On March 6, 2026, the Australian Cyber Security Centre (ACSC), in collaboration with New Zealand's NCSC-NZ and CERT Tonga, released a joint cybersecurity advisory detailing the operations of the INC Ransom group. This financially motivated Ransomware-as-a-Service (RaaS) provider, active since mid-2023, is enabling its affiliates to target organizations across Australia, New Zealand, and other Pacific island nations. The advisory highlights a concerning trend of attacks against the Healthcare sector and other critical services. The group employs double-extortion tactics, stealing data before encryption and threatening to leak it on a Tor-based site if the ransom is not paid.
INC Ransom is a RaaS operation that provides malware and infrastructure to its affiliates, who then carry out attacks. This model allows the group to scale its operations and attack a wide range of targets. The joint advisory confirms that between July 2024 and December 2025, the ACSC responded to 11 incidents in Australia attributed to INC Ransom, primarily impacting the professional services and healthcare sectors. A notable attack in June 2025 on the Tongan Ministry of Health disrupted the country's national healthcare network, demonstrating the group's capability and willingness to impact critical infrastructure.
Affiliates of INC Ransom utilize a variety of common but effective TTPs to compromise their victims:
T1566 - Phishing) Emails with malicious links or attachments are a common entry point.T1190 - Exploit Public-Facing Application) Targeting unpatched vulnerabilities in internet-facing systems like VPNs or web servers.T1078 - Valid Accounts) Using credentials purchased from initial access brokers or obtained from previous breaches.T1486 - Data Encrypted for Impact) and leaving a ransom note with instructions.The targeting of the healthcare sector by INC Ransom is particularly concerning due to the potential for life-threatening disruption. The attack on the Tongan Ministry of Health serves as a stark example, where the disruption of an ICT environment can cripple a national healthcare network. The impacts on victims include:
The joint advisory recommends several key mitigations:
Training users to identify and report phishing attempts is a key defense against one of INC Ransom's primary initial access vectors.
Aggressively patching public-facing applications closes the vulnerabilities that INC affiliates exploit for initial access.
MFA prevents attackers from using stolen credentials to gain access to remote services and internal systems.
Enables recovery from encryption without paying the ransom, undermining the attacker's business model.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats