The Sri Lankan government has confirmed that a cyberattack against its Ministry of Finance resulted in the theft of more than $3.7 million in funds earmarked for debt repayments to Australia. Authorities describe the incident as the largest confirmed cyber theft from a Sri Lankan state institution to date, with the Criminal Investigation Department and the Central Bank's Financial Intelligence Unit now leading the investigation alongside Australian officials.

What Happened

Threat actors breached the Ministry of Finance's email servers and connected computer systems, gaining sufficient access to manipulate outgoing payment instructions. Funds that had been allocated as part of Sri Lanka's bilateral debt repayment obligations to Australia were redirected to attacker-controlled accounts after payment details were altered in transit. The intrusion was identified after Australian and Sri Lankan officials noticed irregularities in expected inbound payments, prompting the Ministry to confirm that the money earmarked for Australia had vanished. Finance Ministry Secretary Harshana Suriyapperuma confirmed the email server breach and said authorities are coordinating with Australian investigators.

What Was Taken

Over $3.7 million in sovereign debt repayment funds were diverted from their intended recipient. While no bulk data exfiltration has been publicly disclosed, the attackers necessarily had enough access to the Ministry's email and financial workflow to read, manipulate, or spoof payment instructions, meaning any correspondence, banking credentials, counterparty details, and internal approvals handled through those systems should be treated as compromised. The Australian High Commission confirmed the irregularities publicly through High Commissioner Matthew Duckworth.

Why It Matters

This incident marks a significant escalation in financially motivated attacks against sovereign financial institutions in South Asia and demonstrates the continued viability of business email compromise (BEC) and payment diversion tradecraft against government ministries. Sri Lanka is still in the middle of a politically sensitive sovereign debt restructuring process, and the attack directly undermines trust in the machinery responsible for executing those repayments. For defenders, it reinforces that email server compromise is not just a data-theft problem: once an attacker can sit inside a finance workflow, they can weaponise legitimate payment processes to extract funds at scale. Allied governments that transact with compromised ministries also inherit downstream risk.

The Attack Technique

Sri Lankan officials have not formally attributed the intrusion or disclosed full technical details, but the reported behaviour is consistent with a payment diversion scheme enabled by an email server compromise. Based on public statements, the attackers obtained access to the Ministry's email infrastructure, then altered payment details so that funds destined for the Australian government were rerouted to accounts they controlled. This pattern typically involves credential theft or exploitation of an exposed mail server, followed by mailbox rule manipulation, interception of financial correspondence, and spoofed or modified payment instructions sent to counterparties or internal treasury staff. No named threat actor has been confirmed.

What Organizations Should Do

Sources: Sri Lankan government hack sees $3.7m destined for Australia stolen - Cyber Daily