logo
Auric eyes $4.5M windfall from final Jeffreys Find WA mining campaign

Auric eyes $4.5M windfall from final Jeffreys Find WA mining campaign

Auric Mining has fired up a final toll milling campaign at its Jeffreys Find gold mine near Norseman in Western Australia's Goldfields. The final 60,000-tonne batch of ore is set to produce a handy 2750 ounces of gold to close out the company's wildly successful joint venture with BML Ventures.
The ore is now being processed at Focus Minerals' Three Mile Hill mill in Coolgardie, tying a bow on Auric's 30,000-ounce total gold target from Jeffreys Find. The final push is projected to generate up to $9 million in surplus cash. Auric's 50:50 share is expected to be between $4 million and $4.5 million.
Under the joint venture, Kalgoorlie-based BML will again carry the mining, haulage and milling costs for Jeffreys Find. Auric says it has already invoiced BML for a $3.6 million interim distribution to be paid in July and August, with final accounting slated for the next quarter.
Auric has closely studied BML's toll treating strategy, as it looks to replicate the joint venture's success and mining practices at its latest and largest flagship Munda gold project, just up the road from Jeffreys Find.
'Auric will bank more than $17 million in total from its profit share of the mining at Jeffreys Find.'
Auric Mining managing director Mark English
Auric Mining managing director Mark English said: 'This has been a game-changer for us as we transition to becoming a gold producer in our own right. These additional funds will principally be used to support the operations already underway at Munda.'
The Jeffreys Find project has been a financial springboard for Auric. With its $17 million war chest from its share of gold sales, the company will now deploy its fully funded mining operation at the 125,000-tonne starter pit, which is already underway at Munda. The initial pit is targeting a minimum 6100 ounces at 1.8 grams per tonne (g/t) gold from a broader resource at Munda of 3.65 million tonnes grading 1.23g/t gold for 145,000 ounces.
The 145,000-ounce Munda deposit is one of the largest undeveloped gold resources in the Kalgoorlie region, which is a key factor in Auric securing a lucrative toll treatment agreement with mid-cap gold producer Black Cat Syndicate for the Munda starter pit ore.
Black Cat has opened its gates to Auric and will process ore at its currently under-capacity Lakewood mill in Kalgoorlie. Spare capacity is an absolute rarity in the region. The soaring gold price means toll treating options have become notoriously hard to find and the region's mills are reportedly backed up well into 2027.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Hedge fund Totus Capital hit by Santos short and CBA rally
Hedge fund Totus Capital hit by Santos short and CBA rally

AU Financial Review

time6 hours ago

  • AU Financial Review

Hedge fund Totus Capital hit by Santos short and CBA rally

It's been a tough year for hedge fund manager Totus Capital after missing out on the rally in ASX blue chips like Commonwealth Bank and Wesfarmers and then being caught on the wrong side of a surging Santos share price. In the Sydney-based short seller's latest update to investors, portfolio manager Ben McGarry said not owning index heavyweights including Telstra – which has accounted for most of the ASX's rally this year – had hit performance.

Direct route for scammers as Qantas hack scale revealed
Direct route for scammers as Qantas hack scale revealed

