Qantas

Qantas

On 12 October 2025, Qantas confirmed a massive data breach exposing personal details of **5.7 million customers** after hacker group **Scattered LAPSUS$ Hunters** leaked the data on the dark web. The attack targeted **Salesforce systems** used by Qantas between June and July 2025, following a failed ransom demand. Compromised data included **full names, email addresses, home/business addresses, dates of birth, phone numbers, gender, and frequent flyer details**, though **credit card data, passwords, and passport numbers remained secure**.The breach was part of a broader campaign affecting **40+ global firms**, including Google, Disney, and Air France-KLM. While Qantas notified affected customers in July and implemented **24/7 support hotlines and identity protection services**, experts warned of **heightened risks of phishing, identity theft, and fraud**. Authorities emphasized the illegality of accessing the leaked data and urged vigilance against scams exploiting the exposed information.The incident underscored vulnerabilities in third-party cloud providers and the cascading risks of **customer data leaks**, with criminals likely leveraging the details for **convincing impersonation scams** (e.g., fake refunds or flight rescheduling). Qantas claimed to have secured remaining data and strengthened defenses, but the long-term reputational and operational impacts remain significant.

Source: https://www.ibtimes.co.uk/qantas-data-breach-2025-how-know-if-your-data-was-exposed-steps-protect-yourself-1747699

