requirements are currently voluntary and not formalized, unlike Australia, Singapore, India, and Malaysia which have already adopted legislation requiring critical infrastructure protection. The discovery comes as cybersecurity experts warn that much of New Zealand's infrastructure dates back to the 1970s, requiring urgent investigation of potentially embedded threats.
Why it Matters: This massive credential exposure represents a critical national security risk for New Zealand and has significant implications for Australia's cybersecurity posture. The breach affects essential services that both countries' citizens rely on, including government agencies providing public services, healthcare providers managing sensitive patient data, and major banking institutions handling financial transactions. The incident demonstrates the vulnerability of Trans-Tasman digital infrastructure and highlights the urgent need for stronger cybersecurity frameworks across the region. Paul Spain, CEO of Gorilla Tech, emphasized that the primary vulnerability stems from people reusing passwords across multiple services, allowing cybercriminals to purchase credentials in bulk and use automated systems to breach additional accounts.
With stolen data pricing as low as $8 for a hacked Gmail account and up to $4,410 for cryptocurrency account details, the economic incentive for cybercriminals is substantial. The exposure occurs within the context of a broader international campaign by the ShinyHunters cybercrime group, which has recently targeted major organizations including Australian airline Qantas, demonstrating that similar vulnerabilities likely exist across Australian government and healthcare systems. This incident underscores the critical importance of implementing comprehensive cybersecurity audits, unique password policies, and multi-factor authentication across all critical infrastructure sectors in both countries.