Concise Cyber

Subscribe below for free to get these delivered straight to your inbox

Advertisements
Qantas Hit by Major Data Breach: Millions of Customer Records Compromised
Advertisements

Australian airline giant Qantas has confirmed a significant cyberattack that resulted in the compromise of personal data belonging to approximately 5.7 million customers. The incident, which was first detected on June 30th, has triggered an extortion attempt by the threat actors and underscores the growing vulnerability of third-party service providers in the aviation sector.

The breach primarily affected a third-party customer servicing platform used by one of Qantas’s contact centers. While Qantas has assured that no credit card details, financial information, passport details, passwords, PINs, or login credentials were stolen from its core systems, the exposed data is still considerable and could be leveraged for sophisticated phishing and social engineering attacks.

What Data Was Compromised?

Qantas’s forensic analysis revealed varying types of data accessed for the impacted customers:

  • Four million customer records were limited to names, email addresses, and Qantas Frequent Flyer details. Of these:
    • 1.2 million contained only names and email addresses.
    • 2.8 million included names, email addresses, and Qantas Frequent Flyer numbers, with a majority also having tier status, and a smaller subset including points balance and status credits.
  • The remaining 1.7 million customer records included a combination of the above, plus one or more of the following:
    • Addresses: 1.3 million (residential and/or business addresses, including hotels for misplaced baggage delivery).
    • Dates of Birth: 1.1 million.
    • Phone Numbers: 900,000 (mobile, landline, and/or business).
    • Gender: 400,000.
    • Meal Preferences: 10,000.

Qantas has stated that customer records are based on unique email addresses, and individuals with multiple email addresses may have multiple affected accounts.

The Modus Operandi and Industry Implications

The attack bears the hallmarks of the notorious cybercrime group “Scattered Spider,” known for its advanced social engineering tactics, often targeting help desks and support vendors to gain initial access to corporate networks. The FBI had recently warned about this collective targeting the airline industry, and while Qantas has not definitively attributed the attack, the method aligns with Scattered Spider’s techniques, which involve impersonating employees to trick service desks into resetting passwords or multi-factor authentication.

This incident is the latest in a series of cyberattacks impacting the aviation sector, with Hawaiian Airlines and WestJet also reporting breaches in recent weeks. It highlights a critical vulnerability in the supply chain: large organizations often rely on numerous third-party providers, and the security posture of these vendors can become the weakest link in the overall cybersecurity chain. The Qantas breach specifically exposed the risks associated with insufficient access controls and identity verification processes within outsourced customer support functions.

Qantas’s Response and Customer Advice

Qantas Group CEO Vanessa Hudson expressed apologies for the incident, acknowledging the uncertainty it has caused. The airline has stated it is “progressively emailing” affected customers to inform them of the specific data types compromised and provide support. A dedicated 24/7 support line has been established (+61 2 8028 0534 or 1800 971 541 for Australian callers), and customers are advised to check their junk/spam folders for legitimate communications from Qantas.

In response to the breach, Qantas has implemented additional security measures to further restrict access, strengthen system monitoring, and enhance detection capabilities. This includes increased security for Qantas Frequent Flyer accounts, requiring additional identification for account changes.

Customers are urged to remain vigilant against phishing attempts via email, text messages, or phone calls, particularly from anyone purporting to be from Qantas. The airline emphasizes that it will never ask for passwords, booking reference details, or sensitive login information through these channels. Recommendations include:

  • Independently verifying the identity of callers by contacting Qantas through official channels.
  • Enabling two-step authentication for personal email and other online accounts where available.
  • Staying informed about the latest scams by visiting official government cybersecurity resources like Scamwatch and Cyber.gov.au.

The Qantas data breach serves as a stark reminder for all businesses, especially those handling large volumes of customer data and operating with complex third-party networks, that robust cybersecurity requires more than just internal defences. It demands comprehensive vendor risk management, strong identity and access controls across the entire ecosystem, and continuous vigilance against evolving social engineering tactics.