Company Details
qantas
17,358
603,826
481
qantas.com
0
QAN_1344183
In-progress

Qantas Company CyberSecurity Posture
qantas.comWe would like to acknowledge the Traditional Custodians of the local lands and waterways on which we live, work and fly. We pay our respects to Elders past and present. Spirit is everything to us, and joining the Qantas team means bringing your spirit to ours. We have over 26,000 exceptional employees, and every year we fly millions of customers around Australia and the world – together. If you hop on board with the team, you'll experience a workplace where creativity, diversity and innovation are encouraged. We aim to give every member of the Qantas Group the support to follow their dreams, face new challenges, and let their future take flight. Ultimately, people are our priority – those who work for us and those who travel with us. For the latest information on the cyber incident: https://bit.ly/3I7jNfM Member of the oneworld Alliance. Please read the Qantas LinkedIn House Rules at http://bit.ly/QFhouserules
Company Details
qantas
17,358
603,826
481
qantas.com
0
QAN_1344183
In-progress
Between 0 and 549

Qantas Global Score (TPRM)XXXX

Description: Qantas Airways, Australia’s national carrier, suffered a major cyberattack in early July 2024, where hackers breached a third-party platform (Salesforce) used by its customer contact center. The attack resulted in the theft of sensitive customer data, including **names, email addresses, phone numbers, birthdays, home/business addresses, gender, and meal preferences**—affecting **5.7 million customers**. While no financial data (credit cards, passports) was compromised, the leaked information was later **shared online and held for ransom** by cybercriminals linked to the **Scattered Lapsus$ Hunters** group. The breach occurred via **social engineering**, with hackers impersonating IT staff to trick employees into granting access. Qantas obtained a legal injunction to block further data dissemination, though experts dismissed its effectiveness. The incident is part of a broader attack targeting multiple global firms (Disney, Google, Toyota, etc.) via Salesforce, with hackers demanding ransom by an **October 10 deadline**. This follows prior Qantas cybersecurity failures, including a 2023 app glitch exposing passenger details and a 2022 ransomware attack on Australian ports operator DP World.
Description: Hackers linked to the group *Scattered Lapsus$ Hunters* breached Qantas’ third-party **Salesforce environment** in mid-2025, exfiltrating and leaking **personal data of 5–5.7 million customers** (part of a broader 1-billion-record haul) on the dark web after a ransom deadline expired. The exposed data included **names, email addresses, phone numbers, dates of birth, and frequent-flyer numbers**, though **payment and passport details remained secure**. The attack exploited **social engineering and credential abuse** via integrated third-party connections rather than a direct Salesforce breach. While Qantas obtained an injunction to limit dissemination and enhanced monitoring, the leak heightens risks of **phishing, account takeovers, and reputational damage**, with regulators scrutinizing vendor controls under Australia’s stricter post-Optus data protection laws. The airline faces **increased customer-service costs, identity-protection expenses, and potential penalties**, alongside eroded passenger trust and commercial impacts like reduced frequent-flyer engagement. Strategic responses include **credential resets, scam-awareness campaigns, and tighter supplier access controls**, though long-term reputational recovery remains uncertain.
Description: Qantas, Australia’s flagship airline, recently fell victim to a significant cybersecurity breach resulting in the exposure of sensitive customer data on the dark web. The incident impacted up to **5.7 million customers**, with compromised information potentially including personal details such as names, contact information, passport numbers, and frequent flyer data. While Qantas confirmed the breach, the exact method of infiltration—whether through a targeted cyber attack, exploitation of a vulnerability, or an insider threat—remains undisclosed. The exposure of such a vast dataset poses severe risks, including identity theft, phishing scams, and financial fraud for affected individuals.The breach has already triggered reputational damage, with customers expressing concerns over data security and trust in the airline’s digital infrastructure. Regulatory scrutiny is expected, as Australian privacy laws (e.g., the *Privacy Act 1988* and *Notifiable Data Breaches Scheme*) mandate strict reporting and mitigation measures. Qantas has stated it is working with cybersecurity experts and law enforcement to contain the fallout, but the long-term consequences—such as customer churn, legal liabilities, and operational disruptions—could persist for years. The incident underscores the growing threat landscape for high-profile organizations holding vast troves of personal data.