The Advertiser

time8 hours ago

  • The Advertiser

Direct route for scammers as Qantas hack scale revealed

Scammers could have a direct route to devising targeted scams for millions of Qantas customers in coming months as the airline reveals exactly what personal data was exposed in a major cyber attack. Australia's largest airline on Wednesday disclosed details of the 5.7 million customer records impacted when a third-party system used by an offshore call centre was hacked. Of those, the names, email addresses and frequent flyer details of four million customers were exposed. The remaining 1.7 million customers had more data taken, including their names, email addresses, dates of birth, phone numbers, personal or business addresses, gender and meal preferences. In total, about 10,000 meal preferences were accessed. A cybersecurity expert warned compromising such personal information was a "good starting point" for scammers to target individuals. "I see this as stage one of the continuous Qantas situation," RMIT University's Matthew Warren told AAP. Scam attempts would likely start with people impersonating Qantas staff in the weeks and months to come as criminals tried to gain financial or passport details, he said But the attempts could become more targeted from there, including business invoice scams, especially if the information was distributed widely on the dark web. Qantas maintains there is no evidence so far any stolen personal data has been released. Professor Warren said it was only a matter of time before the hackers published the data but they would likely try to hold Qantas to ransom first. "If the data is then sold on the dark net, you're then going to get other groups spending a lot more time trawling through the data and trying to identify possible ways to undertake scams," he said. Qantas has begun individually notifying almost six million customers which of their specific personal details have been exposed in the attack. The airline previously said a possible cybercriminal had contacted it about the hack, but would not confirm whether a ransom demand had been received. Australian Federal Police investigators are also probing the breach. Sydney-based customer Nick Allison received an email on Wednesday morning notifying him that his name, frequent flyer number and tier were exposed in the cyber raid. Mr Allison, who was also embroiled in the 2022 Optus and 2023 Dymocks hacks, is worried about a rise in phishing attempts as a result of his data being exposed. "Is it going to be every single email that I get sent for the rest of my life from Qantas? Is that a scam? Is that real?" he said. "How am I going to know? They've got all that data." Mr Allison said he had lost some trust in Qantas in the wake of the hack. "It makes me very hesitant to give Qantas more information in the future. Is it going to get lost?" he said. As the scam risk grows, customers are being urged to remain alert to emails, text messages or phone calls if the sender purports to be from Qantas. "Regularly review your compromised accounts and other linked accounts for unusual activity," cybersecurity technology firm McAfee's Tyler McGee said. The identity of the group responsible for the attack remains a mystery, although multiple experts believe it is the work of Scattered Spider, a cabal of young cybercriminals living in the US and the UK. Qantas said it had set up extra cybersecurity measures to protect customer data. Scammers could have a direct route to devising targeted scams for millions of Qantas customers in coming months as the airline reveals exactly what personal data was exposed in a major cyber attack. Australia's largest airline on Wednesday disclosed details of the 5.7 million customer records impacted when a third-party system used by an offshore call centre was hacked. Of those, the names, email addresses and frequent flyer details of four million customers were exposed. The remaining 1.7 million customers had more data taken, including their names, email addresses, dates of birth, phone numbers, personal or business addresses, gender and meal preferences. In total, about 10,000 meal preferences were accessed. A cybersecurity expert warned compromising such personal information was a "good starting point" for scammers to target individuals. "I see this as stage one of the continuous Qantas situation," RMIT University's Matthew Warren told AAP. Scam attempts would likely start with people impersonating Qantas staff in the weeks and months to come as criminals tried to gain financial or passport details, he said But the attempts could become more targeted from there, including business invoice scams, especially if the information was distributed widely on the dark web. Qantas maintains there is no evidence so far any stolen personal data has been released. Professor Warren said it was only a matter of time before the hackers published the data but they would likely try to hold Qantas to ransom first. "If the data is then sold on the dark net, you're then going to get other groups spending a lot more time trawling through the data and trying to identify possible ways to undertake scams," he said. Qantas has begun individually notifying almost six million customers which of their specific personal details have been exposed in the attack. The airline previously said a possible cybercriminal had contacted it about the hack, but would not confirm whether a ransom demand had been received. Australian Federal Police investigators are also probing the breach. Sydney-based customer Nick Allison received an email on Wednesday morning notifying him that his name, frequent flyer number and tier were exposed in the cyber raid. Mr Allison, who was also embroiled in the 2022 Optus and 2023 Dymocks hacks, is worried about a rise in phishing attempts as a result of his data being exposed. "Is it going to be every single email that I get sent for the rest of my life from Qantas? Is that a scam? Is that real?" he said. "How am I going to know? They've got all that data." Mr Allison said he had lost some trust in Qantas in the wake of the hack. "It makes me very hesitant to give Qantas more information in the future. Is it going to get lost?" he said. As the scam risk grows, customers are being urged to remain alert to emails, text messages or phone calls if the sender purports to be from Qantas. "Regularly review your compromised accounts and other linked accounts for unusual activity," cybersecurity technology firm McAfee's Tyler McGee said. The identity of the group responsible for the attack remains a mystery, although multiple experts believe it is the work of Scattered Spider, a cabal of young cybercriminals living in the US and the UK. Qantas said it had set up