Australian arrested in Bali over fatal shooting ambush at villa
Two men, including an Australian, have been arrested over a fatal ambush at a luxury villa in Bali that left one Melbourne man dead and another, with links to the underworld, seriously injured.
Indonesia's police chief confirmed the arrests on Tuesday, saying one man had been detained in Jakarta and that the other was 'on his way back from abroad'. At least one of the men is Australian, but Bali authorities said it was too early to release further details.
The manhunt for the two attackers behind the shooting had put all exit points from the holiday island on high alert. The suspects could now face the death penalty, but Australia's Department of Foreign Affairs did not say if it was providing consular assistance to either of the detained men.
Melbourne man Zivan 'Stipe' Radmanovic, 32, was shot dead shortly after midnight on Saturday after two men burst into his rented villa near Munggu Beach in the northern Badung district.
Also shot and beaten was Sanar Ghanim, 34, the former partner of Danielle Stephens, who is the step-daughter of slain underworld figure Carl Williams.
Ghanim was taken to hospital with multiple gunshot wounds, blunt-force trauma injuries and bullets still embedded in his body.
Radmanovic died at the scene with forensic doctors reporting he was shot in at least four parts of his body – the chest, stomach, buttock, and the palm – while also suffering extensive injuries to his head and foot. On Tuesday, his family arrived at the morgue to authorise a full autopsy.
The attackers were masked, wearing helmets and at least one had spoken in an Australian accent, complaining his bike wouldn't start, before both fled the scene, witnesses told police. The men's voices were also caught by CCTV in the area.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


West Australian
24 minutes ago
- West Australian
JB Hi-Fi pays $13.5m to settle The Good Guys promotions lawsuit
Retail giant JB Hi-Fi has agreed to pay a $13.5 million fine to settle allegations that certain store promotions at The Good Guys were misleading and deceptive. The company, which owns the discount white goods and electronics warehouses, has also agreed to a remediation program for some customers. The Australian Competition and Consumer Commission started legal action against JB Hi-Fi in Federal Court in July last year over certain store credit and StoreCash promotions, alleging they violated consumer law. The Good Guys promised to provide customers with store credit for buying goods — such as $50 in StoreCash for a $500 purchase — but the retailer didn't disclose they also had to opt-in to receive marketing communications, the ACCC said at the time. The retailer also didn't adequately mention the credits expired quickly, mostly within seven and 10 days, the ACCC said. 'We are concerned that as a result of the alleged conduct, consumers may have purchased products from The Good Guys which they might not have done otherwise,' ACCC chair Gina Cass-Gottlieb said when it launched court proceedings. 'Businesses should be on notice that promotional conditions must be prominently disclosed to consumers, rather than buried in hard-to-find locations, or they risk enforcement action under the Australian consumer law.' The ACCC said 116 promotion ran from July 2019 to August 2023. 'The Good Guys takes its compliance with the law very seriously and has worked co-operatively with the ACCC to resolve the matter,' JB Hi-Fi said in a statement on Monday. 'The Good Guys has always sought to provide value and benefits to its customers and has always prided itself on its high levels of trust with consumers.' JB Hi-Fi has also agreed to contribute $200,000 to the ACCC's court costs. The ACCC said the agreement was subject to Federal Court approval and full details of the outcome would be made public when the court announced its judgment.


Perth Now
41 minutes ago
- Perth Now
Update after man ‘grabs' 14yo on cruise ship
A major cruise line has responded after a 71-year-old man was charged with assaulting a teenage girl aboard one of its ships off the Australian coast. Police allege the man approached the 14-year-old girl near a lift on the Carnival Encounter cruise ship and grabbed her shortly before 11pm on Thursday. The man was not known to the teenager, police say. Police allege the 14-year-old was grabbed by the man while on the cruise ship off the coast of Queensland. supplied Credit: Supplied She quickly alerted nearby staff, who intervened. She was not physically harmed. In a statement released on Monday, a Carnival Cruise Lines spokesperson said the company was co-operating with police. 'Carnival Cruise Line is co-operating with police after an (alleged) incident involving one of our guests,' the spokesperson said. 'The alleged victim was offered support and counselling. 'Our commitment to the safety and security of all our guests and team members is demonstrated through the implementation of various measures to assure that our ships are a welcoming, family-friendly place.' The ship was off the coast of Queensland at the time of the alleged assault. Detectives from the Gateway Child Protection and Investigation Unit arrested the man at the Port of Brisbane on Saturday morning. He has been charged with deprivation of liberty and two counts of common assault. Police objected to the man's bail. He was due to appear in Brisbane Magistrates Court on Monday.


