Qantas Airways has revealed that a cyber attack on one of its third-party service platforms may have compromised the personal data of up to six million customers. The breach was linked to a customer service tool used by a Qantas-operated call centre, and the airline confirmed that suspicious activity was detected earlier this week.
In an official statement, Qantas said a malicious actor gained access to this external platform, but the intrusion has since been contained. Investigations are ongoing to determine how much customer data was exposed, though initial findings suggest the impact could be significant.
The company confirmed that the exposed information may include customer names, contact numbers, email addresses, dates of birth, and frequent flyer membership numbers. However, Qantas clarified that no financial data—such as credit card details, bank information, or passport numbers—was stored on the affected system.
The airline also confirmed that sensitive account credentials, such as passwords, login PINs, and security information, were not accessed. Flight operations and the safety of air travel have not been affected by this breach.
Qantas Group CEO Vanessa Hudson addressed the incident, expressing regret over the situation. “Our customers place their trust in us to protect their personal data, and we deeply regret that this has occurred. We are contacting affected individuals directly and are committed to offering them full support,” she said.
To assist impacted customers, Qantas has launched a dedicated help centre offering expert guidance on identity protection. The support service is reachable at 1800 971 541 or +61 2 8028 0534 for international callers. Customers with upcoming flights have been assured that they do not need to take any action regarding their bookings.
Australian authorities have been notified, including the Australian Cyber Security Centre, the Office of the Australian Information Commissioner (OAIC), and the Australian Federal Police. Qantas has pledged full cooperation with the agencies involved in the investigation.
Shadow Minister for Cyber Security Melissa Price commented on the breach during an interview with ABC, calling it a serious wake-up call for all Australian companies. She emphasized the need for transparency and continuous updates to the public when incidents of this scale occur.
This breach adds to a growing list of cybersecurity incidents in Australia. Other major organizations, including AustralianSuper and Nine Media, have also suffered data leaks in recent months.
Earlier this year, the OAIC reported that 2024 saw the highest number of recorded data breaches since tracking began in 2018. Australian Privacy Commissioner Carly Kind warned that the risks posed by cyber threats are growing and called on both private companies and public agencies to strengthen their defences.
As data breaches become more frequent and complex, cybersecurity remains a critical issue for businesses and consumers alike.
A criminal group known for using ransomware was recently caught off guard when its own website was tampered with. The website, which the gang normally uses to publish stolen data from their victims, was replaced with a short message warning against illegal activity. The message read: “Don’t do crime. CRIME IS BAD. xoxo from Prague.” What a sneaky way to reference gossip girl, isn't it?
At the time of this report, the website remained altered. It is not yet known if the person or group behind the hack also accessed any files or data belonging to the ransomware gang.
The group, known by the name Everest, has been involved in several cyberattacks since it first appeared in 2020. It is believed to be based in Russia. Over the years, Everest has taken credit for stealing large amounts of data, including information from a popular cannabis store chain, which affected hundreds of thousands of customers. Government agencies in the United States and Brazil have also been listed among their victims.
Ransomware attacks like these are designed to scare companies and organizations into paying money in exchange for keeping their private information from being made public. But recent reports suggest that fewer victims are giving in to the demands. More businesses have started refusing to pay, which has made these attacks less profitable for criminals.
While international law enforcement agencies have had some success in shutting down hacking groups, Everest has managed to stay active. However, this incident shows that even experienced cybercriminals are not safe from being attacked themselves. Some believe this could have been done by a rival group, or possibly even someone from within the gang who turned against them.
It’s also not the first time that cybercrime groups have been sabotaged. In the past few years, other well-known ransomware gangs have faced setbacks due to both police actions and internal leaks.
This unusual case is forces us to face the inevitable reality that no one is completely untouchable online. Whether it’s a company or a hacker group, all digital systems can have weak points. People and organizations should always keep their online systems protected and stay alert to threats.
Cybercriminals are constantly refining their tactics to steal personal and financial information. One of the most common methods they use is phishing, a type of cyberattack where fraudsters impersonate trusted organizations to trick victims into revealing sensitive data. With billions of phishing emails sent every day, it’s essential to recognize the warning signs and avoid falling into these traps.
What is Phishing?
Phishing is a deceptive technique where attackers send emails that appear to be from legitimate companies, urging recipients to click on malicious links or download harmful attachments. These fake emails often lead to fraudulent websites designed to steal login credentials, banking details, or personal information.
While email phishing is the most common, cybercriminals also use other methods, including:
Understanding the tactics used in phishing attacks can help you spot red flags and stay protected.
Key Signs of a Phishing Email
1. Urgency and Fear Tactics
One of the biggest warning signs of a phishing attempt is a sense of urgency. Attackers try to rush victims into making quick decisions by creating panic.
For example, an email may claim:
1. "Your account will be locked in 24 hours!"
2. "Unusual login detected! Verify now!"
3. "You’ve won a prize! Claim immediately!"
These messages pressure you into clicking links without thinking. Always take a moment to analyze the email before acting.
2. Too Good to Be True Offers
Phishing emails often promise unrealistic rewards, such as:
Cybercriminals prey on curiosity and excitement, hoping victims will click before questioning the legitimacy of the offer. If an email seems too good to be true, it probably is.
3. Poor Grammar and Spelling Mistakes
Legitimate companies carefully proofread their emails before sending them. In contrast, phishing emails often contain spelling errors, awkward phrasing, or grammatical mistakes.
For example:
If an email is full of errors or unnatural language, it's a red flag.
4. Generic or Impersonal Greetings
Most trusted organizations address customers by their first and last names. A phishing email, however, might use vague greetings like:
If an email does not include your real name but claims to be from your bank, social media, or an online service, be cautious.
5. Suspicious Email Addresses
A simple yet effective way to detect phishing emails is by checking the sender’s email address. Cybercriminals mimic official domains but often include small variations:
Even a single misspelled letter can indicate a scam. Always verify the email address before clicking any links.
6. Unusual Links and Attachments
Phishing emails often contain harmful links or attachments designed to steal data or infect your device with malware. Before clicking, hover over the link to preview the actual URL. If the website address looks strange, do not click it.
Be especially cautious with:
If you're unsure, go directly to the company’s official website instead of clicking any links in the email.
What to Do If You Suspect a Phishing Email?
If you receive a suspicious email, take the following steps:
1. Do not click on links or download attachments
2. Verify the sender’s email address
3. Look for spelling or grammatical mistakes
4. Report the email as phishing to your email provider
5. Contact the organization directly using their official website or phone number
Most banks and companies never ask for personal details via email. If an email requests sensitive information, treat it as a scam.
Phishing attacks continue to grow in intricacies, but by staying vigilant and recognizing warning signs, you can protect yourself from cybercriminals. Always double-check emails before clicking links, and when in doubt, contact the company directly.
Cybersecurity starts with awareness—spread the knowledge and help others stay safe online!