CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◉ Threat Intelligence Apr 16, 2026

INC Ransomware Group Holds Healthcare Hostage in Oceania - Dark Reading

Dark Reading Archived Apr 16, 2026 ✓ Full text saved

INC Ransomware Group Holds Healthcare Hostage in Oceania Dark Reading

Full text archived locally
✦ AI Summary · Claude Sonnet


    TechTarget and Informa Tech’s Digital Business Combine. Dark Reading Resource Library Black Hat News Omdia Cybersecurity Advertise NEWSLETTER SIGN-UP Cybersecurity Topics World The Edge DR Technology Events Resources THREAT INTELLIGENCE CYBER RISK CYBERATTACKS & DATA BREACHES ICS/OT SECURITY NEWS Breaking cybersecurity news, news analysis, commentary, and other content from around the world, with an initial focus on the Middle East & Africa and the Asia Pacific INC Ransomware Group Holds Healthcare Hostage in Oceania Government agencies, emergency clinics, and others in Australia, New Zealand, and Tonga have had serious run-ins with the prolific ransomware outfit. Nate Nelson,Contributing Writer March 11, 2026 4 Min Read SOURCE: JJ GOUIN VIA ALAMY STOCK PHOTO Cybersecurity authorities in Oceania are warning that the INC ransomware operation has been ripping through healthcare organizations in the region. Healthcare — particularly 24/7 patient care facilities — has always been foremost among targets for ransomware actors, ever since they collectively decided that morality wasn't really their forte. INC embodies this trend, targeting the industry at a higher clip than almost any other ransomware group. In the last couple of years, it has spread those operations globally. On March 6, the Australian Cyber Security Centre (ACSC), the Kingdom of Tonga's National Computer Emergency Response Team (CERT Tonga), and New Zealand's National Cyber Security Centre (NCSC) released a joint advisory about it. It ostensibly covered INC's "targeting of critical networks" in the region, but in practice focused almost entirely on its threat to this one sector. INC Incorporates Oceania Into its Targeting Related:Russia's Forest Blizzard Nabs Rafts of Logins via SOHO Routers Sometimes, organized cybercrime outfits execute full frontal offensives in specific industry verticals or geographic regions, indicating forethought and a clear plan of attack. Last week's advisory paints a picture of a cybercrime outfit that initially had other plans, but gradually realized the opportunity in Oceania's healthcare sector over time. INC's initial focus was in the US and the UK, the authorities noted. Only a year or so into its run, in the summer of 2024, it began targeting Australian companies in the professional services and healthcare industries. That activity seems to have picked up steam in 2025, and expanded into neighboring New Zealand and Tonga. Tonga, in particular, suffered a significant attack at INC's hands, which caused disruptions to national health services. INC Incidents in Australia, New Zealand, and Tonga The ACSC responded to 11 INC ransomware attacks in Australia between July 2024 and December 2025, predominantly affecting either healthcare or professional services companies. Typically in these cases, the attackers got access to victims by purchasing compromised accounts from initial access brokers (IABs). With that said, INC has also been known to spear-phish some of its victims, and exploit known vulnerabilities in Internet-facing devices deployed by others. And because INC uses a ransomware-as-a-service (RaaS) business model, its tactics, techniques, and procedures (TTPs) can vary depending on which affiliate is carrying out any given attack. With an initial foothold, the attackers have moved laterally within Aussie networks, escalating their privileges to the administrator level before deploying their locker and a ransom note. In some cases, they've also exfiltrated personally identifying information (PII) and protected health information (PHI). INC uses legitimate software programs to both compress data and help exfiltrate data from compromised networks. Related:Iran Hacktivists Make Noise but Have Little Impact on War Compared to Australia, the advisory references more diffuse threats to New Zealand, with a variety of opportunistic actors impacting a variety of industries. INC joined the fray in May 2025, when it stole a large amount of data and encrypted a number of servers and endpoint devices at a healthcare organization, and later published the stolen data on its Dark Web leak site. In Tonga, INC skipped over individual facilities and went right for the nation's Ministry of Health (MoH). On June 15, 2025, it disrupted MoH information and communications networks, effectively shutting down core national services. "Attackers don’t scale by local size but by opportunity," Keeper Security CISO Shane Barney points out. "Smaller nations often rely on centralized, resource-constrained infrastructure, which can make them proportionally more vulnerable. They may not see the volume of attacks larger economies face, but even a single successful intrusion can have outsized impact, and incident response capacity may be more limited." Related:EU Sanctions Companies in China, Iran for Cyberattacks Authorities have now identified a specific, named hacker behind the Tonga attack — Roman Khubov, known online as "blackod" — and published a picture of his face. Little is publicly known about Khubov beyond what's briefly stated in the advisory. Standard Mitigations