The Advertiser
2 hours ago
- The Advertiser
Derailing ransomware - today's great train robbery
It wasn't too long ago that the criminal enterprise of choice would see thieves jump aboard a moving train, navigate the carriages, neutralise the guards, get through locked doors, and ransack the locomotive of its valuable jewels and gold. In 2025, there is a similar motive at play, but the heists have shifted from the Wild West to the World Wide Web. Cyberattacks are today's great train robberies and they're increasingly common. Recent research from Rubrik Zero Labs found 92 per cent of Australian organisations experienced a cyberattack last year, and the attackers are only growing more sophisticated. Ransomware is one of the most common types of cyberattacks, comprising 20 per cent of all attacks, and those behind them do not discriminate. According to the same Rubrik Zero Labs' research, attackers have evolved, with 78 per cent of Australian victims reporting the threat actors were able to at least partially harm backup and recovery options. In more than a third (35 per cent) of cases, the attackers were completely successful. Why are attackers targeting backups? If they can successfully compromise these critical data copies, the victim's ability to recover data under their own steam will be severely impacted. The thinking is, if they can take these down, then the victim will be forced to pay the ransom. And it's working. Rubrik Labs Research also found that of the Australian firms hit with a ransomware attack last year, more than 90 per cent paid the ransom to recover their data. While paying an attacker may allow a business to recover its data or stop a threat, it also supports the cybercrime business model. If a ransomware attack works once, what's going to stop it working again, and again, and again. Paying a ransom just fuels the fire. These payments may have previously gone unreported, however late last month the federal government introduced mandatory ransomware payment reporting requirements. This could change the calculus for local organisations as they seek to avoid the reputational risk of payments going public. Unfortunately, despite best efforts, there is no silver bullet to protect against every single cyberattack. You can't prevent the unpreventable. So the only thing that matters is how quickly you can recover. There are many reasons why the frequency of cyberattacks, like ransomware, are increasing. These include the rising use of AI by cybercriminals, more sophistication of attacks, significant financial incentives, uneasy geopolitical climates, digitisation of organisations, and the shortage of cybersecurity professionals. With this in mind, adopting a preemptive recovery posture - one that recognises a motivated attack will eventually be successful - organisations can take the initiative and recover faster than attackers can adapt. So, it is imperative to be prepared with a recovery plan. To prepare for the worst. To adopt an "assumed breach" mindset. In short, cyber resilience strategies reduce the severity of ransomware threats. Even if an organisation's systems are breached and held to ransom, secure backups ensure the business can quickly assess the scale of the breach, understand the scope of the compromise, and rapidly recover operations - all without paying a ransom. This will lead to a decline in Australian businesses paying out ransoms and perpetuating the cybercrime business model. If the nation is no longer seen as a soft target, if robbers never come away with any loot, they'll shift their attention elsewhere - or better yet, leave the looting life behind. Just like trains in the Wild West, businesses need multiple defences. Even if the thieves make it onto the train, past the guard and get through the locked door, it's not like valuables are out in the open waiting to be taken. They're in safes, requiring different keys and combinations to open. Cyber resilience strategies are an organisation's impenetrable safe - ensuring the crown jewels and critical backups needed to keep the train in motion are out of an attacker's reach. It wasn't too long ago that the criminal enterprise of choice would see thieves jump aboard a moving train, navigate the carriages, neutralise the guards, get through locked doors, and ransack the locomotive of its valuable jewels and gold. In 2025, there is a similar motive at play, but the heists have shifted from the Wild West to the World Wide Web. Cyberattacks are today's great train robberies and they're increasingly common. Recent research from Rubrik Zero Labs found 92 per cent of Australian organisations experienced a cyberattack last year, and the attackers are only growing more sophisticated. Ransomware is one of the most common types of cyberattacks, comprising 20 per cent of all attacks, and those behind them do not discriminate. According to the same Rubrik Zero Labs' research, attackers have evolved, with 78 per cent of Australian victims reporting the threat actors were able to at least partially harm backup and recovery options. In more than a third (35 per cent) of cases, the attackers were completely successful. Why are attackers targeting backups? If they can successfully compromise these critical data copies, the victim's ability to recover data under their own steam will be severely impacted. The thinking is, if they can take these down, then