extra cybersecurity measures to protect customer data. Scammers could have a direct route to devising targeted scams for millions of Qantas customers in coming months as the airline reveals exactly what personal data was exposed in a major cyber attack. Australia's largest airline on Wednesday disclosed details of the 5.7 million customer records impacted when a third-party system used by an offshore call centre was hacked. Of those, the names, email addresses and frequent flyer details of four million customers were exposed. The remaining 1.7 million customers had more data taken, including their names, email addresses, dates of birth, phone numbers, personal or business addresses, gender and meal preferences. In total, about 10,000 meal preferences were accessed. A cybersecurity expert warned compromising such personal information was a "good starting point" for scammers to target individuals. "I see this as stage one of the continuous Qantas situation," RMIT University's Matthew Warren told AAP. Scam attempts would likely start with people impersonating Qantas staff in the weeks and months to come as criminals tried to gain financial or passport details, he said But the attempts could become more targeted from there, including business invoice scams, especially if the information was distributed widely on the dark web. Qantas maintains there is no evidence so far any stolen personal data has been released. Professor Warren said it was only a matter of time before the hackers published the data but they would likely try to hold Qantas to ransom first. "If the data is then sold on the dark net, you're then going to get other groups spending a lot more time trawling through the data and trying to identify possible ways to undertake scams," he said. Qantas has begun individually notifying almost six million customers which of their specific personal details have been exposed in the attack. The airline previously said a possible cybercriminal had contacted it about the hack, but would not confirm whether a ransom demand had been received. Australian Federal Police investigators are also probing the breach. Sydney-based customer Nick Allison received an email on Wednesday morning notifying him that his name, frequent flyer number and tier were exposed in the cyber raid. Mr Allison, who was also embroiled in the 2022 Optus and 2023 Dymocks hacks, is worried about a rise in phishing attempts as a result of his data being exposed. "Is it going to be every single email that I get sent for the rest of my life from Qantas? Is that a scam? Is that real?" he said. "How am I going to know? They've got all that data." Mr Allison said he had lost some trust in Qantas in the wake of the hack. "It makes me very hesitant to give Qantas more information in the future. Is it going to get lost?" he said. As the scam risk grows, customers are being urged to remain alert to emails, text messages or phone calls if the sender purports to be from Qantas. "Regularly review your compromised accounts and other linked accounts for unusual activity," cybersecurity technology firm McAfee's Tyler McGee said. The identity of the group responsible for the attack remains a mystery, although multiple experts believe it is the work of Scattered Spider, a cabal of young cybercriminals living in the US and the UK. Qantas said it had set up extra cybersecurity measures to protect customer data. Scammers could have a direct route to devising targeted scams for millions of Qantas customers in coming months as the airline reveals exactly what personal data was exposed in a major cyber attack. Australia's largest airline on Wednesday disclosed details of the 5.7 million customer records impacted when a third-party system used by an offshore call centre was hacked. Of those, the names, email addresses and frequent flyer details of four million customers were exposed. The remaining 1.7 million customers had more data taken, including their names, email addresses, dates of birth, phone numbers, personal or business addresses, gender and meal preferences. In total, about 10,000 meal preferences were accessed. A cybersecurity expert warned compromising such personal information was a "good starting point" for scammers to target individuals. "I see this as stage one of the continuous Qantas situation," RMIT University's Matthew Warren told AAP. Scam attempts would likely start with people impersonating Qantas staff in the weeks and months to come as criminals tried to gain financial or passport details, he said But the attempts could become more targeted from there, including business invoice scams, especially if the information was distributed widely on the dark web. Qantas maintains there is no evidence so far any stolen personal data has been released. Professor Warren said it was only a matter of time before the hackers published the data but they would likely try to hold Qantas to ransom first. "If the data is then sold on the dark net, you're then going to get other groups spending a lot more time trawling through the data and trying to identify possible ways to undertake scams," he said. Qantas has begun individually notifying almost six million customers which of their specific personal details have been exposed in the attack. The airline previously said a possible cybercriminal had contacted it about the hack, but would not confirm whether a ransom demand had been received. Australian Federal Police investigators are also probing the breach. Sydney-based customer Nick Allison received an email on Wednesday morning notifying him that his name, frequent flyer number and tier were exposed in the cyber raid. Mr Allison, who was also embroiled in the 2022 Optus and 2023 Dymocks hacks, is worried about a rise in phishing attempts as a result of his data being exposed. "Is it going to be every single email that I get sent for the rest of my life from Qantas? Is that a scam? Is that real?" he said. "How am I going to know? They've got all that data." Mr Allison said he had lost some trust in Qantas in the wake of the hack. "It makes me very hesitant to give Qantas more information in the future. Is it going to get lost?" he said. As the scam risk grows, customers are being urged to remain alert to emails, text messages or phone calls if the sender purports to be from Qantas. "Regularly review your compromised accounts and other linked accounts for unusual activity," cybersecurity technology firm McAfee's Tyler McGee said. The identity of the group responsible for the attack remains a mystery, although multiple experts believe it is the work of Scattered Spider, a cabal of young cybercriminals living in the US and the UK. Qantas said it had set up extra cybersecurity measures to protect customer data.

