Blog

Qantas Cyber Incident: A Wake-Up Call for All

Bindya Bandare
July 16, 2025
Home

Let's Get STARTED

On the 2nd of July Qantas reported a data breach potentially resulting in the exposure of up to 6 million customer records occurred. The organisation detected malicious activity on an external system at one of its contact centres. Qantas reports they contained the presence of any malicious actors on their system. Importantly, it should be noted that response efforts to this incident are ongoing and Qantas continues to provide timely updates as they discover further information.

The recent events with Qantas is a reminder that no organisation is immune to a breach; which is why risk management must always be front and centre.

To the Qantas security and IR teams, we commend you for your quick, transparent handling of the situation, as it’s never easy being in the spotlight during times like these.

In our latest blog, we explore what we know, how it’s being handled, and the proactive steps organisations can take to reduce the impact when (not if) something goes wrong

Quick Facts & What We Know

What data was exposed?

On the 9th of July, Qantas confirmed the scale of the breach affected 5.7 million customer records, of which 4 million records included only name, email addresses, and loyalty program identifiers.

The remaining 1.7 million customer records reportedly contained sensitive customer information ranging from addresses (including residential and business addresses), dates of birth, contact numbers, gender, and meal preferences.

Qantas continues to communicate that the breach did not result in the exposure of any sensitive customer financial information such as credit card details or any identifiable passport details. It should be noted that post-incident communications to date are aligned with better practice standards.

How did it occur?

Qantas reported the breach occurred due to an attack on one its call centres. The threat actor had been able to access a third-party Software as a Service (SaaS) solution storing sensitive customer data. Qantas is yet to identify the specific attack vector exploited by the malicious actor; however, reports suggest that a phishing attack on a call centre operator had allowed the actors to obtain unauthorised access to Qantas’ tenancy on Salesforce. The duration and extent of the attackers’ presence within Qantas systems is yet to be confirmed.

Handling The Aftermath

As an active and ongoing incident, the scale and full extent of the ramifications of this incident are yet to be known. To date Qantas has confirmed the incident resulted in the exfiltration of sensitive customer data. In efforts to mitigate the impact of this incident Qantas has demonstrated strong incident response efforts with responses involving:

  • Containment and Investigation Actions: Qantas has implemented containment and triage activities to isolate the breach. Qantas has reportedly engaged incident response experts to assist and provide guidance during the incident response processes.
  • Customer Communication: Once Qantas had been successful in containing the breach and had insight into the extent of unauthorised access, they had initiated communications with stakeholders including their customers. Communications had initially been made to all affected customers regarding the potential unauthorised disclosure of their data. At a later date, once Qantas had been able to explicitly identify the information that had been disclosed, communications had been sent to affected persons with specific details about the data that had been disclosed during the breach event. It was also reported that Qantas had prioritised contact with affected individuals considered high-risk.  
  • Enhanced Security & Collaboration with Key Stakeholders: Qantas reported implementing stringent security controls to enhance the security of their systems to prevent further exploitation. Additionally, Qantas has initiated communications with the ACSC, the OAIC, and the AFP.

Putting your best foot forward

A data breach of this extent has the capability to cripple an organisation due to potential regulatory, financial, and reputational ramifications. A strong incident response framework is therefore crucial to navigating through these rough waters to enable the containment and mitigation of any negative outcomes of a cyber-attack affecting the confidentiality, integrity, and availability of information.

The Office of the Australian Information Commissioner in 2024, received a total of 1,113 data breach notifications, noting a 25% increase from 2023. Given these statistics such events are unfortunately not uncommon, underscoring the need to integrate security into the design and operation of businesses.

Risk-Based Approach

Security starts by identifying what matters most to your business and implementing measures to protect assets based on their importance. The goal is never the elimination of risk in its totality but rather the mitigation of it based on the importance of the asset to the organisation, This priority is determined through a Business Impact Analysis (BIA) and aligned with a company’s risk appetite. By assessing the opportunity cost of security controls, businesses can make more informed decisions. A risk-based approach ensures assets are protected at concomitant to the risk; minimising obstacles to efficiency and maximising cost-effectiveness.

Zero Trust Architecture

Once your crown jewels have been identified, a layered security approach should be implemented. Organisations should start by designing systems with strong verification controls, based on the principle of least privilege and an assume breach mentality. Essentially, assume a breach could happen at any time. This means limiting cross-functional access and using segmentation to minimise potential damage (including third party suppliers and services). When granting user access, organisations should enforce the least privilege principle and once access is granted continuously verify what users can do through continuous authentication and authorisation checks and validation efforts.

Third Party Management Frameworks

Implementing a robust security system internally does not automatically guarantee security across the organisation. In today’s interconnected world, service providers consistently rely on each other for support, making it vital to ensure that their security measures align with your own. A third-party management framework comprising measures to assess the security posture of service providers prior to, during, and even after their engagement is crucial to building a secure information management system.

Fostering a Culture of Cyber Awareness

Employees are often the primary targets of malicious actors, making them the first line of defence for any business. Since staff members are provisioned access to sensitive data, they hold a level of trust that requires protection. To defend against increasingly sophisticated attacks like phishing and social engineering, it's essential that employees are equipped with the knowledge and skills to recognise and respond to these threats. Training employees on best practices such as phishing awareness should therefore be a key priority for any organisation.

Strong Incident Response Frameworks

The best security systems in the world are all susceptible to vulnerabilities and exploitation. Strong incident response processes are therefore key to ensuring containment and mitigation of incidents, as demonstrated by Qantas during their most recent breach. It's clear, however that it is not enough to have a set plan in place. These plans need to be regularly tested, and incident response teams should be trained frequently to execute them effectively when an attack occurs. Practice makes perfect. You don’t want to be trialling critical response activities and plans for the first time. It’s likely there are many creases you may wish to iron out; something achieved through effective testing of your response plans, including having clarity on triggers for when to invoke Business Continuity and Disaster Recovery plans during an incident.

Incident Response Plan (IRP) Testing can be performed by organisations through a wide range of activities, including but not limited to:
  • Tabletop Exercises: These exercises are a popular and widely used methodology to validate the efficiency and capability of the Incident Response Team (IRT) to effectively implement a documented IRP to enable the mitigation of an incident. It typically involves a simulation of a scenario impacting the organisation and requires the involvement of the IRT.  These exercises may in some cases take the form of “technical drills” whereby the organisation’s technical security controls may be challenged, and IT resources would need to be involved to implement controls for containment. On the other hand, the exercises may be strategic requiring the involvement of key decision makers within the organisation in an effort to pre-emptively contain reputational and regulatory impacts by preparing stakeholders to make difficult decisions during a crisis.
  • Crisis and Incident Simulations: Going beyond tabletop exercises, companies can improve their team’s muscle memory through completing realistic scenarios and simulate incidents that identify and test security controls specific to the organisational context, industry and technologies in place.
  • Red Teaming: This is another methodology to validate the efficacy of an IRP and involves the execution of un-announced simulated attacks through objective based testing, and in most cases involve physical tests to determine whether access to secure facilities is possible. Red teaming requires testers to challenge technical controls as well as organisational plans, policies and assumptions. These activities can simultaneously evaluate the organisation’s technical and strategic incident response capabilities.

References

Official Communications/Statements made by Qantas:

Opinions from Affected Persons:

Updates about the incident: