Key Takeaways:
- Cyber espionage operations targeting private firms have quadrupled since 2015, putting billions in IP at risk.
- Supply chains, research partnerships, and extended networks are prime targets for cyber espionage.
- Businesses must proactively assess vulnerabilities, strengthen cybersecurity, and enforce IP protection measures.
Why You Need to Read This
Imagine spending millions—maybe even billions—on cutting-edge research, only to have a cybercriminal lift it with a few clicks. That’s not paranoia; it’s happening every day. In 2023, the FBI’s Internet Crime Complaint Center (IC3) received 880,418 complaints, with potential losses exceeding $12.5 billion. And guess what? Many of those attacks weren’t targeting individuals but businesses like yours.
Cyber-enabled economic espionage is the new frontier of corporate theft, and if you think your company is too small or too secure to be a target, think again. Let’s dive into how it happens, why it matters, and—most importantly—what you can do about it.
Understanding the Problem
The Allure of IP Theft
Why spend billions on R&D when you can just steal it? That’s the mindset of many cybercriminals, especially those backed by state actors or large-scale industrial espionage networks. Trade secrets, proprietary research, and emerging technology are goldmines for competitors who want to leapfrog years of innovation at your expense. In recognition of this evolving threat, Australia introduced economic espionage laws in 2018.
R&D Intensive Industries Are Prime Targets
Industries like biotech, advanced manufacturing, and digital services are especially vulnerable. These businesses rely on intellectual property (IP) protection to maintain their competitive edge. However, the very nature of research and commercialisation often means working with external partners—many of whom have their own security weaknesses.

How It Happens: The Weakest Links in Your Business
Supply Chain Vulnerabilities
Your company might have airtight security, but what about your suppliers? Contract manufacturers, third-party vendors, and even research collaborators could be the weakest link. Hackers often exploit these gaps to gain access to proprietary designs and processes.
Targeting Your Extended Network
You’d expect your employees to be careful with sensitive data, but what about your law firm, auditor, or cloud service provider? These entities handle confidential information yet may lack the robust security protocols necessary to protect it.
Case Study: The Coca-Cola Breach of 2009
If you need proof that one weak link can sink a major corporation, look no further than Coca-Cola’s 2009 cyber disaster. While in the middle of a $2.4 billion acquisition of Huiyuan Juice Group, hackers infiltrated Coca-Cola’s systems (BBC, 2012).
Here’s how it played out:
- A malicious email was sent to Coca-Cola’s deputy president for the Pacific region.
- The email contained malware that installed keyloggers and remote access tools.
- Hackers gained full control of Coca-Cola’s internal servers and workstations.
- Sensitive data, including internal emails and financial documents, were compromised for over a month.
- The FBI eventually uncovered the breach and informed Coca-Cola.
- Coca-Cola kept the attack secret for three years, but the damage was already done—the acquisition collapsed within days of the attack.
Moral of the story? A single email was enough to jeopardise a multi-billion-dollar deal.

The Global Context
Cybersecurity Maturity Varies Across Economies
Some countries treat IP theft as a serious crime; others turn a blind eye—or even encourage it. Research shows there’s a big cultural element to IP crime. Emerging economies, hungry for technological advancement, often have weaker cybersecurity laws and enforcement, making it easier for bad actors to operate with impunity.
Public R&D Funding at Risk
Governments spend billions funding research, yet much of that investment ends up benefiting foreign competitors due to lax security. If your company benefits from public R&D grants, you need to ensure those innovations stay protected—or risk giving away your competitive advantage.
What You Can Do: Actionable Steps for Business Leaders
1. Assess Your Risk Profile
- Identify your most valuable trade secrets and research assets.
- Map out all potential vulnerabilities in your supply chain and partnerships.
- Conduct regular security audits to stay ahead of threats.
2. Strengthen Cybersecurity Defences
- Train employees to recognise phishing and social engineering attempts.
- Implement multi-factor authentication (MFA) across all systems.
- Enforce encryption policies for all sensitive data, including backups.
3. Perform Due Diligence on Partners
- Vet vendors and third-party providers before sharing sensitive data.
- Establish clear cybersecurity requirements in all contracts.
- Monitor access to shared research and proprietary information.
4. Leverage Government Resources
- Engage with cybersecurity initiatives like the FBI’s IC3 and the Australian Cyber Security Centre (ACSC).
- Join industry-specific information-sharing networks to stay informed. If you’re in Australia, checkout the Department of Home Affairs’ Trusted Information Sharing Networks (TISN).
- Apply for grants and resources aimed at improving business security.
Conclusion
Cyber-enabled economic espionage isn’t some abstract, distant problem—it’s happening now, and businesses that fail to take it seriously risk losing everything. Over the past five years, IC3 received 3.79 million complaints, totaling $37.5 billion in reported losses.
The bottom line? You can’t afford to ignore this. Take action today, assess your risks, and make cybersecurity a business priority—because the cost of doing nothing is far greater than the investment in protecting your future.
Further Reading
- Australian Cyber Security Centre (2023). Small business cyber security guide. Australian Government.
- BBC (2012). Coca-Cola ‘targeted’ by China in hack ahead of acquisition attempt
- Curwell, P. (2021).
Australia’s economic espionage laws: what this means for ‘trade secrets’ protection after 2018 - Department of Home Affairs (2025). Trusted Information Sharing Networks, Australian Government.
DISCLAIMER: All information presented on paulcurwell.com is intended for general information purposes only. The content of paulcurwell.com should not be considered legal or any other form of advice or opinion on any specific facts or circumstances. Readers should consult their own advisers experts or lawyers on any specific questions they may have. Any reliance placed upon paulcurwell.com is strictly at the reader’s own risk. The views expressed by the authors are entirely their own and do not represent the views of, nor are they endorsed by, their respective employers. Refer here for full disclaimer.







