Back to Blog
Cybersecurity | Western Australia

Don't Be the Next Headline: WA M365 Breach Lessons for Perth & Western Australian Businesses

The WA Auditor General's report exposed $71,000 stolen and the sensitive data of children leaked - all from preventable Microsoft 365 misconfigurations. Here's what your business must do now.

March 14, 2026 8 min read Perth, WA
$71K
Stolen via invoice fraud
32
Individuals' data exposed, including children
100%
Preventable - configuration failures, not software exploits

In early 2026, the Western Australian Office of the Auditor General (OAG) released a landmark report - Microsoft 365 Security Controls – State Entities - and its findings were a wake-up call for every organisation in the state. The breach cost one WA government entity $71,000 in fraudulent payments and saw the personal data of 32 individuals, including minors, inadvertently shared with a third party.

The most alarming detail from investigators and security analysts who reviewed the findings: not a single line of vulnerable code was exploited. The attackers didn't need to. They walked in through doors left wide open by poor configuration and absent governance.

At Ultron Developments, we read these reports because we build the solutions that prevent them. Based right here in Perth, we partner with WA businesses - from mining and healthcare to local government and professional services - to ensure their Microsoft 365 environments are configured for resilience, not just capability. Here's a breakdown of the critical lessons the breach exposed, and exactly how we address each one.

Key insight from security analysts reviewing the OAG findings:

"The breach path relied entirely on configuration gaps and incomplete security controls - not software vulnerabilities. That distinction matters because it means the breach was largely preventable." - Analysis of the WA OAG report findings

The Attack Chain: How a Misconfigured M365 Becomes an Open Door

The WA incidents followed a predictable pattern that security professionals recognise immediately. There was no exotic zero-day exploit. The attack chain looked like this:

  1. Credential theft via phishing
  2. Weak MFA bypassed - the attacker logged in using stolen credentials
  3. New MFA method registered - locking out the legitimate user
  4. Mailbox persistence established - the attacker had weeks of quiet access
  5. Inbox monitoring and rule creation - understanding financial workflows
  6. Invoice fraud executed - $71,000 redirected

Each of these steps should have been blocked by standard Microsoft 365 security features. They weren't, because those features hadn't been properly deployed. This is the core lesson: Microsoft 365 ships with world-class security tools. The gap is almost always in configuration, not capability.

The Four Critical Failures - And the Ultron Solutions

1. Phishable MFA: The First Door Left Ajar

What the OAG found: Many WA entities relied on SMS, voice call, or email-based one-time passwords (OTPs) as their Multi-Factor Authentication (MFA). While technically "MFA-compliant," these methods are trivially defeated by modern phishing attacks. Attackers simply trick users into handing over the OTP on a fake login page, or they socially engineer a SIM swap. In the WA breach, this allowed an overseas attacker to register their own unmanaged device on the account - effectively becoming the "legitimate" user - and then spend weeks monitoring email to time their fraud perfectly.

The Ultron approach: We transition your team away from phishable MFA to phishing-resistant authentication - specifically, FIDO2 security keys (physical hardware tokens) or certificate-based authentication (CBA) tied to managed devices you control. These methods are cryptographically bound to the legitimate website, meaning even a perfect fake login page cannot intercept the credential. We also architect Conditional Access policies in Microsoft Entra ID (formerly Azure AD) that enforce device compliance - so an unmanaged personal device or a login from an anomalous overseas location is blocked outright, full stop.

2. Zero Data Loss Prevention: Sensitive Data Walked Out the Door

What the OAG found: One WA entity leaked the personal data of 32 individuals - including children - to an external third party. The entity had no Data Loss Prevention (DLP) controls in place. There was nothing to detect the leak. There was nothing to stop it. The data simply flowed out through an email or file share, and nobody knew until the damage was done.

The Ultron approach: We architect M365 environments with layered data protection from the ground up. This means deploying Microsoft Purview Sensitivity Labels to classify and mark documents containing PII, financial data, or other sensitive content - automatically, using trainable classifiers - and then enforcing DLP policies that prevent those labelled items from being emailed externally, shared via Teams to unverified guests, or uploaded to personal OneDrive accounts. Whether sensitive data is in Exchange Online, SharePoint, Teams, or Power Platform, our policies ensure it can be detected and blocked before it ever reaches the open internet.

