Defence Supply Chain Cyber Attack: Why Every Australian SME Contractor Is a Target
When hackers sat undetected inside IKAD Engineering for five months and walked out with data relating to Australia’s Hunter and Collins class submarine programs, they did not need to break into the Department of Defence. They only needed to compromise one small engineering subcontractor. The defence supply chain cyber attack trend has escalated sharply through 2025 and 2026, and the targets are almost never the prime contractors. They are the SMEs nobody has heard of. If your business sits anywhere in the Australian defence, aerospace, or critical infrastructure supply chain, this is the threat landscape you need to understand today. What the IKAD Defence Supply Chain Cyber Attack Revealed IKAD Engineering is an Australian supplier providing components and services to defence, marine, mining, and oil and gas. In November 2025, the J Group ransomware gang claimed to have exfiltrated up to 800 gigabytes of data through a vulnerable legacy VPN, maintaining a hidden presence inside the network for approximately five months. The stolen data allegedly included: The attackers used a technique called “living off the land,” relying on legitimate administrative tools already present on the network to avoid detection. Why the Defence Supply Chain Cyber Attack Vector Is So Effective Prime contractors like BAE Systems, Lockheed Martin, and Thales invest tens of millions in cyber defence every year. Smaller subcontractors usually do not. The attackers know this. The defence supply chain cyber attack pattern in 2025 and 2026 shows a consistent approach: The Defence Industry Security Program (DISP) Is No Longer Optional Any business wanting to win or retain defence contracts in Australia increasingly needs to demonstrate membership in the Defence Industry Security Program. DISP requires: Meeting DISP is not just a compliance exercise. It is the baseline for surviving a defence supply chain cyber attack. Recommended Link: Penetration Testing for Defence and Critical Supply Chains Five Controls That Would Have Stopped the IKAD Attack Recommended Link: SIEM and 24/7 Security Monitoring Is Your Business the Weak Link in a National Security Supply Chain?The defence supply chain cyber attack trend will intensify through 2026. Prime contractors are now demanding proof. Frequently Asked Questions Q: I am a small engineering or services firm. Am I really a target?A: Yes. Attackers increasingly target Tier 2, Tier 3, and Tier 4 suppliers precisely because their security posture is weaker than the prime contractors they serve. Q: What is the difference between DISP and the Essential Eight?A: DISP is the Defence-specific security framework. The Essential Eight is the broader ACSC baseline that feeds into DISP requirements. Most DISP-aligned businesses implement Essential Eight as the foundation. Q: How long does it take to prepare for DISP membership?A: For most Australian SMEs with a low starting maturity, a realistic DISP readiness program takes three to nine months depending on scope and existing controls. The defence supply chain cyber attack against IKAD Engineering is a preview of what is coming for every Australian SME that handles sensitive commercial or government project data. Attackers are patient, they are coordinated, and they already know where the weak links are. The question is whether yours will hold. (We are not looking to replace your current provider, just offering an alternative perspective) Written by Neil Frick Sources & References
Read More