Australia's Qantas says 6mln customer accounts accessed in cyber hack
The hacker targeted a call centre and gained access to a third-party customer service platform containing six million names, email addresses, phone numbers, birth dates and frequent flyer numbers, Qantas said in a statement on Wednesday.
The airline did not specify the location of the call centre or customers whose information was compromised. It said it learnt of the breach after detecting unusual activity on the platform and acted immediately to contain it.
"We are continuing to investigate the proportion of the data that has been stolen, though we expect it will be significant," Qantas said, reporting no impact on operations or safety.
Last week, the U.S. Federal Bureau of Investigation said cybercrime group Scattered Spider was targeting airlines and that Hawaiian Airlines and Canada's WestJet had already reported breaches. Qantas did not name any group.
"What makes this trend particularly alarming is its scale and coordination, with fresh reports that Qantas is the latest victim" of a hack, said Mark Thomas, Australia director of security services for cyber security firm Arctic Wolf.
Scattered Spider hackers are known to impersonate a company's tech staff to gain employee passwords and "it is plausible they are executing a similar playbook", Thomas said.
Charles Carmakal, chief technology officer of Alphabet-owned cybersecurity firm Mandiant, said it was too soon to say if Scattered Spider was responsible but "global airline organisations should be on high alert of social engineering attacks".
Qantas' share price was down 2.4% in afternoon trading against an overall market that was up 0.8%.
UNWELCOME ATTENTION
The breach is Australia's most high-profile since those of telecommunications network operator Optus and health insurance leader Medibank in 2022 prompted cyber resilience laws including mandatory reporting of compliance and incidents.
It brings unwelcome attention to Qantas which is trying to win public trust after actions during and after the COVID-19 pandemic saw it plunge on airline and brand league tables.
Qantas was found to have illegally sacked thousands of ground workers during the 2020 border closure while collecting government stimulus payments. It also admitted selling thousands of tickets for already-cancelled flights.
The airline drew the ire of opposition politicians who said it lobbied the federal government in 2022 to refuse a request from Qatar Airways to sell more flights. Qantas denied pressuring the government which eventually refused the request - a move the consumer regulator said hurt price competition.
Qantas CEO Vanessa Hudson has improved the airline's public standing since taking office in 2023, reputation measures showed.
"We recognise the uncertainty this will cause," Hudson said of the data breach. "Our customers trust us with their personal information and we take that responsibility seriously."
Qantas said it notified the Australian Cyber Security Centre, the Office of the Australian Information Commissioner and the Australian Federal Police.
ACSC declined to comment and AFP said only that it was aware of the incident. The OAIC was not immediately available for comment.
The airline said the hacker did not access frequent flyer accounts or customer passwords, PIN numbers or log in details.
(Reporting by Shivangi Lahiri in Bengaluru and Byron Kaye in Sydney; Editing by Rashmi Aich and Christopher Cushing)
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Tahawul Tech
6 hours ago
- Tahawul Tech
Kaspersky highlights biometric, signature risks with attempts up by 21.2% in UAE
Kaspersky has detected and blocked over 142 million phishing link clicks globally in Q2 2025, the UAE saw a 21.2% increase from Q1 in phishing attempts. Currently phishing is going through a shift driven by sophisticated AI-powered deception techniques and innovative evasion methods. Cybercriminals are exploiting deepfakes, voice cloning and trusted platforms like Telegram and Google Translate to steal sensitive data, including biometrics, electronic signatures and handwritten signatures, posing unprecedented risks to individuals and businesses. AI-powered tactics transforming phishing attacks AI has elevated phishing into a highly personalized threat. Large language models enable attackers to craft