Annual Cyber Threat Report 2023–2024: The State of Cybersecurity in Australia

The 2023–2024 Cyber Threat Report by the Australian Signals Directorate (ASD) has been released, and it is a reality check for Australia’s cyber landscape. State sponsored attacks, critical infrastructure vulnerabilities and cybercriminals getting smarter, this is a wake up call for everyone – individuals, businesses and government. Today we have provided a summary of the report for easier reading, as the report in it raw form is quite long.


Year in Review: Cyber Threats by the Numbers

The report shows a complex and getting more complex cyber threat environment:

  • 87,400 cybercrime reports in FY2023–24, one every six minutes. Although that’s a 7% decrease, it’s still a big number.

  • 36,700 calls to the Australian Cyber Security Hotline, an average of 100 calls per day, up 12% from last year.

  • Self reported cost of cybercrime for individuals up 17% to an average of $30,700 per report.

  • Business email compromise (BEC) still the biggest problem, $84 million lost, with an average of $55,000 lost per confirmed incident.

Cyber security incidents by severity category for FY2023–24 (total 1,129)

Critical Infrastructure: A Big Target

Critical infrastructure is a prime target for cyber attackers because of the services it provides and the data it holds. The ASD said:

  • 11% of cyber incidents responded to in FY2023–24 were against critical infrastructure.

  • Top tactics were phishing (23%), public facing applications (21%) and brute force (15%).

  • DoS and DDoS attacks were over represented in these incidents, twice as many as other sectors.

The impact of attacks on critical infrastructure is far reaching, affecting the economy, national security and everyday Australians. Malicious actors – from state sponsored groups to cybercriminals – are exploiting vulnerabilities in interconnected operational technology (OT) and information technology (IT) systems.

State Sponsored Threats: The Smarter Actors

The report highlights the ongoing threat from state sponsored actors:

  • China and Russia are named as the primary threats, with Chinese actors using “living off the land” (LOTL) to maintain persistent access to critical infrastructure. This means disguising malicious activity as normal network behaviour.

  • Russia’s use of adaptive techniques such as cloud exploitation shows the state sponsored tradecraft is getting smarter.

  • Phishing tools are still common and effective, as seen in spear phishing campaigns from Russian actors targeting governments and academia globally.

The ASD also worked with international partners to release joint advisories on these threats and mitigations for organisations.

Cybercriminals are innovating fast:

  • The rise of artificial intelligence (AI) is allowing low sophistication actors to launch more targeted attacks, including AI generated phishing and deepfakes.

  • A notable example was vishing (video phishing) where a multinational was tricked into transferring millions of dollars using an AI generated deepfake video call.

  • Ransomware is still a big problem, 11% of all incidents. Malicious actors are now using data theft extortion, where sensitive information is stolen and used to extort victims without encrypting systems.

Despite improved cyber defences the report says don’t pay the ransom as it feeds the cyber criminal business model.

Breakdown of cybercrime reports by jurisdiction for FY2023-24

Resilience and Response: National

The Australian Government is investing more in cybersecurity:

  • Under the 2024 Integrated Investment Program $15–$20 billion has been allocated to cyber capabilities, including offensive operations and infrastructure protection.

  • Autonomous cyber sanctions were used for the first time against two Russian cybercriminals involved in ransomware attacks, a tougher approach to cybercrime.

The report also notes the importance of partnerships:

  • Over 119,300 organisations are part of the ASD Cyber Security Partnership Program.

  • The Cyber Threat Intelligence Sharing (CTIS) platform allows real time, bidirectional sharing, faster and more scale.

How to Strengthen Your Defences

The report recommends proactive action to counter the threats. Here are the key recommendations:

  1. MFA: Simple and effective defence against unauthorised access.

  2. Software Updates: Keep systems patched.

  3. Network Segmentation: Isolate critical systems in case of a breach.

  4. Incident Response Plans: Assume a breach will happen and plan for it.

  5. Secure Supply Chains: Vet vendors before integrating their products or services.

MFA account login graph
What logging into an account with phishing-resistant MFA looks like

Get Involved

The 2023–2024 Cyber Threat Report is not just a report, it’s a call to action. Whether you’re an individual, a business or a government agency, being vigilant and investing in good cyber practices is no longer a nice to have, it’s a must.

Go to cyber.gov.au to read the full report.

Discussions and Comments

Click here to view and join in on any discussions and comments on this article.

Written by
Paul Baka

Tags: #News

SSLTrust Blog

View our blog covering news and topics in security, certificate authorities, encryption and PKI.

Learning Centre

View more resources on cyber security, encryption and the internet.