Home
AboutCase Studies

Case Studies

Real-world small business hacking case studies illustrating attack vectors, situations, remediations, and lessons. Share to raise awareness.

Mining industry supplier; $100K plus; Western Australia

Attack vector

Invoice hack

Situation

Through social engineering, a malevolent actor gained access to a fabrication business supplying the mining industry. They replicated a large invoice with altered bank details, sending it to the accounts department, who paid it.

Remediation

The money could not be recovered. The company nearly collapsed but is still trading, retaining the accounts person who paid the invoice. The fraud was not reported.

Lessons

On large invoices, check that bank details are the same as previously used.


Architectural business; $10K plus; Western Australia

Attack vector

Ransomware

Situation

The owner's laptop, not covered by backups, was compromised with ransomware, which spread to the corporate server. Backups restored the server, but the owner paid a ransom for his laptop data.

Remediation

The payment resulted in 85% of files being restored. We removed hidden ‘heartbeat’ malware to prevent future extortion attempts.

Lessons

Security should be layered. An audit is worth the investment to identify weaknesses before they are exploited.


Office equipment vendor; Australian enterprise

Attack vector

Fake invoice

Situation

Scammers cloned a client’s website and email address, requesting a statement and using it to generate a fake invoice for a six-figure payment with changed bank details.

Remediation

The accounts department verified the change, preventing the fraud. We traced the attempted hack back to a salesman who had deleted related emails, thinking he was at fault.

Lessons

1. Always corroborate changes to bank details. 2. If a mistake is made, do not cover it up.


Real Estate; $150K; Western Australia

Attack vector

Email interception

Situation

A purchaser paid over $150K to what they believed was their settlement agent. The funds were intercepted by scammers and lost.

Remediation

No recovery was possible.

Lessons

Email addresses can be spoofed. Verify suspicious requests by checking the 'Original Message' in Gmail or calling the sender.


Civil engineering construction; Western Australia

Attack vector

Invoice fraud

Situation

Inoteq paid a fraudulent invoice of $192,000 due to a supplier’s breached systems. They attempted to withhold payment from the supplier but lost in court.

Remediation

Inoteq incurred legal costs and was held liable for the payment.

Lessons

Courts place the responsibility for verifying payment details on the paying business.


Data analytics strategy consultant; Victoria

Attack vector

Impersonation

Situation

A cybercriminal impersonated the business founder via a similar email address, convincing the manager to transfer over $50,000.

Remediation

Only a portion of the funds was recovered.

Lessons

Any unusual funds transfer requests should be verified in person or via phone with another team member.


Glass repair service; $50K; Western Australia

Attack vector

Phone scam

Situation

A scammer posing as a Telstra technician convinced the business to reset its modem, gaining access and redirecting a $50,000 payment.

Remediation

The bank did not cover the loss.

Lessons

Never provide access or passwords to unsolicited callers. Confirm technician identities by calling Telstra directly or using the My Telstra app.


Construction; $900K scare; Victoria

Attack vector

Fake invoice

Situation

Scammers compromised a supplier’s email and sent a fake invoice, nearly costing the business $900,000.

Remediation

Bendigo Bank recovered the funds due to quick action.

Lessons

Always verify bank detail changes by phone.


Software development agency; critical impact; Victoria

Attack vector

Ransomware

Situation

A ransomware attack encrypted systems, halting operations completely.

Remediation

The business survived and rebuilt its cybersecurity systems. Costs and ransom payment details were not disclosed.

Lessons

Proactive security measures are less costly than post-attack remediation.