TOGA Listed on Ransomware Leak Site After Alleged Data Theft - eftsure
Cyber crime

TOGA Listed on Ransomware Leak Site After Alleged Data Theft

Catherine Chipeta
2 Min
TOGA data breach

Australian property developer TOGA has been listed as a ransomware victim by the Akira cybercrime group, which claims to have stolen over 530 gigabytes of company data. The information allegedly includes financial records, payment information, and contact details of both staff and customers.

The hackers published TOGA’s name on their dark web leak site on March 26.

Connection to TFE Hotels Attack

Earlier this month, TOGA Far East (TFE) Hotels, part of TOGA’s broader property portfolio, confirmed a cyberattack that caused system disruptions and backend outages. While TOGA hasn’t publicly linked the two events, the timing suggests a possible connection.

Akira’s leak site does not reference TFE directly, but it claims to have compromised data belonging to TOGA as the parent organization.

Who Is Akira?

Akira is a ransomware group active since early 2023, known for its double-extortion tactics—stealing sensitive files and threatening to release them publicly if a ransom isn’t paid. It has targeted more than 250 organizations across North America, Europe, and Australia, reportedly collecting over $40 million in payments.

The gang’s leak site lists victims from a wide range of industries, including construction, education, and professional services.

What Finance Leaders Should Know

If the attackers’ claims are accurate, the breach raises several red flags for finance teams:

  • Data exposure risks: Leaked financial records and payment details increase the risk of fraud, invoice manipulation, and identity theft.

  • Compliance and liability concerns: If customer data was exposed, TOGA could face regulatory scrutiny or class action lawsuits.

  • Third-party risk amplification: The breach reinforces how cyber incidents in one part of a business (e.g. a hotel subsidiary) can affect broader operations and financial exposure.

TOGA has not confirmed the ransomware claim or disclosed whether a ransom was demanded or paid.

Minimizing Exposure: A Takeaway for Finance Teams

For CFOs and finance managers, incidents like this highlight a growing need for stronger supplier data controls and payment verification processes. Even organizations with solid internal systems can be exposed through third-party services, subsidiaries, or legacy data silos.

Real-time verification of payee details and bank account data, especially before large or unusual payments, can help detect red flags early and reduce the risk of business email compromise or invoice fraud.

Padlock with key
Want to reduce your risk of payment fraud?
See how Eftsure helps finance teams verify payees and protect against cyber threats—book a demo today.

Related articles

The new security standard for business payments

End-to-end B2B payment protection software to mitigate the risk of payment error, fraud and cyber-crime.