TPRM report: https://www.rankiteo.com/company/qantas

"id": "qan5093150101325",
"linkid": "qantas",
"type": "Ransomware",
"date": "6/2025",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization's existence"
{'affected_entities': [{'customers_affected': '5,700,000',
                        'industry': 'aviation',
                        'location': 'Australia',
                        'name': 'Qantas',
                        'size': 'large (5.7 million customers affected)',
                        'type': 'airline'}],
 'attack_vector': 'third-party compromise (Salesforce systems)',
 'customer_advisories': ['Check for official emails from @qantas.com or '
                         '@qantas.com.au.',
                         'Use Qantas 24/7 hotline (1800 971 541 or +61 2 8028 '
                         '0534 for overseas).',
                         "Monitor 'Have I Been Pwned' for breach updates."],
 'data_breach': {'data_exfiltration': 'yes (leaked on dark web)',
                 'number_of_records_exposed': '5,700,000',
                 'personally_identifiable_information': ['full names',
                                                         'email addresses',
                                                         'Frequent Flyer '
                                                         'numbers',
                                                         'home/business '
                                                         'addresses',
                                                         'dates of birth',
                                                         'phone numbers',
                                                         'gender'],
                 'sensitivity_of_data': 'high (PII, frequent flyer details)',
                 'type_of_data_compromised': ['personal identifiable '
                                              'information (PII)',
                                              'customer profiles']},
 'date_detected': '2025-07-01',
 'date_publicly_disclosed': '2025-10-12',
 'description': 'On Sunday, 12 October 2025, Qantas confirmed that personal '
                'data from more than five million customers had been leaked on '
                'the dark web. The data breach followed a ransom threat from a '
                'hacker group called Scattered LAPSUS$ Hunters after '
                'Salesforce, a cloud software provider linked to Qantas, '
                'refused to pay. The attack targeted customer data stored in '
                'Salesforce systems used by Qantas between June and July 2025. '
                'The breach was part of a larger campaign that hit more than '
                '40 global firms, including Google, Disney, and Air '
                'France-KLM. The stolen data includes full names, email '
                'addresses, Frequent Flyer membership numbers, home/business '
                'addresses, dates of birth, phone numbers, gender, and meal '
                'preferences in limited cases. Credit card data, passport '
                'numbers, and passwords were not exposed.',
 'impact': {'brand_reputation_impact': 'high (quarter of Australian population '
                                       'affected; potential loss of trust)',
            'customer_complaints': 'expected surge due to scams',
            'data_compromised': ['full names',
                                 'email addresses',
                                 'Frequent Flyer membership numbers',
                                 'home addresses',
                                 'business addresses',
                                 'dates of birth',
                                 'phone numbers',
                                 'gender',
                                 'meal preferences'],
            'identity_theft_risk': 'high',
            'operational_impact': 'increased scam risks (phishing, identity '
                                  'theft, fraud)',
            'payment_information_risk': 'none (credit card data and passwords '
                                        'not exposed)',
            'systems_affected': ['Salesforce cloud systems']},
 'initial_access_broker': {'data_sold_on_dark_web': 'yes (leaked after ransom '
                                                    'deadline)',
                           'entry_point': 'Salesforce cloud systems '
                                          '(third-party compromise)',
                           'high_value_targets': ['customer PII',
                                                  'Frequent Flyer program '
                                                  'data'],
                           'reconnaissance_period': 'June–July 2025 (data '
                                                    'targeted during this '
                                                    'period)'},
 'investigation_status': 'ongoing (customer notifications completed; scam '
                         'warnings issued)',
 'lessons_learned': 'Third-party vendor risks (Salesforce compromise); '
                    'importance of multi-factor authentication (MFA) and '
                    'customer education on scam prevention; need for proactive '
                    'monitoring of dark web for leaked data.',
 'motivation': 'financial (ransom extortion)',
 'post_incident_analysis': {'corrective_actions': ['Strengthened data security '
                                                   'and defenses.',
                                                   'Enhanced customer support '
                                                   '(24/7 hotline, identity '
                                                   'protection services).',
                                                   'Public awareness campaigns '
                                                   'on scam prevention.'],
                            'root_causes': ['third-party vendor vulnerability '
                                            '(Salesforce)',
                                            'failure to pay ransom leading to '
                                            'data leak']},
 'ransomware': {'data_exfiltration': 'yes (leaked after ransom deadline '
                                     'passed)',
                'ransom_demanded': 'yes (threatened leak if unpaid by 3 pm '
                                   'AEDT, 11 October 2025)',
                'ransom_paid': 'no (Salesforce refused)'},
 'recommendations': ['Activate MFA on critical accounts (email, banking, '
                     'government).',
                     'Change passwords for Qantas and reused credentials; use '
                     'strong, unique passwords.',
                     'Verify legitimacy of communications (check sender '
                     'domains, avoid clicking suspicious links).',
                     'Monitor financial statements and credit reports for '
                     'unauthorized activity.',
                     'Report identity theft or scams to banks and the '
                     'Australian Cyber Security Centre.',
                     'Avoid searching for leaked data on the dark web (risk of '
                     'malware).'],
 'references': [{'source': 'SBS News'},
                {'source': 'The Guardian'},
                {'source': 'Australian Cyber Security Centre (ACSC)'},
                {'source': "RMIT University's Centre for Cyber Security "
                           '(Matthew Warren)'},
                {'source': "CSIRO's Data61 (Dr. Marthie Grobler)"},
                {'source': 'University of New South Wales (Arash Shaghaghi)'}],
 'regulatory_compliance': {'regulatory_notifications': 'yes (Australian '
                                                       'government and '
                                                       'cybersecurity '
                                                       'authorities involved)'},
 'response': {'communication_strategy': ['email notifications to affected '
                                         'customers (July 2025)',
                                         'public advisories via media',
                                         '24-hour hotline',
                                         'warnings against dark web searches'],
              'containment_measures': ['securing remaining data',
                                       'strengthening defenses'],
              'incident_response_plan_activated': 'yes (immediate steps to '
                                                  'secure data and notify '
                                                  'customers)',
              'law_enforcement_notified': 'yes (Australian government '
                                          'involved)',
              'remediation_measures': ['24/7 support hotline',
                                       'identity protection services for '
                                       'affected users']},
 'stakeholder_advisories': 'Australian government (Cybersecurity Minister Tony '
                           'Burke) warned against accessing leaked data; urged '
                           'vigilance for scams.',
 'threat_actor': 'Scattered LAPSUS$ Hunters',
 'title': 'Qantas Data Breach Exposed Over 5 Million Customers',
 'type': ['data breach', 'ransomware threat']}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.