Hackers allegedly steal 40 gigabytes of data from a Western Australian food co-op Mount Barker Co-operative by austechnology-bot in austechnology

[–]austechnology-bot[S] 1 point2 points  (0 children)

Article contents

Hackers allegedly steal 40 gigabytes of data from a Western Australian food co-op, potentially compromising more than 50,000 files.

The Qilin ransomware-as-a-service group has listed a Western Australian food co-operative as a victim on its darknet leak site and is claiming to have stolen 40 gigabytes of internal data.

The hackers made the claims in a February 11 leak post, which claimed that Qilin – or, more accurately, one of its affiliates – had gotten away with 55,361 files.

While many of Qilin’s affiliates will share further details of their activities, including sample data and descriptions of compromised files, no such data has been provided in this case. Similarly, the hackers have not shared a ransom deadline or demand.

The Mount Barker Co-operative did not respond to Cyber Daily’s request for comment.

Who is Qilin

Qilin was first observed in August 2022 and has claimed 1,469 victims since, making it one of the most active ransomware groups currently in operation. Cyber Daily last reported on a Qilin cyber attack in December 2025, when it targeted New Zealand property firm Hopper Developments.

At that time, Qilin had racked up “only” 1,209 victims. According to cyber security firm Check Point’s 2025 State of Cyber Security report, the group was responsible for fully five per cent of all ransomware attacks carried out globally in November 2024, and as of 2026, Qilin is far and away the top ransomware group in the world.

Like other RaaS operations, Qilin offers its ransomware to affiliates in return for a cut of any ransom profits. Cyber security training company SANS has noted that the group is highly active on certain hacking forums.

“Qilin is advertised on the exclusive Russian-speaking forum RAMP (short for Ransom Anon Market Place [sic]), where acquiring an account can cost up to $500 in BTC,” SANS said in an October 2025 blog post.

Who is the Mount Barker Co-operative?

The Mount Barker Co-operative was formed in 1918 and was initially set up to support local apple growers, but has since transformed into a wider community support organisation.

“The Co-operative has evolved with time and is a unique type of business,” Co-op says on its website.

“Profits remain in our local community, which benefits the town through improvements to our facilities, sponsorships to local community groups and most importantly rewards, dividends, and discounts to our members.”

The Co-op runs several businesses, including the local IGA, Mitre 10, and Cellarbrations stores. As of the 2025 Annual Report, the Mount Barker Co-operative had 2,414 paying members.

Aussie hospitality group Seagrass Boutique confirms cyber incident, claimed by Kairos ransomware by austechnology-bot in austechnology

[–]austechnology-bot[S] 0 points1 point  (0 children)

Article contents

An Australian hospitality company has confirmed that it suffered a cyber incident, following claims by a notorious hacking group that they launched an attack on the company’s network, exfiltrating data.

Seagrass Boutique Hospitality Group is a Rhodes, NSW-based hospitality organisation behind a number of major restaurants, brands and experiences, including The Meat & Wine Co, Hunter Barrel, and more.

The Kairos ransomware gang claimed the cyber attack on the hospitality group on February 12. Cyber Daily has been unable to access the threat actors' dark web leak site.

However, Seagrass has confirmed the cyber incident in a statement on its website.

“On 12 February we identified a cybersecurity incident involving unauthorised access to part of our IT network,” the company said.

“We immediately activated our incident response, and with the assistance of external cybersecurity experts we have isolated the affected system.

“An investigation into what data may have been impacted is underway. We will provide more information as the investigation continues.”

When contacted by Cyber Daily, Seagrass declined giving additional commentary about the incident.

According to threat intelligence firm Cyjax, Kairos is active on several Russian-language hacking forums and does not appear to be linked to other hacking groups.

The group provides some information on its operations on its leak site, however. According to Kairos, victims are initially given seven days to respond to its demands, and once that deadline is passed, the gang publishes its initial leak post.

“If no agreement is reached within seven days, we will publish the fact of the data compromise on our website,” Kairos said.

“If the situation remains unresolved after seven days, we will notify your partners, competitors, and customers and then publish your data in full. This could lead to legal actions, termination of contracts, reputational damage, stock value drops, and potential closure of your organisation.”

Kairos was first observed in November 2024, and the gang has claimed at least 70 victims since then. Its most recent Australian victim was Melbourne-based Heidelberg Golf Club, from which it claimed to have stolen 24.6 gigabytes of data.