How LockBit's Attack on OracleCMS Unfolds a Cautionary Tale
On April 4th, the well-known ransomware group, LockBit, launched a stealthy cyber-attack on OracleCMS, a prominent Australian call centre operator. By April 12th, details of the attack were publicly revealed on LockBit's own leak site—a chilling showcase of the group's reach and impact.
OracleCMS, which operates contact centres across Australia, found itself in a dire situation when LockBit released over 60 terabytes of compressed data. This colossal breach included sensitive billing and financial documents, as well as a treasure trove of client information. The data, regrettably, featured extensive details from local councils, aged-care facilities, law firms, and even religious organisations like the Queensland chapter of the Philadelphia Church of God.
Among the leaked documents were on-call mobile numbers, extensive Excel spreadsheets, and details as minute as the location and meter IDs of every parking meter in the City of Sydney. More alarmingly, there were records of phone calls made to aged-care providers reporting serious issues such as diseases and instances of domestic abuse. While it appeared that no personally identifiable information was directly exposed, the breach still posed significant privacy risks.
What Does This Mean for You?
If you're concerned about the possibility of falling victim to a similar cyber-attack, here are some actionable tips to safeguard your data:
What If You're Caught in a Ransomware Attack?
If you find yourself in the grip of a ransomware attack, here’s what you can do:
The attack on OracleCMS serves as a potent reminder of the ever-present cyber threats in our interconnected world. By taking proactive steps and preparing for potential cyber incidents, businesses can better protect themselves and their sensitive data.
CyberUnlocked acknowledges the Traditional Custodians of Country throughout Australia and their ongoing connection to land, waters and community. We pay our respects to Elders, past, present and emerging.