
Benedict Industries, a family-owned Australian company founded in 1966, has evolved from a small haulage business into one of New South Wales’ largest suppliers of quarried, recycled, and landscaping materials. Recognized for its dedication to sustainability, innovation, and quality, the company plays a key role in the region’s construction and environmental sectors through its network of quarries and recycling facilities.
On October 9, 2025, the hacking group “INC Ransom” claimed responsibility for a major breach of Benedict Industries. The attackers reportedly exfiltrated 270GB of sensitive internal data, including:
This leak not only raises serious concerns about data security but also about potential financial, reputational, and regulatory consequences for the company.
1. Executive Financial Oversight

A folder reportedly linked to Dana Dupere, Director of the Benedict Industries Group, contains detailed documents related to financial planning, loans, tax records, and salary information. The layout and content indicate a high level of involvement and responsibility in the company’s financial activities.
2. Bank Account Information

The exposed data includes sensitive bank account information for several companies within the Benedict Group, with Dana Dupere listed as a signatory on most accounts. This indicates a centralized financial management system, potentially exposing multiple entities to risk.
3. HR Documentation and Payroll

A well-organized HR folder was part of the leaked files, structured around key areas like payroll, employee files, workplace relations, and health. This kind of structured HR data, if exposed, could put employees at risk of identity theft or other privacy violations.
4. Backup and Recovery Systems

A view from the Active Backup for Microsoft 365 interface shows multiple user account folders in the Recycle Bin, indicating stored backups of emails and files. This centralized recovery setup may have also been compromised.
5. User-Level Data Organization

The User Data directory contains personal folders for each employee, organized by name. While efficient for internal management, it also means that personal employee files could be exposed or misused.
6. Marketing Assets and Photos

The Marketing folder includes categorized subfolders for events, products, projects, and staff photos. Though less sensitive, this data could still be used in targeted phishing campaigns or to impersonate staff.
The Benedict Industries breach serves as a stark reminder that even well-organized, established companies remain vulnerable to sophisticated ransomware attacks. With over 270GB of sensitive data exposed, the consequences could be long-lasting, impacting operations, employee trust, and client confidence. As ransomware groups grow more targeted and aggressive, it’s crucial for organizations to invest in proactive cybersecurity measures, regular backups, access control audits, and employee awareness training.