QANTAS Cyber Incident

"Strengthen system monitoring and detection" is most likely sends the system feed to another instance of SIEM somewhere else ...... But then no one actually monitors the SIEM anyway.
Oh, I think that is harsh! I am sure they monitor the storage requirements for the collected data! How much gets read, yes that is the question. Assume a growing involvement of AI in SIEM review, but where QF are up to is anybody's guess.
 
It's often the internal systems that are the least protected, as application teams heavily rely on network-level security and ignore application-level security.

Thankfully that's the legacy way of thinking about it and more and more companies are trying to move towards ZTA. Problem is, most don't understand it or think ZTA is a single product.
Post automatically merged:

Easier to name the companies that haven't suffered a breach :(

Let me compile that list quickly. Oh wait...it's more like an empty set.

Probably put companies into two lists. Those that are aware they've been breached and those that have been breached but they just don't know it.

Above comment is a tongue in cheek, but probably a little closer to the truth than we'd like.
 
They certainly have in the past, last year I found out my elderly dad had his pin as DDMM of his birthday and forced him to change it to something not obvious.
I forgot my password earlier this year and tried to change it do year (not month) and it wouldn't allow it.
 
Someone over on OzBargain wanted them to gift 50k points "as an apology". Good luck getting that! :p
Is that less or more likely than what someone else above hoped for that execs would be held responsible and their bonuses confiscated?

Yes.. 2FA...
I mean at least that alone seems to have been enough to (maybe) prevent a bunch of account fraud ala what happened to Virgin Velocity awhile back before they bothered adding it.
 
Will be interesting to see how the EU responds to this alleged breach and whether a fine will be levied.
 
Well, I hold an account for son who has never used it. Zero status. Zero points. He got this email. We, on the other hand, both active and WP have received - nothing.

I got the generic email which just says same thing as the website, what I want to know is specifically if my own details were in the 6M records breached or not.
 
Last edited:
Elevate your business spending to first-class rewards! Sign up today with code AFF10 and process over $10,000 in business expenses within your first 30 days to unlock 10,000 Bonus PayRewards Points.
Join 30,000+ savvy business owners who:

✅ Pay suppliers who don’t accept Amex
✅ Max out credit card rewards—even on government payments
✅ Earn & transfer PayRewards Points to 10+ airline & hotel partners

Start earning today!
- Pay suppliers who don’t take Amex
- Max out credit card rewards—even on government payments
- Earn & Transfer PayRewards Points to 8+ top airline & hotel partners

AFF Supporters can remove this and all advertisements

leaking birth dates is a huge security violation, I'm surprised how their email attempts to downplay the severity 💣

I wish more people were aware of how sensitive & important it is to guard your birth date
Indeed - given that they don't actually use the DOBs anymore, I don't know why (other than sheer inertia/laziness) they've been retained.

(I was recently reminded that my DOB was incorrect because it was pre-populated on a Qantas Health Insurance quote, but can't remember the last time they had any other use).
 
Brute forcing 4 digit pins is not an option as accounts quickly get locked out but having FF# and Surname significantly lowers the bar.
You don't need to worry about brute forcing individual accounts when you have so many pairs of FF# and surname.

You get 3 chances to guess the right number. That means for each account they try to access they have a 1 in 3,333 chance of guessing correctly.

They have 6,000,000 accounts.

So just guessing 3 numbers for each of the 6mil accounts will be successful 1,800 times.
 
I just got locked out of my MyGov account - I wonder if it's related to the hack. Hackers already trying to brute force accounts?

View attachment 454780
They try and brute force MyGov all the time. The pro tip is to switch off your email address as a username (which they seem to have done), set up a passkey and turn off passwords.
 

Become an AFF member!

Join Australian Frequent Flyer (AFF) for free and unlock insider tips, exclusive deals, and global meetups with 65,000+ frequent flyers.

AFF members can also access our Frequent Flyer Training courses, and upgrade to Fast-track your way to expert traveller status and unlock even more exclusive discounts!

AFF forum abbreviations

Wondering about Y, J or any of the other abbreviations used on our forum?

Check out our guide to common AFF acronyms & abbreviations.
Back
Top