convincing emails, messages and websites that mimic legitimate sources, eliminating grammatical errors that once exposed scams. AI-driven bots on social media and messaging apps impersonate real users, engaging victims in prolonged conversations to build trust. These bots often fuel romantic or investment scams, luring victims into fake opportunities with AI-generated audio messages or deepfake videos. Attackers also create realistic audio and video deepfake impersonations of trusted figures — colleagues, celebrities or even bank officials — to promote fake giveaways or extract sensitive information. For instance, automated calls mimicking bank security teams use AI-generated voices to trick users into sharing two-factor authentication (2FA) codes, enabling account access or fraudulent transactions. Additionally, AI-powered tools analyze public data from social media or corporate websites to launch targeted attacks, such as HR-themed emails or fake calls referencing personal details. Employing new tactics to bypass detection Phishers are deploying sophisticated methods to gain trust, exploiting legitimate services to prolong their campaigns. For instance, Telegram's Telegraph platform, a tool to publish long texts, is used to host phishing content. Google Translate's page translation feature generates links that look like and are used by attackers to bypass security solutions' filters. Attackers now also integrate CAPTCHA, a common anti-bot mechanism, into phishing sites before directing users to the malicious page itself. By using CAPTCHA, these fraudulent pages deflect anti-phishing algorithms, as the presence of CAPTCHA is often associated with trusted platforms, lowering the likelihood of detection. A switch in hunting: from logins and passwords to biometrics and signatures The focus has shifted from passwords to immutable data. Attackers target biometric data through fraudulent sites that request smartphone camera access under pretexts like account verification, capturing facial or other biometric identifiers that cannot be changed. These are used for unauthorized access to sensitive accounts or sold on the dark web. Similarly, electronic and handwritten signatures, critical for legal and financial transactions, are stolen via phishing campaigns impersonating platforms like DocuSign or prompting users to upload signatures to fraudulent sites, posing significant reputational and financial risks to businesses. 'The convergence of AI and evasive tactics has turned phishing into a near-native mimic of legitimate communication, challenging even the most vigilant users. Attackers are no longer satisfied with stealing passwords — they're targeting biometric data, electronic and handwritten signatures, potentially creating devastating, long-term consequences. By exploiting trusted platforms like Telegram and Google Translate, and co-opting tools like CAPTCHA, attackers are outpacing traditional defenses. Users must stay increasingly skeptical and proactive to avoid falling victim,' said Olga Altukhova, security expert at Kaspersky. Earlier in 2025 Kaspersky detected a sophisticated targeted phishing campaign which was dubbed Operation ForumTroll, as attackers sent personalized phishing emails inviting recipients to the 'Primakov Readings' forum. These lures targeted media outlets, educational institutions and government organizations in Russia. After clicking on the link in the email, no additional action was needed to compromise their systems: the exploit leveraged a previously unknown vulnerability in the latest version of Google Chrome. The malicious links were extremely short-lived to evade detection and in most cases ultimately redirected to the legitimate website for 'Primakov Readings' once the exploit was taken down. To be protected from phishing, Kaspersky recommends: Verify unsolicited messages, calls, or links, even if they appear legitimate. Never share 2FA codes. Scrutinize videos for unnatural movements or overly generous offers, which may indicate deepfakes. Deny camera access requests from unverified sites and avoid uploading signatures to unknown platforms. Limit sharing sensitive details online, such as document photos or sensitive work information. Use Kaspersky Next (in corporate environments) or Kaspersky Premium (for individual use) to block phishing attempts.


