Managed security service providers (MSSPs) are now a core part of how organisations protect...
Australia’s Cyber Threat Landscape 2025: Key Insights from the ASD Annual Cyber Threat Report

First Published:
Content Written For:
Small & Medium Businesses
Large Organisations & Infrastructure
Government
Read Similar Articles
How SOC Services Operationalise Managed Detection and Response
Introduction Many organisations invest in advanced detection tools yet still struggle to turn...
SOC Services vs MDR (Managed Detection & Response)
Introduction In this article we discuss SOC services vs MDR. SOC services and Managed Detection...
SOC Services Australia: Strategic Guide
SOC services sit at the centre of modern cybersecurity operations. As organisations become more...
SOC 2 Certification: What It Really Means and How to Achieve It
SOC 2 certification is one of the most searched compliance terms in cybersecurity, particularly...
The ASD Annual Cyber Threat Report 2024–25 confirms that Australia’s cyber risk environment has intensified across all sectors. The Australian Cyber Security Centre (ACSC) responded to more than 1,200 cyber security incidents, showing an 11% increase from the previous year. Moreover, it received 84,700 cybercrime reports; as a result, one was lodged approximately every six minutes.
The financial impact has risen sharply. The average cost of a cybercrime report for businesses increased by 50% to $80,850, while large businesses experienced a 219% rise in losses.
For critical infrastructure (CI), Denial-of-Service (DoS/DDoS) attacks increased by 280%, accounting for nearly a third of all incidents. Individuals now face an average $33,000 loss per cyber incident, with identity fraud remaining the top reported crime type.
The ACSC urges Australian organisations to “assume compromise” and focus on protecting their “crown jewels.” It recommends four key strategic actions:
- Implement best-practice event logging.
- Replace legacy technology.
- Choose secure-by-design products and suppliers.
- Begin planning for post-quantum cryptography.
Key Takeaways
- The ASD Cyber Threat Report reveals an 11% increase in cyber incidents with over 1,200 incidents reported.
- Denial-of-Service attacks surged by 280%, affecting critical infrastructure significantly.
- Individuals face average losses of $33,000 per cyber incident, with identity fraud remaining the top crime.
- The report urges organisations to implement best practices, upgrade technology, and prepare for post-quantum cryptography.
- Emerging threats include ransomware, AI-driven attacks, and state-sponsored campaigns targeting key sectors.
Key Findings at a Glance
| Metric | FY2024–25 | Change YoY | Source |
|---|---|---|---|
| Cybercrime reports | 84,700 | Slight decrease | ASD 2025 |
| Cyber incidents responded to | 1,200+ | 11% increase | ASD 2025 |
| Average cost per business cybercrime | $80,850 | 50% increase | ASD 2025 |
| Average cost for large business | $202,700 | 219% increase | ASD 2025 |
| DoS/DDoS incidents (all sectors) | 200+ | 280% increase | ASD 2025 |
| Cybercrime reports per 6 minutes | 1 | Consistent | ASD 2025 |
Australia’s Expanding Attack Surface
1. Businesses:
Cybercriminals remain motivated by financial gain. The top three reported threats were:
- Email compromise without financial loss (19%)
- Business email compromise fraud with financial loss (15%)
- Identity fraud (11%)
High-value data holdings and interdependent supply chains continue to make mid-tier and enterprise organisations attractive targets.
2. Critical Infrastructure:
The ACSC reported that 13% of all incidents involved CI, with financial services, transport and logistics, and telecommunications most affected.
In addition, state-sponsored actors increasingly employ “living off the land” techniques, which means they blend into legitimate network traffic until eventually they choose to act.
3. Individuals:
The rise of identity-related fraud highlights the human cost of cybercrime. Australians most frequently reported identity fraud (30%), online shopping fraud (13%), and online banking fraud (10%).
