Prepared by: Nick Thanos | Last update: 22 May 2026
In the 2024-25 financial year, a threat actor group called KillSec3 targeted seven Australian organisations, not by breaking through firewalls or deploying sophisticated malware, but by collecting data that had already been left exposed. KillSec3 scanned for cloud storage platforms misconfigured to allow public access and File Transfer Protocol (FTP) servers, a type of server used to transfer files between computers over a network, left unsecured and reachable from the internet. In several of these incidents, affected organisations did not know they had been compromised until their name appeared on KillSec3's dark web leak site, a website on the encrypted Tor network where stolen data is listed and threatened for release. That discovery gap tells a significant story about how this group operates, who they target and why Australian organisations need to take notice.
KillSec3 is a financially motivated threat actor group that came to light during FY25 as one of 20 ransomware groups that Triskele Labs observed actively targeting Australian and New Zealand businesses during the financial year. Unlike most of their peers in the ransomware ecosystem, KillSec3 became notable for a distinct operational approach as they generally do not encrypt victim environments.
Instead, KillSec3 focuses heavily on data exfiltration, the unauthorised transfer of data from a victim's environment to a location the attacker controls. They then leverage the threat of publishing that data on their dark web leak site as the primary extortion mechanism. This is sometimes referred to as a data theft or single-extortion model, as opposed to the double-extortion model used by groups like DragonForce or Qilin, which both steal data and encrypt systems.
Triskele Labs is aware of KillSec3 targeting at least seven Australian organisations across FY25, and the group appeared in Triskele Labs' list of threat actors for whom more than one direct incident response engagement was conducted during the year.
Most ransomware groups invest significant effort in gaining initial access by exploiting vulnerabilities in VPNs, brute-forcing Remote Desktop Protocol (RDP), a technology that allows users to connect to and control a computer remotely, or phishing staff for credentials. KillSec3 frequently skips these steps entirely by targeting a different class of weakness altogether.
KillSec3 was observed actively scanning for misconfigured cloud storage platforms, such as Amazon S3 buckets, Microsoft Azure Blob Storage, or similar services, where data had inadvertently been made publicly accessible due to incorrect permission settings. A misconfigured cloud storage bucket is one where the access controls have been set incorrectly, allowing anyone on the internet to view or download the contents without needing a username or password.
In these instances, the data was not "stolen" in the traditional sense; it was simply downloaded from a location that was already open to the public. The victim organisation may never have known the data was accessible and in many cases, they did not know it had been taken until KillSec3 published it.
KillSec3 also targeted exposed FTP servers, servers running the File Transfer Protocol, which is commonly used by organisations to transfer large volumes of files between systems or to external parties. When FTP servers are left accessible from the internet without adequate authentication controls, they can be accessed and their contents downloaded by anyone who finds them.
This tactic requires minimal technical sophistication compared to exploiting software vulnerabilities or conducting social engineering campaigns. It is a volume play, scanning large blocks of internet-facing IP addresses for known open ports and services, KillSec3 can identify multiple potential victims efficiently.
KillSec3's activity during FY25 also included involvement in a campaign exploiting CrushFTP, a widely used enterprise file transfer server application. When critical vulnerabilities in CrushFTP were disclosed, KillSec3 was among the threat actor groups that moved quickly to mass-exploit the flaw, exfiltrating data from vulnerable organisations worldwide without deploying ransomware. This reinforces the group's broader pattern of focusing on data access and theft over operational disruption.
KillSec3's effectiveness stems from targeting a class of vulnerability that many organisations either don't know they have, or don't prioritise fixing: unprotected data stores and misconfigured internet-facing infrastructure.
Many organisations invest in controls designed to prevent attackers from gaining access to internal systems, firewalls, MFA, EDR. But those same controls do not protect data that has already been made publicly accessible through a misconfiguration. Cloud storage and FTP misconfigurations are common, often created during routine IT operations when a file sharing arrangement is stood up quickly or a storage bucket is configured without careful attention to access controls.
The absence of an active intrusion means there are also fewer forensic indicators. No malware is deployed. No credentials are compromised. No lateral movement occurs across the internal network. In many KillSec3 cases investigated by Triskele Labs, the first confirmation of the incident came from the appearance of the victim organisation's name on a dark web leak site, a deeply reactive position to be responding from.
The following defensive actions are directly aligned to the behaviours and access methods observed in KillSec3 incidents across Triskele Labs' FY25 engagements.
KillSec3 is an active, financially motivated threat actor group that distinguishes itself from most of its peers through a focus on data exfiltration over encryption. Across the 2024–25 financial year, the group targeted at least seven Australian organisations by scanning for and exploiting cloud storage misconfigurations, unsecured FTP servers, and vulnerabilities in file transfer software such as CrushFTP; in many cases collecting data that had already been made accessible through poor configuration rather than through any sophisticated intrusion.
The group's effectiveness is compounded by the delayed detection typical of these incidents. Many affected organisations only became aware of the compromise when their name appeared on KillSec3's dark web leak site, by which point the data had already been taken.
The controls that most directly address KillSec3's approach are not the same as those that defend against encryption-focused ransomware groups. Preventing KillSec3 requires organisations to look outward, at what data is exposed on the internet, whether cloud storage and file transfer infrastructure is properly secured, and whether sensitive data is encrypted even in storage environments that should already be protected.
If your organisation has experienced a KillSec3 incident or suspects a data exposure related to cloud or FTP misconfigurations, engage your cyber insurer and a reputable DFIR firm promptly. Early investigation is critical to understanding the scope of what was accessed, meeting regulatory notification obligations, and preventing further exposure.
MITRE ATT&CK Mapping
|
TACTIC |
TECHNIQUE |
DESCRIPTION |
|
Initial Access |
T1190 – Exploit Public-Facing Application |
Exploitation of internet-facing file transfer applications including CrushFTP |
|
Initial Access |
T1133 – External Remote Services |
Exploitation of unsecured FTP servers accessible from the internet |
|
Discovery |
T1526 – Cloud Service Discovery |
Scanning for misconfigured cloud storage platforms |
|
Discovery |
T1083 – File and Directory Discovery |
Identifying data available through exposed file servers and cloud buckets |
|
Collection |
T1530 – Data from Cloud Storage |
Collection of data from publicly accessible cloud storage resources |
|
Collection |
T1039 – Data from Network Shared Drive |
Collection of data from exposed FTP and file transfer infrastructure |
|
Exfiltration |
T1048 – Exfiltration Over Alternative Protocol |
Exfiltration of collected data to attacker-controlled infrastructure |
|
Impact |
T1657 – Financial Theft |
Extortion of victim organisations using threat of publishing stolen data |
|
TOOL |
PURPOSE |
|
Cloud storage scanning |
Identifying misconfigured buckets and containers with public access |
|
FTP server scanning |
Identifying internet-facing file transfer servers with weak or no authentication |
|
CrushFTP vulnerability exploitation |
Mass exploitation of known file transfer software vulnerabilities |
|
Dark web leak site |
Extortion mechanism, publishing stolen data to pressure victims into payment |
|
Data exfiltration without encryption |
Collecting and removing data without triggering operational disruption |
State of Cyber: Threat Actors
https://www.stateofcyber.com.au/report/dfir#threat-actors-are-getting-smarter
Contextualises Akira within the broader Australian ransomware landscape
Threat Actor: Akira
https://www.triskelelabs.com/blog/akira_seven-australian-victims-in-a-year
Sister article in the same threat actor series