3. Uncontrolled Guest Access: The "Wild West" of External Sharing

What the OAG found: Multiple WA state entities allowed any internal user - regardless of role - to invite external guests into their Microsoft 365 tenants. No administrator approval. No access reviews. No expiry dates. This created a sprawling, invisible network of external access to sensitive SharePoint sites, Teams channels, and OneDrive folders that security teams had no visibility over and no mechanism to audit or revoke efficiently.

The Ultron approach: We implement a full Identity Governance framework using Microsoft Entra ID Governance. This includes:

  • Entitlement Management - all guest access requests go through a defined approval workflow. No one gets access without a legitimate business justification signed off by a responsible owner.
  • Access Reviews - on a scheduled basis (monthly or quarterly), resource owners are prompted to certify whether existing guest users still need access. Inactive or unnecessary access is automatically revoked.
  • Guest lifecycle policies - guest accounts are provisioned with defined expiry dates, ensuring time-limited access for contractors, vendors, and partners rather than indefinite access that quietly accumulates over years.

4. Shadow IT and Power Platform Risks: Productivity Without Guardrails

What the OAG found: WA entities had staff connecting unapproved third-party applications to their M365 tenants and embedding external, unvetted code into Power BI reports. This created significant exposure to cross-site scripting attacks and data manipulation - risks that the security teams were completely unaware of because no governance framework existed for citizen developer activity within the Power Platform.

The Ultron approach: As a specialist Power Platform consultancy, this is an area we understand deeply from both sides. We implement Power Platform governance - including environment strategies that separate development, test, and production, with Data Loss Prevention policies applied at the connector level. This means your staff can still build the automations and dashboards they need to do their jobs, but they're working in a "safe sandbox" where unapproved connectors, external data sources, and third-party code are blocked by policy, not by IT helpdesk tickets. We also use Microsoft Intune to enforce device management and application controls, ensuring only approved tools can access your corporate data.

Why These Failures Keep Happening - And Why They Don't Have To

The OAG's findings aren't unique to government. Across WA's private sector - in mining, construction, healthcare, legal, and professional services - we see the same patterns every week. Large M365 environments accumulate configuration drift over time. Temporary exceptions become permanent. A security policy gets deployed in one workload but not another. A new integration is approved without a governance review.

Eventually, those small gaps align - and they become the breach path that makes the news.

The good news is that this is entirely preventable. Microsoft 365 is, in 2026, one of the most security-capable enterprise platforms available. The tools exist. The question is whether they're consistently and correctly deployed.

The practical test for your environment:

If an attacker could move from credential theft to mailbox persistence without triggering both a preventive control (blocking the action) and a detective control (alerting your team), your environment has control gaps. Every step in the breach chain should map to both.

Why Western Australian Businesses Trust Ultron Developments

We're not a national helpdesk with a Perth suburb listed on our website. We're a Perth-headquartered technology consultancy whose team lives and works in the same city as our clients. We understand the local regulatory landscape, the WA government procurement context, and the specific risks facing industries like mining services, healthcare, and professional services in this state.

When we secure your Microsoft 365 environment, we do it with three commitments:

  • Evidence-Based Security: We align your controls to the ASD Essential Eight maturity model and the specific recommendations of the WA Auditor General, so your security posture is benchmarked against recognised Australian standards - not just vendor defaults.
  • Local Partnership, Global Standards: You get a partner you can call, who understands your industry, backed by deep Microsoft cloud expertise and certified professionals. We bridge the trust gap that national providers often can't.
  • Security-First DNA: From our IsThisSpam.org initiative - a community tool we built to protect people from email threats - to our enterprise security audits and governance implementations, cybersecurity isn't a service line for us. It's a core value.

Is Your M365 Environment Truly Secure?

The WA M365 breach was a warning. A $71,000 loss and the exposure of children's data made national headlines, but for every incident that gets an OAG report, there are dozens that don't. The configuration gaps that enabled the WA breach are present in the majority of Microsoft 365 tenants across Australia right now.

The question isn't whether these vulnerabilities exist in your environment - statistically, they almost certainly do. The question is whether you find them before an attacker does.

Whether you need a comprehensive security audit, a phishing-resistant MFA rollout, a DLP deployment, or a complete M365 security uplift aligned to the ASD Essential Eight, Ultron Developments is your local partner for cyber resilience.

Book your security assessment today. Don't wait for the breach to happen to you.

Is Your M365 Environment Truly Secure?

Don't wait for a $71,000 loss to find out your configuration was lacking. Book a security assessment with our Perth-based Microsoft 365 experts today.

Book Your Security Assessment

ultrondevelopments.com.au