Can Defeat Old TTPs Oceania cyber authorities recommended that organizations interested in defending against the INC ransomware group take appropriately basic cybersecurity precautions, like monitoring and restricting network traffic and remote access, implementing multifactor authentication (MFA) where applicable, and diligently managing software vulnerabilities. "INC is not employing new or cutting-edge tactics to compromise this industry, instead they are using what I refer to as legacy tactics to compromise organizations," says Christopher Hills, chief security strategist at BeyondTrust. "These threat actors are walking right into the environments with valid credentials. This just reinforces several points we have been talking about for years: verify everything, to every resource, control your threat landscape, patch vulnerable systems, stop exposing vulnerable system on the public Web." He thinks that "Groups like INC are exposing that fact that organizations, such as healthcare still haven't plugged common security gaps that most aren't thinking about because they are too hung up on the shiny new object known as artificial intelligence (AI)." Read more about: DR Global Asia Pacific About the Author Nate Nelson Contributing Writer Nate Nelson is a journalist and scriptwriter. He writes for "Darknet Diaries" — the most popular podcast in cybersecurity — and co-created the former Top 20 tech podcast "Malicious Life." Before joining Dark Reading, he was a reporter at Threatpost. Want more Dark Reading stories in your Google search results? ADD US NOW More Insights Industry Reports CISO Survey 2026 The State of Incident Response Readiness AI SOC for MDR: The Structural Evolution of Managed Detection and Response How Enterprises Are Developing Secure Applications KuppingerCole Business Application Risk Management Leadership Compass 2026 CISO AI Risk Report Access More Research Webinars Defending Against AI-Powered Attacks: The Evolution of Adversarial Machine Learning Tips for Managing Cloud Security in a Hybrid Environment? Zero Trust Architecture for Cloud environments: Implementation Roadmap Security in the AI Age Identity Maturity Under Pressure: 2026 Findings and How to Catch Up More Webinars Editor's Choice CYBERSECURITY OPERATIONS RSAC 2026: AI Dominates, But Community Remains Key to Security byKristina Beek,Rob Wright APR 2, 2026 THREAT INTELLIGENCE Axios Attack Shows How Complex Social Engineering Is Industrialized byAlexander Culafi APR 6, 2026 5 MIN READ ICS/OT SECURITY Iranian Threat Actors Disrupt US Critical Infrastructure via Exposed PLCs byElizabeth Montalbano APR 8, 2026 4 MIN READ Want more Dark Reading stories in your Google search results? 2026 Security Trends & Outlooks THREAT INTELLIGENCE Cybersecurity Predictions for 2026: Navigating the Future of Digital Threats JAN 2, 2026 CYBER RISK Navigating Privacy and Cybersecurity Laws in 2026 Will Prove Difficult JAN 12, 2026 ENDPOINT SECURITY CISOs Face a Tighter Insurance Market in 2026 JAN 5, 2026 THREAT INTELLIGENCE 2026: The Year Agentic AI Becomes the Attack-Surface Poster Child JAN 30, 2026 Download the Collection Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. SUBSCRIBE Webinars Defending Against AI-Powered Attacks: The Evolution of Adversarial Machine Learning MON, MAY 11, 2026 AT 1:00PM ET Tips for Managing Cloud Security in a Hybrid Environment? THURS, MAY 7, 2026 AT 1PM EST Zero Trust Architecture for Cloud environments: Implementation Roadmap TUES, MAY 12, 2026 AT 1PM EST Security in the AI Age TUES, APRIL 28, 2026 AT 1PM EST Identity Maturity Under Pressure: 2026 Findings and How to Catch Up WED, MAY 6,2026 AT 1PM EST More Webinars White Papers How Sunrun Transformed Security Operations with AiStrike Autonomous Pentesting at Machine Speed, Without False Positives Best practices for incident response planning Industry Report: AI, SOC, and Modernizing Cybersecurity The Threat Prevention Buyer's Guide: Find the best AI-driven threat protection solution to stop file-based attacks. Explore More White Papers BLACK HAT ASIA | MARINA BAY SANDS, SINGAPORE Experience cutting-edge cybersecurity insights in this four-day event featuring expert Briefings on the latest research, Arsenal tool demos, a vibrant Business Hall, networking opportunities, and more. Use code DARKREADING for a Free Business Pass or $200 off a Briefings Pass. GET YOUR PASS GISEC GLOBAL 2026 GISEC GLOBAL is the most influential and the largest cybersecurity gathering in the Middle East & Africa, uniting global CISOs, government leaders, technology buyers, and ethical hackers for three power-packed days of innovation, strategy, and live cyber drills. 📌 BOOK YOUR SPACE Discover More Black Hat Omdia Working With Us About Us Advertise Reprints Join Us NEWSLETTER SIGN-UP Follow Us Copyright © 2026 TechTarget, Inc. d/b/a Informa TechTarget. This website is owned and operated by Informa TechTarget, part of a global network that informs, influences and connects the world’s technology buyers and sellers. All copyright resides with them. Informa PLC’s registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. TechTarget, Inc.’s registered office is 275 Grove St. Newton, MA 02466. Home| Cookie Policy| Privacy| Terms of Use Your Privacy Choices
    💬 Team Notes
    Article Info
    Source
    Dark Reading
    Category
    ◉ Threat Intelligence
    Published
    Apr 16, 2026
    Archived
    Apr 16, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