Australian gold mining company Evolution Mining announces ransomware attack

Avatar

Evolution Mining, an Australian gold mining company, told investors on Monday that it became aware of a ransomware attack last week impacting its IT systems.

The company, which operates in Australia and Canada, filed a statement with the Australian Stock Exchange announcing that it had discovered the incident August 8, and that it now believes the attack to be “contained.”

Evolution Mining said it worked with “external cyber forensics experts to investigate the incident” but did not provide further details on which ransomware scheme was behind the attack, nor whether the company made an extortion payment.

“The incident has been proactively managed with a focus on protecting the health, safety and privacy of people, together with the company’s systems and data,” said the official notice, adding the company did “not anticipate any material impact on operations.”

The company, which recorded an underlying profit after income tax of over AUS $158 million (U.S. $104 million) in 2023, said it reported the attack to the Australian Cyber Security Centre (ACSC).

It comes as the Australian government considers introducing a new Cyber Security Act that would legally oblige businesses to report being hit by a ransomware attack to the ACSC, although debates are ongoing about whether the obligation will apply to smaller enterprises.

The legislative moves follows a series of high-profile ransomware attacks in Australia, particularly those affecting Optus, Medibank, and MediSecure.

As part of the Medibank criminals’ extortion attempt, sensitive healthcare claims data for around 480,000 individuals — including information about drug addiction treatments and abortions — was published on the dark web.

The move, alongside several other high-profile breaches, set off a range of cybersecurity reforms in Australia. These included an updated national cybersecurity strategy that ultimately fell short of the government’s initial intentions to ban ransomware payments in their entirety.

CybercrimeNewsNews Briefs
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Alexander Martin

is the UK Editor for Recorded Future News. He was previously a technology reporter for Sky News and is also a fellow at the European Cyber Conflict Research Initiative.

 

Total
0
Shares
Previous Post

Local gov’ts in Texas, Florida hit with ransomware as cyber leaders question best path forward

Next Post

Exclusive: Russian spies hacked UK government data and emails earlier this year

Related Posts

CISA Adds Actively Exploited Broadcom and Commvault Flaws to KEV Database

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added two high-severity security flaws impacting Broadcom Brocade Fabric OS and Commvault Web Server to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The vulnerabilities in question are listed below - CVE-2025-1976 (CVSS score: 8.6) - A code injection flaw
Avatar
Read More

Chinese Hackers Abuse IPv6 SLAAC for AitM Attacks via Spellbinder Lateral Movement Tool

A China-aligned advanced persistent threat (APT) group called TheWizards has been linked to a lateral movement tool called Spellbinder that can facilitate adversary-in-the-middle (AitM) attacks. "Spellbinder enables adversary-in-the-middle (AitM) attacks, through IPv6 stateless address autoconfiguration (SLAAC) spoofing, to move laterally in the compromised network, intercepting packets and
Avatar
Read More

Leaked Black Basta Ransomware Chat Logs Reveal Inner Workings and Internal Conflicts

More than a year's worth of internal chat logs from a ransomware gang known as Black Basta have been published online in a leak that provides unprecedented visibility into their tactics and internal conflicts among its members. The Russian-language chats on the Matrix messaging platform between September 18, 2023, and September 28, 2024, were initially leaked on February 11, 2025, by an
Avatar
Read More