the victim will be forced to pay the ransom. And it's working. Rubrik Labs Research also found that of the Australian firms hit with a ransomware attack last year, more than 90 per cent paid the ransom to recover their data. While paying an attacker may allow a business to recover its data or stop a threat, it also supports the cybercrime business model. If a ransomware attack works once, what's going to stop it working again, and again, and again. Paying a ransom just fuels the fire. These payments may have previously gone unreported, however late last month the federal government introduced mandatory ransomware payment reporting requirements. This could change the calculus for local organisations as they seek to avoid the reputational risk of payments going public. Unfortunately, despite best efforts, there is no silver bullet to protect against every single cyberattack. You can't prevent the unpreventable. So the only thing that matters is how quickly you can recover. There are many reasons why the frequency of cyberattacks, like ransomware, are increasing. These include the rising use of AI by cybercriminals, more sophistication of attacks, significant financial incentives, uneasy geopolitical climates, digitisation of organisations, and the shortage of cybersecurity professionals. With this in mind, adopting a preemptive recovery posture - one that recognises a motivated attack will eventually be successful - organisations can take the initiative and recover faster than attackers can adapt. So, it is imperative to be prepared with a recovery plan. To prepare for the worst. To adopt an "assumed breach" mindset. In short, cyber resilience strategies reduce the severity of ransomware threats. Even if an organisation's systems are breached and held to ransom, secure backups ensure the business can quickly assess the scale of the breach, understand the scope of the compromise, and rapidly recover operations - all without paying a ransom. This will lead to a decline in Australian businesses paying out ransoms and perpetuating the cybercrime business model. If the nation is no longer seen as a soft target, if robbers never come away with any loot, they'll shift their attention elsewhere - or better yet, leave the looting life behind. Just like trains in the Wild West, businesses need multiple defences. Even if the thieves make it onto the train, past the guard and get through the locked door, it's not like valuables are out in the open waiting to be taken. They're in safes, requiring different keys and combinations to open. Cyber resilience strategies are an organisation's impenetrable safe - ensuring the crown jewels and critical backups needed to keep the train in motion are out of an attacker's reach. It wasn't too long ago that the criminal enterprise of choice would see thieves jump aboard a moving train, navigate the carriages, neutralise the guards, get through locked doors, and ransack the locomotive of its valuable jewels and gold. In 2025, there is a similar motive at play, but the heists have shifted from the Wild West to the World Wide Web. Cyberattacks are today's great train robberies and they're increasingly common. Recent research from Rubrik Zero Labs found 92 per cent of Australian organisations experienced a cyberattack last year, and the attackers are only growing more sophisticated. Ransomware is one of the most common types of cyberattacks, comprising 20 per cent of all attacks, and those behind them do not discriminate. According to the same Rubrik Zero Labs' research, attackers have evolved, with 78 per cent of Australian victims reporting the threat actors were able to at least partially harm backup and recovery options. In more than a third (35 per cent) of cases, the attackers were completely successful. Why are attackers targeting backups? If they can successfully compromise these critical data copies, the victim's ability to recover data under their own steam will be severely impacted. The thinking is, if they can take these down, then the victim will be forced to pay the ransom. And it's working. Rubrik Labs Research also found that of the Australian firms hit with a ransomware attack last year, more than 90 per cent paid the ransom to recover their data. While paying an attacker may allow a business to recover its data or stop a threat, it also supports the cybercrime business model. If a ransomware attack works once, what's going to stop it working again, and again, and again. Paying a ransom just fuels the fire. These payments may have previously gone unreported, however late last month the federal government introduced mandatory ransomware payment reporting requirements. This could change the calculus for local organisations as they seek to avoid the reputational risk of payments going public. Unfortunately, despite best efforts, there is no silver bullet to protect against every single cyberattack. You can't prevent the unpreventable. So the only thing that matters is how quickly you can recover. There are many reasons why the frequency of cyberattacks, like ransomware, are increasing. These include the rising use of AI by cybercriminals, more sophistication of attacks, significant financial incentives, uneasy geopolitical climates, digitisation of organisations, and the shortage of cybersecurity professionals. With this in mind, adopting a preemptive recovery posture - one