Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Unauthenticated remote command injection

    April 8, 2026

    Microsoft rolls out fix for broken Windows Start Menu search

    April 8, 2026

    SSA-723487 V1.8 (Last Update: 2025-12-09): RADIUS Protocol Susceptible to Forgery Attacks (CVE-2024-3596) – Impact to SCALANCE, RUGGEDCOM and Related Products

    April 8, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»Alerts»Incident: Cyber attack on Victoria’s court system may have exposed recordings of sensitive cases | ABC News Australia
    Alerts

    Incident: Cyber attack on Victoria’s court system may have exposed recordings of sensitive cases | ABC News Australia

    adminBy adminApril 8, 2026No Comments2 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    The Qilin ransomware attacked the court system’s audio-visual archive, which staff discovered on December 21

    Company Statement: COURT SERVICES VICTORIA – CYBER INCIDENT: Tuesday, 2 January 2024
    Source: Cyber attack on Victoria’s court system may have exposed recordings of sensitive cases | ABC News Australia

    View more incidents relating to Legal and Law sector, and other Victoria incident reports.

    YouTube player

     

    Victoria’s court system was the target of a ransomware attack, which an independent expert believes was orchestrated by Russian hackers. With hackers accessed an area of the court system’s audio-visual archive, which may contain recordings of hearings from highly sensitive cases.

    In an update on Tuesday morning, CSV said:

    • County Court cases had been most severely affected. All criminal and civil hearings recorded on the network between November 1 and December 21 may have been accessed – including at least two cases involving historical and child sexual abuse.
    • The Supreme Court was also hit hard, with recordings from the Court of Appeal, the Criminal Division, the Practice Court, and two regional hearings in November possibly accessed.
    • No hearings from the Children’s Court have been compromised from November or December, but one hearing from October may have remained on the network.
    • Some committal hearings from the Magistrates Court were affected, but there were none from VCAT.
    • Court Services Victoria is trying to notify people whose court appearances have been accessed by hackers, and has set up a contact centre for people who believe they may have been affected.

    The attack was discovered on December 21, when staff were locked out of their computers and messages appeared on screens reading “YOU HAVE BEEN PWND”. The hackers threatened to publish files stolen from the court system, and directed them to an address on the dark web for instructions on how to recover the files.

    The attack is likely the work of Russian hackers using commercial ransomware known as Qilin, according to a cyber security expert.

    Court operations have not been affected, and hearings in January will proceed as usual.

    Court Services Victoria Statement

     


    Related



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleHow Secure by Design Helps Developers Build Secure Software
    Next Article SSA-723487 V1.8 (Last Update: 2025-12-09): RADIUS Protocol Susceptible to Forgery Attacks (CVE-2024-3596) – Impact to SCALANCE, RUGGEDCOM and Related Products
    admin
    • Website

    Related Posts

    Alerts

    Unauthenticated remote command injection

    April 8, 2026
    Alerts

    SSA-723487 V1.8 (Last Update: 2025-12-09): RADIUS Protocol Susceptible to Forgery Attacks (CVE-2024-3596) – Impact to SCALANCE, RUGGEDCOM and Related Products

    April 8, 2026
    Alerts

    CVE-2026-4300 | THREATINT

    April 8, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202617 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202617 Views
    Our Picks

    Unauthenticated remote command injection

    April 8, 2026

    Microsoft rolls out fix for broken Windows Start Menu search

    April 8, 2026

    SSA-723487 V1.8 (Last Update: 2025-12-09): RADIUS Protocol Susceptible to Forgery Attacks (CVE-2024-3596) – Impact to SCALANCE, RUGGEDCOM and Related Products

    April 8, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.