The Australian Securities and Investments Commission (ASIC) has initiated enforcement proceedings in the Federal Court against financial service provider FIIG Securities Limited (FIIG) for allegedly failing to implement adequate cybersecurity measures over a four year period, exposing itself and its clients to unreasonable risk of cyber intrusion.
This is ASIC’s second enforcement proceedings against an Australian Financial Service Licensee (AFSL) for failing to maintain adequate cybersecurity protections – the first was against RI Advice Group in 2022, which we wrote about here – and aligns with ASIC’s 2025 enforcement priority of investigating and prosecuting “licensee failures to have adequate cyber-security protections”. The case is particularly relevant in light of several Australian superannuation providers suffering coordinated cyberattacks in early April 2025, which resulted in thousands of super accounts being compromised.
FIIG is an AFSL specialising in providing fixed income financial products and services to retail and wholesale clients, as well as custodial services. During the period of the alleged breach, FIIG’s assets under management ranged between $2.89 billion and $3.7 billion. In providing its services, FIIG collected personal information of its clients, including names, addresses, dates of birth, contact details, copies of identification, tax file numbers, and account details.
Timeline of the cybersecurity incident
19 May 2023 |
A FIIG employee inadvertently downloads a .zip file containing malware while browsing the internet. The malware enables a threat actor to remotely access FIIG's network and perform network-based lateral movement and privilege escalation. |
23 May 2023 |
The threat actor obtains access to a privileged user account on the network and downloads approximately 385GB of data over a one-week period (affecting approximately 18,000 clients), including personal information of FIIG’s clients, to an external server. |
2 June 2023 |
The Australian Cyber Security Centre (ACSC) alerts FIIG that its systems may be compromised. Prior to that notification, despite numerous firewall email alerts flagging suspicious activity, FIIG had not identified or responded to the cyber-attack. |
8 June 2023 |
FIIG inspects the employee's laptop and discovers that its network has been compromised. |
9 June 2023 |
FIIG takes its network offline. |
10 June 2023 |
The threat actor publishes some of the stolen data (including clients’ personal information) on the dark web. |
On 12 March 2025, ASIC launched proceedings against FIIG in the Federal Court alleging that, over a four year period between 12 March 2019 and 8 June 2023, FIIG failed to take adequate steps to protect itself and its clients against cybersecurity risks, thereby exposing itself and them to those risks to a heightened and unreasonable extent.
As an AFSL, FIIG is required to comply with certain obligations under section 912A of the Corporations Act 2001 (Cth) (the Act). ASIC alleges FIIG’s conduct contravened sections 912A(1)(a), (d) and (h) of the Act, which mandate that AFSLs must:
In Annexure A of ASIC’s Concise Statement, ASIC sets out a list of the missing cybersecurity measures which it considers FIIG should have had in place in order to comply with its obligations under section 912A(1)(a) of the Act (the Missing Cybersecurity Measures). At a high level those measures include:
ASIC also alleges that FIIG did not meet its obligations under section 912A(1)(d) (which required FIIG to have adequate financial, technological and human resources in place enable it to maintain adequate security systems) because:
In relation to section 912A(1)(h), ASIC alleges that FIIG failed to have adequate risk management systems, because it did not put in place the Missing Cybersecurity Measures, which would have enabled FIIG to manage or mitigate risk to an acceptable level.
Importantly, ASIC notes that although FIIG did have an IT Information and Security Policy and a Cyber and Information Security Policy, it failed to implement the measures identified in those policies.
The relevant risk management measures FIIG failed to implement are set out in Annexure B of ASIC’s Concise Statement.
ASIC is seeking:
At the 2023 Australian Financial Review Cyber Summit ASIC Chair Joe Longo stated that “for all boards, cyber resilience has to be a top priority” and that ASIC would be looking for “the right case where company directors and boards failed to take reasonable steps or make reasonable investments proportionate to the risks that their business poses”.
At this stage, ASIC has not taken any direct legal action against boards of directors in relation to cyber failures. In any case, directors should be aware that their duty of care and diligence (as set out in section 180 of the Act) is relevant in the context of cybersecurity, and that directors must take reasonable steps to address foreseeable risks, and implement and comply with cybersecurity standards, or they could be held personally liable.
The ‘missing security measures’ in Annexure A to the Concise Statement are useful guidance for AFSLs on the regulator’s expectations around what cybersecurity measures they should have in place for compliance with section 912A of the Act. However, the obligations in section 912A are broad, and AFSLs should note that what is expected by the regulator will vary depending on the nature, size and complexity of the business as well as any risks that are unique to their business.