Zawya
12 hours ago
- Zawya
Trend Micro Launches Agentic SIEM to Herald New Era of Proactive Security
AI-based offering will help make alert overload a thing of the past for SecOps teams HONG KONG SAR - Media OutReach Newswire - 15 August 2025 - Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, today announced new agentic AI technology designed to solve the traditional pain points associated with Security Information and Event Management (SIEM). When combined with Trend's digital twin capabilities it will help to transform security operations by proactively mitigating security risks. To learn more about Trend Micro's Agentic SIEM technology, please visit: Dave Gruber, Principal Cybersecurity Analyst at ESG:"As the cybersecurity stack increasingly becomes AI driven, the security data layer must evolve to support data-hungry agentic capabilities, including infusing agentic AI into core SIEM functions. Trend Vision One Agentic SIEM enters the SIEM market at a pivotal time, leveraging Agentic AI from the ground up to drive speed, performance, and a new level of risk-driven, contextual insights to rapidly mitigate cyber threat activity." SIEM technology has been around for decades, but users face longstanding issues including cost, complexity, alert overload, and passive data lakes. In addition, traditional SIEMs rely on manual configuration and static parsers, which can't keep up with the pace or variety of modern data sources. Trend's Agentic SIEM was built from the ground up to address these challenges, leveraging the next generation of AI technology to proactively think, learn, and act. Acting independently, it cuts through alert noise, reducing workloads for overburdened security teams. What used to take weeks of setup is now automated by Agentic AI — it learns, maps, and optimizes data as it goes. Customers using Trend's agentic SIEM will improve their security and efficiency with: 900+ data sources supported since launch on August 1 to improve visibility, context and threat detection Three-day onboarding for new log types—with reduction to three hours by 2026—to reduce the risk of the unknown in enterprise environments Trend's proven XDR capabilities, with six native security sensors across endpoint, cloud, email, networks, servers, and identity. Agentic SIEM brings in third-party telemetry to provide a full view of the environment. Up to seven years of archival data retention and two years of analytic retention for enhanced detection, threat hunting, and compliance support. Rachel Jin, Chief Enterprise Platform Officer at Trend: "Agentic SIEM is a major stepping stone to our long-term vision for full, AI-driven SecOps. It's a future in which security teams will have more time to work on strategic tasks, safe in the knowledge that our agentic AI has their backs. With this launch, Trend is once again laying down a marker for cybersecurity innovation and global market leadership." Agentic SIEM has the potential to supercharge SIEM across a variety of use cases: Threat Detection and Response: Replaces manual log and alert monitoring with autonomous data analysis, anomaly detection and response—reducing time to detect and mitigate threats. Compliance Support: Combines extended data retention with the ability to search archival logs—meeting audit and regulatory requirements with ease. Incident Investigation: Replaces manual, time-consuming and error-prone investigations with automated data correlation from multiple sources, to accelerate the process and enhance accuracy. The potential to combine Agentic SIEM with Trend's latest digital twin technology is a revolutionary opportunity for customers. Doing so enables proactive mitigation of security risks impacting these virtual models—surfacing intelligence to enhance resilience, compliance, and competitive advantages. This presents major opportunities in highly sensitive use cases including healthcare, supply chain security, predictive maintenance, and smart building management. Hashtag: #trendmicro #trendvisionone #visionone #cybersecurity #AgenticSIEM #SIEM #AISecurity #Nvidia The issuer is solely responsible for the content of this announcement. About Trend Micro Trend Micro, a global cybersecurity leader, helps make the world safe for exchanging digital information. Fueled by decades of security expertise, global threat research, and continuous innovation, Trend Micro's AI-powered cybersecurity platform protects hundreds of thousands of organizations and millions of individuals across clouds, networks, devices, and endpoints. As a leader in cloud and enterprise cybersecurity, Trend's platform delivers a powerful range of advanced threat defense techniques optimized for environments like AWS, Microsoft, and Google, and central visibility for better, faster detection and response. With 7,000 employees across 70 countries, Trend Micro enables organizations to simplify and secure their connected world. Trend Micro


Tahawul Tech
12 hours ago
- Tahawul Tech
Australian court calls out Apple and Google misuse of market power
An Australian federal court has ruled that Apple and Google previously misused their market power by limiting the use of alternative app distribution and payment methods in their app stores, handing a major victory to Epic Games. In a post on X, Epic, the creator of Fortnite which filed cases back in 2020 and 2021, said the court found Apple and Google 'abuse their control over app distribution and in-app payments to limit competition'. The company added this 'is a win for developers and consumers in Australia'. In a summary of the ruling, law firm Gilbert and Tobin explained the court found the companies' practices, dating back to 2017, breached the country's competition and consumer act, adding Apple and Google had caused developers to pay materially higher commissions. The law company noted the decision is the first contested case of the country's new misuse of market power law introduced in 2017 and 'grapples with the issues of walled gardens'. In the case of the app distribution and in-app payment markets, the court ruled both companies engaged in conduct that had 'the purpose, effect or likely effect' of substantially lessening competition. The court, however, did not accept Epic's other anti-competitive claims covering exclusive dealings, anti-competitive agreements or unconscionable conduct allegations by Apple and Google in the OS licensing market to OEMs. The companies have 28 days to appeal the decision. Source: Mobile World Live Image Credit: Stock Image