that recognises a motivated attack will eventually be successful - organisations can take the initiative and recover faster than attackers can adapt. So, it is imperative to be prepared with a recovery plan. To prepare for the worst. To adopt an "assumed breach" mindset. In short, cyber resilience strategies reduce the severity of ransomware threats. Even if an organisation's systems are breached and held to ransom, secure backups ensure the business can quickly assess the scale of the breach, understand the scope of the compromise, and rapidly recover operations - all without paying a ransom. This will lead to a decline in Australian businesses paying out ransoms and perpetuating the cybercrime business model. If the nation is no longer seen as a soft target, if robbers never come away with any loot, they'll shift their attention elsewhere - or better yet, leave the looting life behind. Just like trains in the Wild West, businesses need multiple defences. Even if the thieves make it onto the train, past the guard and get through the locked door, it's not like valuables are out in the open waiting to be taken. They're in safes, requiring different keys and combinations to open. Cyber resilience strategies are an organisation's impenetrable safe - ensuring the crown jewels and critical backups needed to keep the train in motion are out of an attacker's reach. It wasn't too long ago that the criminal enterprise of choice would see thieves jump aboard a moving train, navigate the carriages, neutralise the guards, get through locked doors, and ransack the locomotive of its valuable jewels and gold. In 2025, there is a similar motive at play, but the heists have shifted from the Wild West to the World Wide Web. Cyberattacks are today's great train robberies and they're increasingly common. Recent research from Rubrik Zero Labs found 92 per cent of Australian organisations experienced a cyberattack last year, and the attackers are only growing more sophisticated. Ransomware is one of the most common types of cyberattacks, comprising 20 per cent of all attacks, and those behind them do not discriminate. According to the same Rubrik Zero Labs' research, attackers have evolved, with 78 per cent of Australian victims reporting the threat actors were able to at least partially harm backup and recovery options. In more than a third (35 per cent) of cases, the attackers were completely successful. Why are attackers targeting backups? If they can successfully compromise these critical data copies, the victim's ability to recover data under their own steam will be severely impacted. The thinking is, if they can take these down, then the victim will be forced to pay the ransom. And it's working. Rubrik Labs Research also found that of the Australian firms hit with a ransomware attack last year, more than 90 per cent paid the ransom to recover their data. While paying an attacker may allow a business to recover its data or stop a threat, it also supports the cybercrime business model. If a ransomware attack works once, what's going to stop it working again, and again, and again. Paying a ransom just fuels the fire. These payments may have previously gone unreported, however late last month the federal government introduced mandatory ransomware payment reporting requirements. This could change the calculus for local organisations as they seek to avoid the reputational risk of payments going public. Unfortunately, despite best efforts, there is no silver bullet to protect against every single cyberattack. You can't prevent the unpreventable. So the only thing that matters is how quickly you can recover. There are many reasons why the frequency of cyberattacks, like ransomware, are increasing. These include the rising use of AI by cybercriminals, more sophistication of attacks, significant financial incentives, uneasy geopolitical climates, digitisation of organisations, and the shortage of cybersecurity professionals. With this in mind, adopting a preemptive recovery posture - one that recognises a motivated attack will eventually be successful - organisations can take the initiative and recover faster than attackers can adapt. So, it is imperative to be prepared with a recovery plan. To prepare for the worst. To adopt an "assumed breach" mindset. In short, cyber resilience strategies reduce the severity of ransomware threats. Even if an organisation's systems are breached and held to ransom, secure backups ensure the business can quickly assess the scale of the breach, understand the scope of the compromise, and rapidly recover operations - all without paying a ransom. This will lead to a decline in Australian businesses paying out ransoms and perpetuating the cybercrime business model. If the nation is no longer seen as a soft target, if robbers never come away with any loot, they'll shift their attention elsewhere - or better yet, leave the looting life behind. Just like trains in the Wild West, businesses need multiple defences. Even if the thieves make it onto the train, past the guard and get through the locked door, it's not like valuables are out in the open waiting to be taken. They're in safes, requiring different keys and combinations to open. Cyber resilience strategies are an organisation's impenetrable safe - ensuring the crown jewels and critical backups needed to keep the train in motion are out of an attacker's reach.