Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      The AI productivity paradox in software engineering: Balancing efficiency and human skill retention

      July 2, 2025

      The impact of gray work on software development

      July 2, 2025

      CSS Intelligence: Speculating On The Future Of A Smarter Language

      July 2, 2025

      Hallucinated code, real threat: How slopsquatting targets AI-assisted development

      July 1, 2025

      Xbox is cancelling Rare’s ‘Everwild’ and ZeniMax’s new MMORPG IP as part of broader cuts — with ‘Perfect Dark’ impacted as well

      July 2, 2025

      Microsoft is closing down Xbox studio The Initiative, with Perfect Dark killed as well — joining Everwild and ZeniMax’s new IP, and other unannounced projects

      July 2, 2025

      No, Microsoft and Xbox’s Phil Spencer isn’t stepping down any time soon — here’s the truth

      July 2, 2025

      Everwild’s cancellation has me worried for one of my favorite dev teams and Xbox itself — It needs creative new games to thrive and refresh its identity

      July 2, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Trust but Verify: The Curious Case of AI Hallucinations

      July 2, 2025
      Recent

      Trust but Verify: The Curious Case of AI Hallucinations

      July 2, 2025

      From Flow to Fabric: Connecting Power Automate to Microsoft Fabric

      July 2, 2025

      Flutter Web Hot Reload Has Landed – No More Refreshes!

      July 2, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Xbox is cancelling Rare’s ‘Everwild’ and ZeniMax’s new MMORPG IP as part of broader cuts — with ‘Perfect Dark’ impacted as well

      July 2, 2025
      Recent

      Xbox is cancelling Rare’s ‘Everwild’ and ZeniMax’s new MMORPG IP as part of broader cuts — with ‘Perfect Dark’ impacted as well

      July 2, 2025

      Microsoft is closing down Xbox studio The Initiative, with Perfect Dark killed as well — joining Everwild and ZeniMax’s new IP, and other unannounced projects

      July 2, 2025

      No, Microsoft and Xbox’s Phil Spencer isn’t stepping down any time soon — here’s the truth

      July 2, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Australia’s Qantas Confirms Cyberattack: 6 Million Service Records Compromised

    Australia’s Qantas Confirms Cyberattack: 6 Million Service Records Compromised

    July 2, 2025

    Qantas Cyberattack

    Australia’s national carrier, Qantas Airways Limited, has revealed a cybersecurity incident. The Qantas cyberattack was traced to unauthorized access through a third-party customer service platform used by one of the airline’s contact centers. While the airline assured the public that flight operations and safety were unaffected, it confirmed that personal information of potentially millions of customers had been compromised. 

    In a public statement, Qantas explained, “Qantas can confirm that a cyber incident has occurred in one of its contact centres, impacting customer data. The system is now contained.” The breach, described as criminal in nature, involved the targeting of a third-party system that stored service records for approximately six million customers. 

    Decoding the Qantas Cyberattack 

    According to the press release, Qantas experienced unusual activity on the third-party platform. The airline responded quickly by isolating the system to prevent further access. While the airline emphasized that its internal systems remain secure, the Qantas cyberattack did expose a wide range of customer details. 

    An initial internal review confirmed that names, email addresses, phone numbers, birth dates, and frequent flyer numbers were accessed. However, Qantas reassured customers that more sensitive information, such as credit card numbers, bank details, passwords, PINs, and passport information, was not stored on the compromised platform. 

    Qantas stated, “There is no impact to Qantas’ operations or the safety of the airline.” The airline has since ramped up security protocols, including additional restrictions on system access and heightened monitoring to detect and respond to any further threats. 

    A Qantas spokesperson provided further details about the incident in a statement to The Cyber Express, explaining, “The cybercriminal gained access to the system on Saturday following an interaction with a call centre operator. Our teams identified and contained the threat on Monday morning, and the system was subsequently secured. No frequent flyer accounts were compromised nor have passwords, PIN numbers or log in details been accessed.” 