Description: Qantas Airways, Australia’s flagship airline, suffered a cyber incident in July 2024 where hackers breached a third-party platform used by its customer contact center, exposing data of up to **6 million customers**. The compromised records included **names, email addresses, phone numbers, birth dates, and frequent flyer numbers**, though the airline confirmed that **credit card details, financial data, passports, passwords, and login credentials remained unaffected**. The breach was linked to **social engineering tactics**, with the FBI warning that the cybercriminal group **Scattered Spider**—known for impersonating employees to bypass IT security (including multifactor authentication)—was targeting the airline sector. Qantas secured a **court order to block further dissemination** of the stolen data and implemented **enhanced security measures**, including staff training and system monitoring. While no ransomware was reported, the incident prompted concerns over **identity theft risks** and reputational damage. Customers were offered **specialist identity protection services**, and the airline committed to ongoing updates as investigations continue.
Description: Hackers from the cybercrime collective **Scattered Lapsus$ Hunters** breached Qantas’ systems via **vishing (voice phishing)**, tricking employees into granting access to customer data stored on a **Salesforce-linked cloud platform**. The attack, first disclosed in **July 2023**, resulted in the theft of **nearly 6 million customer records**, including **names, email addresses, phone numbers, birth dates, frequent flyer numbers, home addresses, and gender details**—though no credit card data was compromised. After Qantas and Salesforce refused to pay a ransom, the hackers **leased the stolen data on the dark web**, exposing affected individuals to **identity theft, phishing scams, and fraudulent account creation**. The breach compounds risks for Australians already impacted by prior incidents (e.g., Medibank, Optus), with authorities warning of **impersonation attempts, fake login prompts, and long-term dark web exploitation** of personal data. Qantas advised customers to enable **two-factor authentication**, avoid suspicious links, and monitor for unauthorized account activity.
Description: On October 10, 2025, Qantas Airways Limited suffered a massive data breach linked to a **Salesforce vulnerability**, where hackers from the group *Scattered Lapsus$ Hunters* leaked **153 GB of customer and internal business data** (5M+ records). The exposed dataset includes **highly sensitive PII**—full names, dates of birth, passport numbers, phone numbers, email addresses, mailing addresses, geolocation data, and **loyalty program details** (frequent flyer numbers, tier status, points balance, and internal CRM metadata like *OwnerId*, *RecordTypeId*, and *Sensitive_Contact* flags). Additionally, **internal business reports** (e.g., *QCC Frequent Flyer Report*, *QCC Lounges Report*) and **customer notes** (e.g., opt-out preferences, account activity timestamps) were compromised. The breach follows a **July 2025 incident** involving a third-party vendor, suggesting systemic vulnerabilities. The leak poses severe risks of **identity theft, financial fraud, and reputational harm**, as threat actors could exploit the data for targeted phishing, account takeovers, or blackmail. The inclusion of **internal Salesforce IDs and CRM fields** further exposes Qantas to operational disruptions and regulatory scrutiny under global data protection laws (e.g., GDPR, Australia’s *Privacy Act*). The hackers’ **ransomware-like ultimatum** (demanding negotiations by October 10) and subsequent public dump escalate the incident’s gravity, signaling potential **long-term trust erosion** among customers and partners.
Description: Qantas Airways suffered a major cyber breach in July 2025, where hackers accessed a third-party call center platform containing sensitive customer data. The stolen information included personal details of over **five million customers**: **one million** had phone numbers, birth dates, and home addresses compromised, while **four million** had names and email addresses exposed. Additional leaked data included frequent flyer details, genders, and meal preferences. The breach was linked to the **Scattered Lapsus$ Hunters** hacker group, which published the data after Qantas refused to meet ransom demands. Despite obtaining a court injunction to block further dissemination, cybersecurity experts like **Troy Hunt** dismissed its effectiveness, citing past failures in similar cases. The incident follows a wave of high-profile Australian breaches (Optus, Medibank, MediSecure) and aligns with a **25% surge in reported data breaches** in 2024, per the **Office of the Australian Information Commissioner**. Qantas is collaborating with cybersecurity firms and Australian agencies to mitigate fallout, though the leaked data—including addresses and birth dates—poses long-term risks of identity theft and fraud.
Description: A cyberattack targeting **Salesforce**, a third-party platform used by Qantas, exposed the personal data of **5.7 million customers**. The breach, linked to the **Scattered Lapsus$ Hunters** hacking group, involved **social engineering tactics** where attackers posed as IT staff to gain unauthorized access. Compromised data included **names, email addresses, phone numbers, dates of birth, frequent flyer details, and in some cases, home/business addresses, gender, and meal preferences**. While **no credit card, passport, or banking details** were leaked, the attackers are **holding the stolen data for ransom**, demanding payment by October 10, 2023. Qantas secured a **legal injunction in Australia** to prevent further data dissemination, though experts doubt its global effectiveness. The incident is part of a **wider campaign** affecting other major brands like Disney, Google, and Toyota, highlighting vulnerabilities in **shared cloud platforms** and the persistent threat of **ransomware-driven extortion**.
