Australian gold mining company Evolution Mining announces ransomware attack

Avatar

Evolution Mining, an Australian gold mining company, told investors on Monday that it became aware of a ransomware attack last week impacting its IT systems.

The company, which operates in Australia and Canada, filed a statement with the Australian Stock Exchange announcing that it had discovered the incident August 8, and that it now believes the attack to be “contained.”

Evolution Mining said it worked with “external cyber forensics experts to investigate the incident” but did not provide further details on which ransomware scheme was behind the attack, nor whether the company made an extortion payment.

“The incident has been proactively managed with a focus on protecting the health, safety and privacy of people, together with the company’s systems and data,” said the official notice, adding the company did “not anticipate any material impact on operations.”

The company, which recorded an underlying profit after income tax of over AUS $158 million (U.S. $104 million) in 2023, said it reported the attack to the Australian Cyber Security Centre (ACSC).

It comes as the Australian government considers introducing a new Cyber Security Act that would legally oblige businesses to report being hit by a ransomware attack to the ACSC, although debates are ongoing about whether the obligation will apply to smaller enterprises.

The legislative moves follows a series of high-profile ransomware attacks in Australia, particularly those affecting Optus, Medibank, and MediSecure.

As part of the Medibank criminals’ extortion attempt, sensitive healthcare claims data for around 480,000 individuals — including information about drug addiction treatments and abortions — was published on the dark web.

The move, alongside several other high-profile breaches, set off a range of cybersecurity reforms in Australia. These included an updated national cybersecurity strategy that ultimately fell short of the government’s initial intentions to ban ransomware payments in their entirety.

CybercrimeNewsNews Briefs
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Alexander Martin

is the UK Editor for Recorded Future News. He was previously a technology reporter for Sky News and is also a fellow at the European Cyber Conflict Research Initiative.

 

Total
0
Shares
Previous Post

Local gov’ts in Texas, Florida hit with ransomware as cyber leaders question best path forward

Next Post

Exclusive: Russian spies hacked UK government data and emails earlier this year

Related Posts

HackVSIT 6.0

[[{“value”:” April 25-26, 2025Location: New DelhiWebsite: https://hack-vsit.tech/ The romanticism of a legacy continued through 6 generations; ACE presents…
Avatar
Read More

Commvault Confirms Hackers Exploited CVE-2025-3928 as Zero-Day in Azure Breach

Enterprise data backup platform Commvault has revealed that an unknown nation-state threat actor breached its Microsoft Azure environment by exploiting CVE-2025-3928 but emphasized there is no evidence of unauthorized data access. "This activity has affected a small number of customers we have in common with Microsoft, and we are working with those customers to provide assistance," the company
Avatar
Read More

CISA Warns of Suspected Broader SaaS Attacks Exploiting App Secrets and Cloud Misconfigs

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday revealed that Commvault is monitoring cyber threat activity targeting applications hosted in their Microsoft Azure cloud environment. "Threat actors may have accessed client secrets for Commvault's (Metallic) Microsoft 365 (M365) backup software-as-a-service (SaaS) solution, hosted in Azure," the agency said. "This
Avatar
Read More