Starbucks calls remote workers back to rebuild ‘in-office culture'
Starbucks calls remote workers back to rebuild ‘in-office culture'

7NEWS

time11 hours ago

  • 7NEWS

Starbucks calls remote workers back to rebuild ‘in-office culture'

Starbucks is requiring some remote workers to return to its headquarters and increasing the number of days that corporate employees are required to work in an office. In a letter to employees posted on Monday, Starbucks Chairman and CEO Brian Niccol said corporate employees would need to be in the office four days a week starting in early October instead of three days a week. The Seattle-based company said that all corporate 'people leaders' must be based in either Seattle or Toronto within 12 months. That is a change from February, when it required vice presidents to relocate to Seattle, in the US state of Washington, or Toronto, in Canada. Starbucks said individual employees working under those leaders would not be asked to relocate. But the company said all hiring for future roles and lateral moves will require employees to be based in Seattle or Toronto. 'We are re-establishing our in-office culture because we do our best work when we're together. We share ideas more effectively, creatively solve hard problems, and move much faster,' Niccol wrote in the letter. Niccol said affected workers who choose not to relocate will be eligible for a one-time voluntary exit program with a cash payment. While many workers grew to enjoy working from home during the pandemic, the call for workers to return to offices full-time has been growing over the past year. Major US employers such as Amazon, AT&T and the federal government have required employees to work in office sites five days per week. Competition for fully-remote jobs is fierce. Starbucks spokeswoman Lori Torgerson said she did not have a count of employees who are currently working as 'people leaders' or are working remotely. Starbucks has 16,000 corporate support employees worldwide but that includes coffee roasters and warehouse staff. Niccol was not required to relocate to Seattle when he was hired to lead Starbucks last August. Instead, the company said it would help him set up an office near his home in Newport Beach, California, and would give him the use of a corporate jet to commute to Seattle. Since then, Niccol has bought a home in Seattle and is frequently seen at the company's headquarters, Torgerson said.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store