Australia, NZ, and Tonga Issue Joint Advisory on INC Ransomware Targeting Healthcare

Australian and Pacific Authorities Warn of INC Ransomware Targeting Critical Networks

HIGH
March 6, 2026
4m read
RansomwareThreat ActorThreat Intelligence

Related Entities

Threat Actors

INC Ransom

Organizations

Australian Cyber Security Centre (ACSC) CERT TongaNCSC-NZTongan Ministry of Health

Full Report

Executive Summary

On March 6, 2026, the Australian Cyber Security Centre (ACSC), in collaboration with New Zealand's NCSC-NZ and CERT Tonga, released a joint cybersecurity advisory detailing the operations of the INC Ransom group. This financially motivated Ransomware-as-a-Service (RaaS) provider, active since mid-2023, is enabling its affiliates to target organizations across Australia, New Zealand, and other Pacific island nations. The advisory highlights a concerning trend of attacks against the Healthcare sector and other critical services. The group employs double-extortion tactics, stealing data before encryption and threatening to leak it on a Tor-based site if the ransom is not paid.

Threat Overview

INC Ransom is a RaaS operation that provides malware and infrastructure to its affiliates, who then carry out attacks. This model allows the group to scale its operations and attack a wide range of targets. The joint advisory confirms that between July 2024 and December 2025, the ACSC responded to 11 incidents in Australia attributed to INC Ransom, primarily impacting the professional services and healthcare sectors. A notable attack in June 2025 on the Tongan Ministry of Health disrupted the country's national healthcare network, demonstrating the group's capability and willingness to impact critical infrastructure.

Technical Analysis

Affiliates of INC Ransom utilize a variety of common but effective TTPs to compromise their victims:

  • Initial Access:
    • Spear-phishing: (T1566 - Phishing) Emails with malicious links or attachments are a common entry point.
    • Exploitation of Public-Facing Applications: (T1190 - Exploit Public-Facing Application) Targeting unpatched vulnerabilities in internet-facing systems like VPNs or web servers.
    • Valid Accounts: (T1078 - Valid Accounts) Using credentials purchased from initial access brokers or obtained from previous breaches.
  • Post-Compromise:
    • Privilege Escalation: Creating new privileged accounts to maintain access and control.
    • Lateral Movement: Moving through the network to identify and access high-value data.
    • Data Exfiltration: Stealing sensitive data before encryption.
    • Impact: Encrypting files for impact (T1486 - Data Encrypted for Impact) and leaving a ransom note with instructions.

Impact Assessment

The targeting of the healthcare sector by INC Ransom is particularly concerning due to the potential for life-threatening disruption. The attack on the Tongan Ministry of Health serves as a stark example, where the disruption of an ICT environment can cripple a national healthcare network. The impacts on victims include:

  • Disruption of Critical Services: In healthcare, this can lead to canceled appointments, delayed medical procedures, and risks to patient safety.
  • Data Breach: The exfiltration of sensitive patient data (Protected Health Information - PHI) can lead to significant regulatory fines under laws like HIPAA and damage to patient trust.
  • Financial Costs: Victims face costs related to incident response, network restoration, and the potential payment of a ransom.

Detection & Response

  • Detection: Monitor for the TTPs outlined in the advisory. Specifically, look for the creation of new domain admin accounts, suspicious use of remote access tools, and large outbound data transfers. EDR solutions can help detect the execution of known ransomware payloads and associated malicious scripts.
  • Response: Isolate affected systems immediately to prevent the ransomware from spreading. Secure backup systems by taking them offline. Report the incident to national cybersecurity authorities like the ACSC or CISA to receive assistance and contribute to broader threat intelligence.

Mitigation

The joint advisory recommends several key mitigations:

  1. Patch Public-Facing Services: Prioritize patching of all internet-facing systems to prevent exploitation-based initial access.
  2. User Training: Conduct regular security awareness training to help employees recognize and report phishing attempts.
  3. Multi-Factor Authentication (MFA): Enforce MFA on all remote access services, critical accounts, and cloud services.
  4. Network Segmentation: Segment networks to limit the ability of attackers to move laterally from IT systems to more sensitive environments like medical device networks.
  5. Data Backup and Recovery: Maintain and regularly test a comprehensive data backup and recovery plan. Ensure backups are stored offline or in an immutable format.

Timeline of Events

1
June 1, 2025
INC Ransom conducted an attack on the Tongan Ministry of Health's ICT environment, disrupting the national healthcare network.
2
March 6, 2026
A joint advisory on INC Ransom was issued by ACSC, CERT Tonga, and NCSC-NZ.
3
March 6, 2026
This article was published

MITRE ATT&CK Mitigations

Training users to identify and report phishing attempts is a key defense against one of INC Ransom's primary initial access vectors.

Aggressively patching public-facing applications closes the vulnerabilities that INC affiliates exploit for initial access.

MFA prevents attackers from using stolen credentials to gain access to remote services and internal systems.

Enables recovery from encryption without paying the ransom, undermining the attacker's business model.

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

INC RansomRaaSHealthcareAustraliaNew ZealandACSCRansomware

📢 Share This Article

Help others stay informed about cybersecurity threats