Qantas Customer Data Posted to Dark Web After Ransom Deadline

Simple briefing on what was posted, what officials said, and what you can do now.

📍 Australia 🕒 Updated: Oct 12, 2025
Qantas aircraft tails on the tarmac, red kangaroo livery visible
Image: Qantas aircraft tails.

Brief Context

The personal data of approximately 5.7 million Qantas customers was exposed in a July 2025 incident involving a third‑party platform. Qantas states there is no impact to Frequent Flyer accounts and no passwords or financial details were accessed (Qantas newsroom; customer support page).

After a ransom deadline set by a cybercrime collective, reports indicated that Qantas‑related data appeared on dark web channels. A public update thread is archived on X.

Quick Facts What was reported

Reportedly exposed~5.7–6 million customer records
GroupScattered Lapsus$ Hunters
Window of targetingApr 2024 – Sep 2025 (per claims)
Deadline citedOct 11, 11:59pm New York → ~3pm AEDT (Oct 12)
Data types notedNames, emails, phone, birth dates, addresses, gender, frequent flyer #s, points, status tiers
Financial infoPasswords, PINs, credit cards, IDs: stated as not accessed
Qantas statement (site): “No impact to frequent flyer accounts and no personal financial details compromised.”
Salesforce statement (Oct 2): No indication the platform was compromised; extortion attempts under investigation.

Incident Timeline (Interactive)

July 2025: Cyber attack on a third‑party platform used by Qantas; customer records exposed.
Oct 2, 2025: Salesforce notes extortion attempts; says its platform shows no compromise.
Oct 10–11, 2025: Ransom deadline around 11:59pm New York time.
Oct 12, 2025: Reports indicate Qantas‑related data posted to dark web; a BreachForums domain seizure banner also appeared.

What You Can Do Now

  • Be alert to emails/SMS/calls that use your name, phone, address, or frequent flyer info to gain trust.
  • Access Qantas updates and support: qantas.com
  • Qantas 24/7 support line: 1800 971 541 (AU) or +61 2 8028 0534 (intl).
  • Enable two‑step authentication on accounts where available.
Guidance in the supplied material suggests careful verification of any unexpected contact. When unsure, go directly to official websites via your own browser tabs.

60‑Second Phishing Check

1) A message says it’s from Qantas and knows your address. It links to a login form. Best next step?
Open a separate tab and navigate to official sites directly.
2) A caller quotes your frequent flyer digits and asks for your one‑time code. What now?
Codes should never be shared. Call published support numbers yourself.
3) An email urges urgent points redemption to avoid loss. It’s from an unfamiliar domain. Action?
Report and visit the site independently via trusted navigation.

Statements Referenced

  • Qantas website statement on frequent flyer accounts and financial details.
  • Salesforce statement dated Oct 2, 2025 referencing extortion attempts and no platform compromise.
  • Public posts/claims attributed to Scattered Lapsus$ Hunters regarding deadlines and releases.

Public post link referenced: Update thread on X.

This section covered the reported posting of Qantas customer data, the statements cited, a brief timeline, and practical steps for readers.
Karmactive Whatsapp group - https://www.whatsapp.com/channel/0029Vb2BWGn77qVMKpqBxg3D

Leave a Reply

Your email address will not be published.

Aerial view of a narrow Tuvalu atoll surrounded by shallow turquoise ocean.
Previous Story

Tuvalu sea-level threat: “We don’t want to disappear” as only one in six adaptation dollars arrives

Latest from Australia

Don't Miss