Emerging Threat Dynamics
A. Ransomware and Extortion Economics
Ransomware remains among the most disruptive forms of cybercrime. The ACSC responded to 138 ransomware incidents in 2024–25. Notably, 39% of these were detected by the ACSC itself rather than by the affected organisations.
The government has now introduced a mandatory ransomware reporting regime for businesses with turnover exceeding $3 million and for CI operators. This signals a shift toward national transparency and coordinated defence.
B. Information Stealers and Credential Reuse
The ACSC draws attention to the growing prevalence of information stealer malware that exfiltrates credentials, credit card details, and personal data. These tools enable follow-on attacks and are commonly distributed through phishing campaigns and malware-as-a-service models.
C. AI and Automation Risks
Generative AI brings both innovation and new attack capabilities. The ACSC warns that AI allows threat actors to scale phishing, data analysis, and impersonation activity more efficiently than ever before.
D. State-Sponsored Campaigns
Australia continues to experience targeted espionage and disruption attempts from foreign state actors.
- APT40 (China) is exploiting public-facing vulnerabilities and hijacking home routers for botnets.
- APT28 (Russia) has targeted logistics and technology firms that support aid to Ukraine.
Post-Quantum and “Assume Breach” Mindsets
The ASD links national cyber preparedness to post-quantum resilience, warning that organisations must begin migrating to quantum-safe cryptography before 2030. A cryptographically relevant quantum computer could break today’s encryption, exposing communications and sensitive data.
The ACSC advises organisations to:
- Create an inventory of cryptographic assets.
- Develop a roadmap for PQC adoption.
- Require secure-by-design assurances from vendors.
Building Resilience: Four Strategic Moves for 2025
| Priority | Description | Business Implication |
|---|---|---|
| 1. Event Logging | Implement comprehensive, tamper-proof logs for detection and forensics. | Enables faster containment and regulatory response. |
| 2. Legacy IT Replacement | Replace unsupported systems or apply strong mitigations. | Reduces exposure to exploits and lowers incident costs. |
| 3. Secure-by-Design Procurement | Vet suppliers and SaaS providers for demonstrable security posture. | Reduces supply-chain risk. |
| 4. Post-Quantum Cryptography | Begin planning for quantum-safe encryption. | Strengthens long-term data integrity and compliance. |
Strategic Takeaways for Australian Organisations
- Cybercrime is escalating faster than defence capability. Incidents rose by 11%, and enterprise losses more than tripled.
- Critical infrastructure is the primary target. 13% of all incidents affected CI, and DDoS activity has almost tripled.
- AI is amplifying attacker capability. Deepfakes, fraudulent KYC documentation, and AI-generated phishing are now routine.
- Regulatory expectations are tightening. Mandatory ransomware reporting, Essential Eight maturity, and PQC adoption are becoming standard practice.
- Visibility remains the foundation of defence. The most severe incidents were identified by the ACSC rather than by the organisations themselves.
CyberPulse Recommendations
- Prioritise telemetry and logging. Without detailed logs, incident response is reactive and incomplete. Consider a Managed Detection and Response Service.
- Accelerate legacy system decommissioning. Integrate this with IT lifecycle management and budgeting.
- Adopt continuous threat intelligence. Participate in ASD’s Cyber Security Partnership Program.
- Reassess incident readiness. Test playbooks quarterly and align them with ACSC reporting channels.
- Begin quantum transition planning immediately. Treat it as a multi-year cryptographic migration program.
About CyberPulse
CyberPulse is a security-first compliance partner helping organisations reduce cyber risk, build resilience and achieve certification with confidence. Founded by former CISOs and security leaders, we align technical depth with real-world context to deliver measurable outcomes across advisory, managed services, compliance and threat defence.
Let’s Talk
Follow us on LinkedIn for practical insights, or contact us to speak with a CyberPulse expert.
Useful Links
Related Services
External References
Browse to Read Our Most Recent Articles & Blogs
Subscribe for Early Access to Our Latest Articles & Resources
Connect with us on Social Media
