Hacks – October 2022

Share This Post

September saw a significant number of cyber breaches with Uber, Rockstar Games and Optus all impacted within a week. The attack methods observed in these breaches were MFA fatigue attacks and a vulnerable public API in the case of the Optus breach. MFA fatigue attacks are becoming a more frequently used MFA bypass technique, where an attacker already has the password for an account, they will bombard the target user with MFA notifications until they finally accept and are let in. This is yet another example of the effectiveness of social engineering and how people remain one of the largest vulnerabilities to an organisation.

Regardless of all the security controls that can be put in place, the importance of organisational cyber awareness culture and educating staff on how to remain safe in the cyber world is paramount. The public fallout from these breaches have revealed the importance of not only having appropriate preventions in place, but also having a developed and robust incident response plan which outlines what steps should be taken, who needs to be notified at which point, and how to recover from a cyber event.

More To Explore

cyber-security

Excite Cyber Threat Intelligence Report – Q1 2026

Q1 2026 has been defined by speed. Storm-1175, a financially motivated affiliate of the Medusa ransomware-as-a-service operation, has emerged as the quarter’s most aggressive threat to Australian businesses, weaponising newly disclosed vulnerabilities in internet-facing systems and moving from initial breach to full ransomware deployment in as little as 24 hours.

cyber-security

Excite Cyber ECDC Threat Intelligence Report – Q4 2025

The fourth quarter of 2025 demonstrated an escalating convergence of nation-state espionage, ransomware innovation, and supply-chain exploitation across the Asia–Pacific region. As geopolitical tensions intensify and digital dependencies deepen, threat actors have pivoted from opportunistic attacks to systematic campaigns targeting trust architectures—identities, cloud infrastructure, and third-party integrations that underpin modern enterprise operations.