NotMeID · Research

From Optus to MediSecure: the data breaches that changed what Australians need to know

A journalist-style walkthrough of Australia’s largest modern incidents — what was taken, what happened next, and why breach exposure rarely stays ‘contained’.

The pattern

Australia’s breach timeline since 2022 is not a series of isolated accidents. It is a step-change in scale: incidents affecting millions moved from exceptional to frequent, while regulators continued to receive record volumes of notifiable events.

The OAIC reported 527 data breach notifications in the first half of 2024 alone — a high watermark in recent reporting cycles — while global indices placed Australia among the most compromised jurisdictions in early 2024 as measured by compromised account volumes.

The lesson for individuals is blunt: if you treat ‘I wasn’t in the news’ as the same thing as ‘I wasn’t affected’, you will misestimate your exposure.

Optus (2022)

Optus disclosed an incident affecting up to 9.8 million customers — roughly a third of the country. The compromised dataset included core identity signals: names, dates of birth, addresses, phone numbers, and high-value document numbers including passports, driver licences, and Medicare details, with records reported as dating back years.

The aftermath included class action litigation at scale, government intervention on document re-issuance costs, and sustained scrutiny of how a major telco could expose such a broad historical surface through a publicly reachable interface.

Politically, the incident became a reference point for claims that Australia’s cyber and privacy posture lagged peer economies — a statement that aged poorly as even larger health-sector incidents followed.

Medibank (2022)

Medibank faced a ransomware extortion campaign affecting nearly 9.7 million people. When ransom demands were refused, stolen data — including deeply sensitive health information — was released publicly in tranches.

The national framing was severe: senior ministers described the incident as among the most damaging cyber events Australia had experienced. Subsequent reporting and regulatory filings alleged basic control failures, including absent multi-factor authentication for sensitive access paths and ignored security tooling signals.

The OAIC initiated civil penalty proceedings. Separately, policing and fraud reporting channels linked large volumes of downstream harm reports to the breach — a reminder that ‘data theft’ is not an abstract loss; it converts into targeted crime operations.

Latitude Financial (2023)

Latitude reported exposure affecting more than 14 million individuals across Australia and New Zealand. The incident was attributed to compromised employee credentials — a mundane root cause with an enormous blast radius.

The dataset included identity and financial records, with reporting emphasising data retained across unusually long horizons — raising legitimate questions about retention proportionality for a consumer lender.

Regulatory attention expanded powers discourse around government intervention in private-sector incidents — another signal that ‘market self-correction’ was not considered sufficient by policymakers.

MediSecure (2024)

MediSecure, an electronic prescriptions routing service, suffered what is widely reported as the largest Australian breach by population affected — on the order of 12.9 million people — with extremely sensitive medication-linked data involved.

Public reporting described a large data volume offered for sale on criminal forums, with downstream risks spanning discrimination, extortion, and precision phishing — not generic spam, but adversaries armed with clinical context.

The company’s subsequent administration filings underscored a harsh reality: breach response and forensic investigation are expensive, and the cost can collapse smaller operators — leaving victims navigating harm without a stable counterparty.

What breach data does in the real world

Once data appears in breach dumps, it does not behave like a secret that can be un-learned. It propagates: merged, repackaged, sold, and recombined with other leaks until it becomes an input into broker profiles, credential stuffing lists, and targeted fraud campaigns.

Industry reporting commonly describes rapid secondary resale of breach-derived identity bundles — the exact number of hops varies by incident, but the directional truth does not: exposure is a durable asset in underground markets.

That is why waiting for the breached organisation to ‘fix it’ is an incomplete strategy. The practical response is to assume circulation and then reduce your attack surface everywhere the same identity attributes reappear — including brokers and marketing databases that legally must respond to Australian privacy requests when in scope.