QANTAS Cyber Incident

The sooner these companies are fined into bankruptcy for losing OUR information the better, they might not then send OUR information to third world countries to look after!
 
Elevate your business spending to first-class rewards! Sign up today with code AFF10 and process over $10,000 in business expenses within your first 30 days to unlock 10,000 Bonus PayRewards Points.
Join 30,000+ savvy business owners who:

✅ Pay suppliers who don’t accept Amex
✅ Max out credit card rewards—even on government payments
✅ Earn & transfer PayRewards Points to 10+ airline & hotel partners

Start earning today!
- Pay suppliers who don’t take Amex
- Max out credit card rewards—even on government payments
- Earn & Transfer PayRewards Points to 8+ top airline & hotel partners

AFF Supporters can remove this and all advertisements

So someone in Manila fell for social engineering. Sigh.

Could you ask if any PNR details were exposed?
More like one of the low paid workers downloaded them all and now Qantas are saying they got “hacked” it’s like the politicians and celebrities posting cough on their social media saying they got “hacked”
Post automatically merged:

Nah I’d prefer an upgrade to first class on every flight for the next year thanks.


Interesting that is 6 million and Manila so those who’ve not been dealing with Manila are fine. I’d love to know how long that goes back time wise as well!
I have never rang Qantas or emailed them or anything, I got the your details have been compromised email last night
 
The mods have merged my "who hasn't received a notification" thread into this one - no explanation given.

As far as how big this thing is and how it is going to affect us - we will probably just have to sit and wait. I remember with one of the cyber attacks that it was revealed weeks later that the hackers had gotten a lot more of peoples data than was first revealed - lets hope this isn't the case this time!
 
The only thing I could really do is change my email address; fortunately I was planning on doing this anyway as I was preparing in the next few months to break the shackles of the ISP email I have been using for three decades.
LOL - at least you get a choice! My ISP was bought out by another company which then was bought by a another company - and eventually it ended up being owned by TPG in Singapore - and they decided that they couldn't be bothered maintaining the old email servers so gave all the customers about 45 days notice that they were shutting the servers down and to find a new email provider. I had kept the same email address for over 25 years and so everyone around the world who knew me knew that they could contact me on that address - it was the only personal email address that I had ever had! Wasn't happy at all but nothing I could do about it.
 
But I think this was the saving grace, it was not the QF system that was accessed but the call centres separate system. At least credit cards / passwords etc weren’t included. It would be a much bigger world of hurt if they were.

Yes but if Qantas were allowing the outsourced call centre company to keep copies of QFF
members on their local system, their contract needs to insist that the call centre providers have equivalent safeguards.

Whenever you logon to your QFF account for a new device its triggers 2FA so a PIN leak less worrisome and can be reset easily unlike PII.
 
Just going through my spam.

The first scam email with full name and DOB quoted for me was on Saturday 28th June. 2 days before Qantas say they were affected.

28th June is also when FBI put out an alert about airline sector being targeted:

I suspect more airlines have been compromised. I've flown with a lot of carriers over the years.
 
This wasn’t a technical breach (hack)
Yes however this only considers the initial vector used by the attacker to gain access.

Downstream, there could be many technical breaches and deficiencies beyond the social engineering aspect. Some questions I'm sure those at Qantas are asking themselves:

- Does a call centre agent have a business need to dump 6 million customer records in a very short period of time? (broken access control, insecure design)
- Was the call centre system exposed to the wider internet, even if authenticated, and if so why? (security misconfiguration)

Social engineering attacks and technical breaches are not mutually exclusive. If one is successful, you want to have controls on the other to help mitigate.
 
- Was the call centre system exposed to the wider internet, even if authenticated, and if so why? (security misconfiguration)
I can almost guarantee they were using some cloud based CRM like Salesforce.
Everything's in the cloud now which is fancy talk for your information is on someone else's server, not the company you do business with.
 
I can almost guarantee they were using some cloud based CRM like Salesforce.
Everything's in the cloud now which is fancy talk for your information is on someone else's server, not the company you do business with.
If it was Salesforce (Qantas use Salesforce extensively across the group but haven't confirmed if this was the system involved in this breach), you can configure trusted IP ranges which would go a long way towards preventing these kinds of attacks - so hopefully where available these types of controls are being used.

https://help.salesforce.com/s/articleView?id=platform.login_ip_ranges.htm&type=5
 
This is what happens when you outsource to a third world country.

But even worse is Hudson is nowhere to be seen. Yes her electronic signature is on the emails, but the first move in crisis management is to get out there and go on the front foot. Own the mistake.

They’ll no doubt offer something they think is a good deal, but they’ll get hammered in a class action lawsuit with firms no doubt drawing up a case as I type.

And be honest… tell what you knew and when.
 
This is what happens when you outsource to a third world country.

But even worse is Hudson is nowhere to be seen. Yes her electronic signature is on the emails, but the first move in crisis management is to get out there and go on the front foot. Own the mistake.

They’ll no doubt offer something they think is a good deal, but they’ll get hammered in a class action lawsuit with firms no doubt drawing up a case as I type.

And be honest… tell what you knew and when.
I think we need to drop the rhetoric about offshoring. This type of stuff can and has happened here in Australia and just about everywhere in the world.

The rest i agree with.

On an interesting note, i got another email (same as the 2nd one) today. Plus i noticed extra 2FA authentication requests a lot more on Qantas FF related stuff atm.
 
If it was Salesforce (Qantas use Salesforce extensively across the group but haven't confirmed if this was the system involved in this breach), you can configure trusted IP ranges which would go a long way towards preventing these kinds of attacks - so hopefully where available these types of controls are being used.

https://help.salesforce.com/s/articleView?id=platform.login_ip_ranges.htm&type=5
You're assuming they bothered to do so - I wouldn't be surprised if they tried then dropped it when it was found to be too resource heavy updating the whitelists as time went on.

The best implementation I've seen of a geoIP based security setup is what you can do with Microsoft Azure ID (now EntraID) where anyone outside the approved IP ranges are forced to use MFA.
 
This is what happens when you outsource to a third world country.

But even worse is Hudson is nowhere to be seen. Yes her electronic signature is on the emails, but the first move in crisis management is to get out there and go on the front foot. Own the mistake.

They’ll no doubt offer something they think is a good deal, but they’ll get hammered in a class action lawsuit with firms no doubt drawing up a case as I type.

And be honest… tell what you knew and when.
No it doesn’t. Third world countries can have strict security standards which are up to the commissioning company to check and enforce. Optus, Telstra, Banks in Australia have similarly been incompetent in their policy of security standards.
 
But still, in a country with lots of economics pressures, if you offered someone in the call centre $20k for access, would it be such a hard decision for that person - no judgement? This is the mechanism for most HUM-INT breaches anywhere.
 

Become an AFF member!

Join Australian Frequent Flyer (AFF) for free and unlock insider tips, exclusive deals, and global meetups with 65,000+ frequent flyers.

AFF members can also access our Frequent Flyer Training courses, and upgrade to Fast-track your way to expert traveller status and unlock even more exclusive discounts!

AFF forum abbreviations

Wondering about Y, J or any of the other abbreviations used on our forum?

Check out our guide to common AFF acronyms & abbreviations.

Currently Active Users

Back
Top