    Immediate Response and Ongoing Investigation 

    Following the Qantas cyberattack, the airline has taken several security measures. Notifications have been sent to affected customers, along with an apology and details of available support. Qantas also set up a dedicated helpline for identity protection assistance. Concerned customers can call 1800 971 541 or +61 2 8028 0534, where they’ll receive guidance from specialists. 

    The airline has formally notified the Australian Cyber Security Centre, the Office of the Australian Information Commissioner, and the Australian Federal Police. Qantas is also working closely with the Federal Government’s National Cyber Security Coordinator and independent cybersecurity experts to investigate the breach and prevent similar incidents in the future. 

    Vanessa Hudson, Qantas Group CEO, addressed the incident in a statement: “We sincerely apologise to our customers and we recognise the uncertainty this will cause. Our customers trust us with their personal information and we take that responsibility seriously.” 

    She added, “We are contacting our customers today and our focus is on providing them with the necessary support. We are working closely with the Federal Government’s National Cyber Security Coordinator, the Australian Cyber Security Centre and independent specialised cyber security experts.” 

    Customer Guidance and Next Steps 

    While the investigation is ongoing, Qantas advises that customers with upcoming travel do not need to take any action. Flight details remain accessible through the Qantas website and mobile app. However, affected individuals are encouraged to stay vigilant, monitor for suspicious activity, and contact Qantas support if they have concerns. 

    Darren Argyle, former Group CISO at Qantas, addressed the recent Qantas cyberattack in a LinkedIn post, emphasizing the airline’s unwavering commitment to customer security.

    He acknowledged the intense pressure on Qantas’ security teams, noting, “I know how hard these teams work behind the scenes, often under immense pressure when incidents occur.”  

    Argyle also suggested the Qantas cyberattack might be linked to the notorious Scattered Spider group, known for targeting cloud-based services through social engineering attacks. He encouraged customers to stay informed through official channels and be cautious of any unexpected messages related to the incident. 

    This is an ongoing story, and The Cyber Express will be closely monitoring the situation. We will update this story once we have more information on the Qantas cyberattack or any further details from the airline. 

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCybersecurity Must Lead, Not Lag, ASEAN’s Digital Transformation
    Next Article Vercel’s v0 AI Tool Weaponized by Cybercriminals to Rapidly Create Fake Login Pages at Scale

    Related Posts

    Security

    Actively Exploited Google Chrome Zero-Day (CVE-2025-6554) Added to CISA’s KEV Catalog, PoC Available

    July 3, 2025
    Security

    CVE-2025-20309 affects Cisco Unified CM

    July 3, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    The latest trailer for this highly anticipated indie heading to Xbox Game Pass teaches us how to be a good shopkeeper (while dropping a hot new release window)

    The latest trailer for this highly anticipated indie heading to Xbox Game Pass teaches us how to be a good shopkeeper (while dropping a hot new release window)

    News & Updates

    CVE-2025-47898 – Apache HTTP Server Authentication Bypass

    Common Vulnerabilities and Exposures (CVEs)

    Samsung launches One UI 8 beta – what’s new and how to join

    News & Updates

    Polar adds personalized fitness subscription to its smartwatch app, like Garmin’s

    News & Updates

    Highlights

    CVE-2025-53415 – Delta Electronics DTM Soft Project File Parsing Remote Code Execution Vulnerability

    June 30, 2025

    CVE ID : CVE-2025-53415

    Published : June 30, 2025, 9:15 a.m. | 46 minutes ago

    Description : Delta Electronics DTM Soft Project File Parsing Deserialization of Untrusted Data Remote Code Execution

    Severity: 7.8 | HIGH

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    CVE-2025-5245 – GNU Binutils Debug Type Samep Memory Corruption Vulnerability

    May 27, 2025

    A Customer-Centric Shoptalk Spring 2025

    April 3, 2025

    CVE-2025-45236 – DBSyncer Stored XSS Vulnerability

    May 5, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.