
Major change for Qantas Frequent Flyer Points program with millions of customers affected
In the first major change to the popular program since 2019, Qantas has increased the number of points required for most reward seats, including a 15 per cent to 20 per cent increase in business and first-class redemptions.
For domestic flights, the airline has increased the number of points by 5 per cent. Qantas is also increasing fees and surcharges, in a second blow after the points devaluation.
A Sydney to Melbourne business class seat will jump from 18,400 points and $55, to 19,300 points, plus $76.
Meanwhile, a Sydney to London economy class seat will go from 55,200 points and $263, to 63,000 points plus $263.
The changes will take effect on August 5.
The good news for customers is that Qantas will release up to one million more Classic Rewards seats, through deals with Hawaiian Airlines, Finnair, Air France, KLM and Iberia.
Meanwhile, Jetstar will now offer Reward seats starting from just 5700 points.
The route will be from Sydney to the Gold Coast which was 6400 points and $35, to now 5700 points and $35.
Qantas also says passengers can earn up to 25 per cent more points on domestic flights and the removal of the earn cap from tiered members travelling in premium cabins.
For example, for a Platinum member flying business class from Sydney to Melbourne previously earned 2000 points, now they will earn 3500 points.
Qantas Loyalty CEO Andrew Glance said: 'These adjustments will ensure we can continue to invest in enhancing the program for the long term and continue to grow the levels of Classic and Classic Plus Reward seat availability for members year on year.'
The points change comes after the Qantas hack occurred last month.
The national carrier said cyber criminals had targeted a call centre and gained access to a third-party customer servicing platform. Personal details, including Qantas Frequent Flyer details, were obtained.
'We then took immediate steps and contained the system. We can confirm all Qantas systems remain secure,' the airline said.
'There are six million customers that have service records in this platform.
'We are continuing to investigate the proportion of the data that has been stolen, though we expect it will be significant.
'An initial review has confirmed the data includes some customers' names, email addresses, phone numbers, birth dates and frequent flyer numbers.'
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles

AU Financial Review
8 hours ago
- AU Financial Review
Qantas puts bigger planes on flights to Trump's America
Qantas is adding seats on flights to and from the United States to meet growing demand from American travellers, defying the downturn plaguing travel agents who say that Donald Trump's immigration policies are deterring visitors to the US. The Australian carrier has reinstated an Airbus A380 service from Sydney to Dallas/Fort Worth and said it would fly daily – instead of five times a week – between Sydney and New York via Auckland in time for the FIFA World Cup, which the US is co-hosting in June next year.

Sydney Morning Herald
9 hours ago
- Sydney Morning Herald
Cyber criminals threaten to leak Qantas customer database
The group responsible for the Qantas data breach in June that exposed the details of 5.7 million customers has threatened to leak the entire trove of stolen data unless it can find a buyer willing to pay $1 million. A message on an encrypted messaging app, also posted to the 'Dark Web', is warning that the data will be leaked 'starting with [judges and officers]' unless a buyer pays $1 million first. 'If you are interested in buying the Qantas database, then contact us ... otherwise we will leak the entire database starting with … judges and officers first,' the message reads. 'Payment is required before data is published, overall!' Qantas said the recent cyber threats were related to the June data breach and that it believes the same cyber criminal group has been posting threats against multiple companies. Two weeks after the data theft, Qantas sought and received an injunction from the NSW Supreme Court to 'prevent the stolen data from being accessed, viewed, released, used, transmitted or published by anyone, including by any third parties'. At the time, the company said it wanted 'to do all we can to protect our customers' personal information and believe this was an important next course of action'. Since the June data breach of Qantas, some cybersecurity researchers have come to believe a second, but a related criminal group may be involved. The groups are highly fluid, share infrastructure and often impersonate each other which can make attribution difficult.

The Age
9 hours ago
- The Age
Cyber criminals threaten to leak Qantas customer database
The group responsible for the Qantas data breach in June that exposed the details of 5.7 million customers has threatened to leak the entire trove of stolen data unless it can find a buyer willing to pay $1 million. A message on an encrypted messaging app, also posted to the 'Dark Web', is warning that the data will be leaked 'starting with [judges and officers]' unless a buyer pays $1 million first. 'If you are interested in buying the Qantas database, then contact us ... otherwise we will leak the entire database starting with … judges and officers first,' the message reads. 'Payment is required before data is published, overall!' Qantas said the recent cyber threats were related to the June data breach and that it believes the same cyber criminal group has been posting threats against multiple companies. Two weeks after the data theft, Qantas sought and received an injunction from the NSW Supreme Court to 'prevent the stolen data from being accessed, viewed, released, used, transmitted or published by anyone, including by any third parties'. At the time, the company said it wanted 'to do all we can to protect our customers' personal information and believe this was an important next course of action'. Since the June data breach of Qantas, some cybersecurity researchers have come to believe a second, but a related criminal group may be involved. The groups are highly fluid, share infrastructure and often impersonate each other which can make attribution difficult.