Qantas confirms cybercriminals released stolen customer data

Australian airline Qantas confirmed that hackers have recently published data they stole in a cyberattack this summer.

Qantas told customers it has an Australian court injunction in place to stop people within the country from accessing, viewing or releasing the data. It is currently investigating what data was leaked.

The acknowledgement of the leak comes after the Scattered LAPSUS$ Hunters cybercriminal organization published information on Friday that was stolen from Qantas and five other large companies. The six are part of a larger group of about 40 high-profile customers of Salesforce initially listed on the cybercriminals’ leak site two weeks ago.  

“Qantas is one of a number of companies globally that has had data released by cyber criminals following a cyber incident in early July, where customer data was stolen via a third party platform,” the company said on Monday. 

Qantas added that its assessment of the incident has not changed since July, when they told customers that the information of about 5.7 million people was exposed during the cyberattack. 

About 2.8 million customers had names, email addresses and Qantas Frequent Flyer numbers leaked. At least 1.7 million other customers had some combination of that information and either home addresses, dates of birth, phone numbers, meal preferences or genders exposed. 

No credit cards or passport details were leaked, the advisory said. The stolen information cannot be used to breach Qantas Frequent Flyer accounts, the company said. Customers have been contacted directly and given advice based on the type of information stolen. 

Qantas said this week that it has created a phone support line and is continuing to work with Australian government agencies as well as the Office of the Privacy Commissioner in New Zealand to assist victims. 

The airline urged customers to be wary of any messages purporting to be from Qantas and to watch all accounts for suspicious activity. 

“We are aware of increased reports of scammers impersonating Qantas. These scammers are attempting to use the heightened awareness of our situation to entice Qantas customers to click through links or share personal details,” the company said.

Last month, Qantas said senior leaders at the airline have had their annual bonuses reduced by 15% following the cyberattack — including a $250,000 reduction in pay for Qantas Group CEO Vanessa Hudson.

None of the other companies whose data were leaked by Scattered Spider this weekend responded to requests for comment. 

VNCERT, Vietnam’s cybersecurity agency, confirmed to a local news outlet that Vietnam Airlines was listed on the Scattered LAPSUS$ Hunters site and said it is in the process of investigating the leak. 

The data breach website HaveIBeenPwned looked through the batch of data from Vietnam Airlines and said dates of birth, email addresses, names, phone numbers and loyalty program details were leaked. The data ranges from November 2020 to June 2025. 

Scattered LAPSUS$ Hunters initially demanded a ransom from Salesforce, pledging to stop extorting the company’s customers if an undisclosed sum was paid. Salesforce refused to pay the ransom and batches of data were released late Friday evening. 

On Sunday, the FBI confirmed it took down several domains the hackers were planning to use to post the stolen data but the hackers created a new platform almost immediately where the stolen information can be accessed. 

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Chinese Hackers Exploit ArcGIS Server as Backdoor for Over a Year

Next Post

Indiana city confirms ransomware hackers behind September incident

Related Posts

When Attacks Come Faster Than Patches: Why 2026 Will be the Year of Machine-Speed Security

The Race for Every New CVE Based on multiple 2025 industry reports: roughly 50 to 61 percent of newly disclosed vulnerabilities saw exploit code weaponized within 48 hours. Using the CISA Known Exploited Vulnerabilities Catalog as a reference, hundreds of software flaws are now confirmed as actively targeted within days of public disclosure. Each new announcement now triggers a global race
Read More

Red Hat OpenShift AI Flaw Exposes Hybrid Cloud Infrastructure to Full Takeover

A severe security flaw has been disclosed in the Red Hat OpenShift AI service that could allow attackers to escalate privileges and take control of the complete infrastructure under certain conditions. OpenShift AI is a platform for managing the lifecycle of predictive and generative artificial intelligence (GenAI) models at scale and across hybrid cloud environments. It also facilitates data
Read More