Monday, March 31, 2025
HomeCyber Security NewsMassive Data Breach Hits NSW Online Registry: 9,000+ Files Stolen

Massive Data Breach Hits NSW Online Registry: 9,000+ Files Stolen

Published on

SIEM as a Service

Follow Us on Google News

A major cybersecurity incident has struck the New South Wales court system, as cybercrime detectives investigate a significant data breach affecting the Department of Communities and Justice (DCJ).

The breach targeted the NSW Online Registry Website (ORW), a critical platform that houses sensitive information related to both civil and criminal cases across the state.

The breach was discovered on Tuesday, March 25, 2025, prompting officers from the State Crime Command’s Cybercrime Squad to initiate an immediate investigation under Strike Force Pardey.

The investigation revealed that approximately 9,000 sensitive court files, including apprehended violence orders and affidavits, were accessed and downloaded by unauthorized parties.

Investigation Ongoing

Cybercrime detectives are working closely with the DCJ to contain and assess the full extent of the breach.

As investigations continue, officials are urging anyone who believes their details may have been compromised to report the incident through the appropriate channels, such as ReportCyber.

The data breach has raised concerns about the security measures in place to protect sensitive court documents.

This incident underscores the need for robust cybersecurity systems to safeguard personal information in the digital age.

In response to the breach, individuals are advised to remain vigilant and monitor their personal and financial information for any suspicious activity. Reporting any potential breaches is crucial to mitigate potential consequences.

Meanwhile, officials are reinforcing security measures to prevent future breaches. The Department of Communities and Justice is collaborating with cybersecurity experts to enhance security protocols and protect sensitive data.

Impact and Future Steps

The breach highlights the ongoing challenges faced by public institutions in safeguarding sensitive information against sophisticated cyber threats.

As technology evolves, so do the methods used by cybercriminals, making it imperative for organizations to stay ahead of these threats with robust security systems and rapid response strategies.

In the coming days, further updates are expected as the investigation unfolds.

The public will be kept informed about any additional measures that may be taken to ensure the integrity of personal data stored within the NSW court system.

For now, the focus remains on containing the breach, identifying those responsible, and bolstering security to prevent similar incidents in the future.

The collaboration between law enforcement and the Department of Communities and Justice is crucial in addressing this challenge and ensuring the continued trust in public institutions.

Are you from SOC/DFIR Teams? – Analyse Malware, Phishing Incidents & get live Access with ANY.RUN -> Start Now for Free. 

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

A New Microsoft Tool Automatically Detects, Diagnoses, and Resolves Boot Issues in Windows

Microsoft has unveiled a transformational tool aimed at addressing one of the most frustrating...

Beware! A Fake Zoom Installer Drops BlackSuit Ransomware on Your Windows Systems

Cybersecurity analysts have uncovered a sophisticated campaign exploiting a fake Zoom installer to deliver...

Linux Distribution Nitrux3.9.1  Releaed – What’s New

Nitrux Linux, renowned for its innovative approach to desktop computing, has unveiled its latest...

Hackers Distributing Phishing Malware Via SVG Format To Bypass File Detection

Cybersecurity experts at the AhnLab Security Intelligence Center (ASEC) have uncovered a novel phishing...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

A New Microsoft Tool Automatically Detects, Diagnoses, and Resolves Boot Issues in Windows

Microsoft has unveiled a transformational tool aimed at addressing one of the most frustrating...

Beware! A Fake Zoom Installer Drops BlackSuit Ransomware on Your Windows Systems

Cybersecurity analysts have uncovered a sophisticated campaign exploiting a fake Zoom installer to deliver...

Linux Distribution Nitrux3.9.1  Releaed – What’s New

Nitrux Linux, renowned for its innovative approach to desktop computing, has unveiled its latest...