Cyber Security Blog

Qantas Data Breach: Scattered Spider Takes to the Skies?

Written by Guest Author | 3 July 2025

The infamous hacking collective Scattered Spider seems to have struck again—this time, targeting the aviation industry. In the latest breach, Qantas, Australia’s flagship airline, has confirmed a significant data breach linked to one of its third-party contact centers. While Qantas has not confirmed who may be behind the attack, cybersecurity experts are saying the attack has all the markings of Scattered Spider. 

The breach has exposed sensitive customer information, affecting potentially 6 million customers. This massive data compromise is raising alarms across the global aviation and cybersecurity communities.

In this blog, we uncover everything known so far about the Qantas Data Breach. We also take a critical look at Qantas’ response and what cybersecurity experts are saying about the attack and the airline’s Incident Response

6 Million Customer Records Allegedly Compromised in Qantas Data Breach

Qantas revealed on Monday, June 30, 2025 that it detected unusual activity on a third-party platform used by one of its contact centers. This platform stored service records for approximately 6 million customers. The airline confirmed that it now believes a “significant portion” of that data may have been accessed or stolen.

According to the airline, the compromised information includes:

  • Names

  • Email addresses

  • Phone numbers

  • Birth dates

  • Frequent flyer numbers

Importantly, Qantas has stated that no credit card details, financial information, or passport data was stored on the compromised system. In addition, frequent flyer accounts, passwords, PINs, and login credentials appear to remain untouched as per the airline’s statement

The exposed data, however, is more than enough to enable targetted phishing, social engineering, and identity theft attempts. These, as seen in earlier attacks, are a core tactic in Scattered Spider’s playbook.

Qantas’ Cyber Incident Response and Public Apology

Qantas CEO Vanessa Hudson offered a public apology to affected customers, acknowledging the stress and uncertainty this incident has caused. “Our customers trust us with their personal information and we take that responsibility seriously,” she said in a statement.

The airline has begun issuing generic notifications to potentially impacted individuals and has promised more detailed communication as the investigation progresses.

Here’s what Amar Singh, CEO of Cyber Management Alliance and a definitive voice in the global Cyber Incident Response space said on the airline’s response: “While no organisation today is immune to cyber crime, Qantas must be commended for its timely and coherent response. The statement issued by the Airline and its CEO is crisp, clear and meaningful. It acknowledges the predicament of the customer, while sharing accurate details on the damage and the actions taken. The offer of support, including specialist identity protection advice and resources, represents the most comprehensive assistance an organisation can provide amidst such a massive assault.”  

Scattered Spider’s Growing Focus on Aviation

While the investigation into the breach is still ongoing, several cybersecurity experts have attributed the attack to Scattered Spider, the highly sophisticated and brazen cybercrime group. Known for social engineering, MFA bypass techniques, and targeting high-value sectors, the group recently tore through the UK’s retail sector impacting giants like Marks and Spencer, Harrods, Co Op and Christian Dior. 

The U.S. government recently warned that the group was shifting its focus to the aviation industry. That prediction has proven accurate—with Hawaiian Airlines also being hit by a cyberattack in recent weeks that bears striking similarities to the Qantas breach.

“Organizations should be on high alert for sophisticated and targeted social engineering attacks and suspicious MFA reset requests,” said Sam Rubin, SVP of Consulting and Threat Intelligence, speaking to Cybersecurity Dive.

This breach isn’t just another headline. It’s part of a troubling trend that underscores how cybercriminals are escalating their attacks on global infrastructure. Airlines, due to their access to vast volumes of personally identifiable information and their operational dependencies, are becoming a prime target for adversaries.

Although Qantas acted quickly in notifying the Australian Cyber Security Centre and the Office of the Australian Information Commissioner, the incident serves as a warning to other airlines and critical service providers: your third-party vendors are your weakest link, and preparedness can no longer be optional.

Lessons for Businesses and the Aviation Sector

  • Vendor Risk Management is Critical: As the Qantas breach shows, even if your core systems are secure, third-party platforms can become the entry point for attackers. Third-party risk management has to be a top priority for businesses in 2025 as attackers are aggressively targeting vendors to compromise large organisations.

  • Limit PII Exposure: A critical lesson from all recent Scattered Spider attacks is that businesses must store only essential customer information with external vendors. It’s also imperative to enforce stringent data retention policies.

  • Boost Cybersecurity Awareness & Training: This one is non-negotiable. Customer support and IT staff must be empowered to recognise phishing, MFA fatigue attacks, and impersonation tactics. High-quality cybersecurity training is also a must for all employees so they too can identify and flag suspicious activity on the network.

  • Regular Cyber Tabletop Exercises: Cyber Drills are critical to keep your team abreast with Incident Response protocols. Cyber Tabletop Exercises clarify every team member’s roles and responsibilities in a cybersecurity event. They also allow rehearsal of Incident Response steps to build muscle memory and cut confusion in times of chaos. The Qantas data breach underlines the importance of simulating attacks involving third-party vendors and data exposure to sharpen incident response readiness.

  • Multi-Layered Authentication: The Qantas attack should be a wake-up call for all businesses to implement robust identity verification tools and advanced monitoring for suspicious activity. 

Final Thoughts

The Qantas data breach marks another chapter in Scattered Spider’s ongoing rampage, and it’s unlikely to be the last. For the global aviation sector and any business handling large volumes of customer data, this is a wake-up call.

Cyber resilience, employee training, and incident response planning must become cornerstones of enterprise strategy, especially in sectors where customer trust is everything.

If you have concerns over your organisation’s readiness to deal with the cyber crime storm raging in 2025, reach out to us today. Our NCSC Assured Training in Cyber Incident Planning and Response, professionally-conducted Cyber Drills and our expert Cybersecurity Consultancy services will put you on the path of cyber resilience with agility. Call us today to know more.