WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Conti Ransomware Targets Multiple Entities in Australia, Government Warns
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Conti Ransomware Targets Multiple Entities in Australia, Government Warns

Author: Alec Davison

Created: Tuesday, December 14, 2021 - 19:04

Categories: Cybersecurity

Multiple Australian organizations have been impacted by Conti ransomware attacks in November and December 2021, according to the Australian Cyber Security Centre (ACSC). The ransomware attacks have occurred across multiple sectors, such as electric utilities and healthcare. According to an ACSC advisory, “Victims have received demands for ransom payments. In addition to the encryption of data and subsequent impact to organizations’ ability to operate as usual, victims have had data stolen during incidents published by the ransomware actors, including Personally Identifiable Information (PII).” Conti operators frequently employ TrickBot malware and a compromised Cobalt Strike tool in the ransomware attack chain.

In late November, for instance, the criminal group behind Conti ransomware, Wizard Spider, targeted the electrical utility, CS Energy. During the attack, the adversaries attempted to sabotage the production of 3,500 MW of electricity, which could have led to a blackout for millions of homes. However, the IT staff was able to block threat actor’s access right before they were able to sabotage electrical production. Additionally, the ACSC provides recommended mitigations on their Conti awareness page. Steps include enabling multi-factor authentication (MFA), segmenting enterprise networks, and maintaining daily offline backups, among others. Read more at BleepingComputer.

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar