Qantas confirms data breach impacts 57 million customers

pUK to ban public sector orgs from paying ransomware gangsppRing denies breach after users report suspicious loginsppMicrosoft links Sharepoint ToolShell attacks to Chinese hackersppWindows 11 gets new Black Screen of Death auto recovery toolppLumma infostealer malware returns after law enforcement disruptionppWindows 11 KB5062660 update brings new Windows Resilience featuresppWindows 11 gets new Black Screen of Death auto recovery toolppBuild your career with 20 lifetime access to over a 1000 coursesppHow to access the Dark Web using the Tor BrowserppHow to enable Kernelmode Hardwareenforced Stack Protection in Windows 11ppHow to use the Windows Registry EditorppHow to backup and restore the Windows RegistryppHow to start Windows in Safe ModeppHow to remove a Trojan Virus Worm or other MalwareppHow to show hidden files in Windows 7ppHow to see hidden files in WindowsppRemove the Theonlinesearchcom Search RedirectppRemove the Smartwebfindercom Search RedirectppHow to remove the PBlock adware browser extensionppRemove the Toksearchesxyz Search RedirectppRemove Security Tool and SecurityTool Uninstall GuideppHow to Remove WinFixer Virtumonde Msevents TrojanvundoppHow to remove Antivirus 2009 Uninstall InstructionsppHow to remove Google Redirects or the TDSS TDL3 or Alureon rootkit using TDSSKillerppLocky Ransomware Information Help Guide and FAQppCryptoLocker Ransomware Information Guide and FAQppCryptorBit and HowDecrypt Information Guide and FAQppCryptoDefense and HowDecrypt Ransomware Information Guide and FAQppQualys BrowserCheckppSTOPDecrypterppAuroraDecrypterppFilesLockerDecrypterppAdwCleanerppComboFixppRKillppJunkware Removal ToolppeLearningppIT Certification CoursesppGear GadgetsppSecurityppBest VPNsppHow to change IP addressppAccess the dark web safelyppBest VPN for YouTubeppppAustralian airline Qantas has confirmed that 57 million people have been impacted by a recent data breach in which threat actors stole customers datappOn July 1st Qantas disclosed that it had detected a cyberattack the previous day on a thirdparty platform used by a Qantas airline contact centreppWhile the company did not share any further details BleepingComputer learned that the attack shared similarities with other attacks on the aviation industry linked to threat actors classified as Scattered SpiderppOn Monday Qantas warned that the threat actors had contacted them likely to begin extorting the company to prevent the release of the stolen datappIn a new update today Qantas has confirmed that the threat actors stole data for approximately 57 million customers with varying types of data exposed in the breachppQantas warns that these counts are based on unique email addresses and customers may have multiple accounts with different emailsppThe airline also continues to stress that no Qantas Frequent Flyer accounts passwords PINs and login details financial information or passport details were stolen in the attackppQantas says they are now contacting customers whose data was stolen and have implemented additional safeguards to protect customers datappOur absolute focus since the incident has been to understand what data has been compromised for each of the 57 million impacted customers and to share this with them as soon as possible said Qantas Group Chief Executive Officer Vanessa HudsonppFrom today we are reaching out to customers to notify them of the specific personal data fields that were held in the compromised system and offer advice on how they can access the necessary support servicesppSince the incident we have put in place a number of additional cyber security measures to further protect our customers data and are continuing to review what happenedppQantas recommends that customers be on the lookout for emails claiming to be from Qantas that may be attempts to steal further information ppThe attack on Qantas follows other recent attacks on the aviation industry including those on Hawaiian Airlines and WestJetppThe threat actors classified as Scattered Spider are utilizing social engineering attacks to breach corporate networks and systems stealing data and attempting to extort companies into paying a ransomppIn some attacks such as MS and Coop the threat actors attempted to deploy the DragonForce ransomware to encrypt devicesppContain emerging threats in real time before they impact your businessppLearn how cloud detection and response CDR gives security teams the edge they need in this practical nononsense guideppCoop confirms data of 65 million members stolen in cyberattackppQantas is being extorted in recent datatheft cyberattackppQantas discloses cyberattack amid Scattered Spider aviation breachesppOld ATT data leak repackaged to link SSNs DOBs to 49M phone numbersppCartier discloses data breach amid fashion brand cyberattacksppSince the incident we have put in place a number of additional cyber security measures to further protect our customers data and are continuing to review what happened
Why do these companies always seem to do this AFTER these attacks instead of before Or is it just me because Im not an IT pro
ppNot a member yet Register NowppMicrosoft SharePoint zeroday exploited in RCE attacks no patch availableppMicrosoft releases emergency patches for SharePoint RCE flaws exploited in attacksppHPE warns of hardcoded passwords in Aruba access pointsppOverdue a password healthcheck Audit your Active Directory for freeppWhy CISOs Are Replacing Legacy MFA With PhishingProof Biometric AuthenticationppStill exposing RDP to the internet Secure it instantly with TruGrid SecureRDPppCan you trust your extensions Discover Kois zerotrust approach to software securityppLearn about Scattered Spiders evolving TTPs and how to defend your organizationppTerms of Use Privacy Policy Ethics Statement Affiliate DisclosureppCopyright 2003 2025 Bleeping Computer LLC All Rights ReservedppNot a member yet Register NowppRead our posting guidelinese to learn what content is prohibitedp