Description: Hackers from the **Scattered Lapsus$ Hunters** group leaked the personal records of **5 million Qantas customers** on the dark web after the company failed to meet a ransom demand. The breach, originating from a **Salesforce database cyber-attack in June**, exposed sensitive customer data, including **email addresses, phone numbers, birth dates, and frequent flyer numbers**—though no financial or passport details were compromised. The leaked data was part of a larger global hack affecting **over 40 companies**, with up to **1 billion customer records** stolen between **April 2024 and September 2025**. While Qantas secured a **NSW Supreme Court injunction** to restrict further dissemination, experts warn the exposed information could enable **personalized phishing scams and identity fraud**. The hackers publicly taunted Qantas with the message: *“Don’t be the next headline, should have paid the ransom.”* Salesforce denied platform compromise but acknowledged extortion attempts linked to past incidents. Qantas continues to offer **24/7 support and identity protection advice** to affected customers.
Description: Qantas suffered a significant cyber incident where **5.7 million customers' personal data**—including names, addresses, and potentially other personally identifiable information (PII)—was **stolen and leaked on the dark web** by the cybercrime group *Scattered Lapsus$ Hunters* after the airline refused to pay a ransom. The breach originated from a **phishing attack targeting a Qantas call center worker in the Philippines**, who was tricked into granting access to a third-party platform (Salesforce) containing customer records. The exposed data, which cannot be easily changed (e.g., names, dates of birth), heightens risks of **follow-on scams**, such as fraudsters impersonating Qantas to extract banking details under the guise of compensation. Customers reported **poor communication from Qantas**, with many learning of developments via media rather than direct notifications. The breach may result in **hefty financial penalties** under Australia’s Privacy Act, with experts arguing fines must be substantial to deter corporate negligence. The federal government reiterated its stance against negotiating with hackers, while Qantas offered limited support via IDCARE on a case-by-case basis. The incident underscores systemic vulnerabilities in third-party vendor security and corporate accountability.
Description: Cybercriminals exploited a third-party call center in June 2023 to gain unauthorized access to Qantas’ customer data. After stealing over **5 million records** (153GB) containing **names, email addresses, phone numbers, birth dates, and Qantas Frequent Flyer numbers**, the hackers demanded a ransom. When Qantas refused to comply—citing legal protections from an injunction—the attackers leaked the data on both the **dark web and open internet** on **October 7, 2023**. Initially sold for **$27** on a hacking forum, the dataset was later distributed for free. While **no credit card details, passports, or login credentials** were compromised, the exposed personal information poses risks of **identity theft, phishing, and fraud**. The breach was confirmed legitimate by cybersecurity expert **Troy Hunt**, who found his own family’s data in the leak. Qantas continues investigations with **Australian Cyber Security Centre (ACSC) and the Australian Federal Police (AFP)**, offering identity protection services to affected customers. The incident is part of a broader campaign by the **Scattered Lapsus$ Hunters (SLSH)** group, which explicitly targeted Australian businesses, declaring a 'war' on the country’s organizations.
Description: The **Trinity of Chaos** ransomware collective (linked to Lapsus$, Scattered Spider, and ShinyHunters) exposed a significant breach of **Qantas Airways**, leaking **substantial PII records** of passengers, including loyalty program details, internal communications, and activity histories. The attack, initially disclosed via extortion emails, resulted in regulatory fines for negligence under GDPR-like frameworks (e.g., Australia’s *Privacy Act*), but the stolen data remains monetized on dark web markets. The breach likely stemmed from **Salesforce instance exploitation** (via vishing/OAuth token theft in Salesloft’s Drift AI chat integration), aligning with the group’s pattern of targeting high-value corporate data. The leaked samples confirm exposure of **millions of customer records**, heightening risks of identity theft, phishing, and reputational damage. Qantas’ failure to fully mitigate the incident—despite prior warnings—exacerbates compliance and operational risks, with cybercriminals leveraging the data for ongoing malicious campaigns, including AI-driven social engineering.


Qantas has 525.0% more incidents than the average of same-industry companies with at least one recorded incident.
Qantas has 412.82% more incidents than the average of all companies with at least one recorded incident.
Qantas reported 4 incidents this year: 1 cyber attacks, 2 ransomware, 0 vulnerabilities, 1 data breaches, compared to industry peers with at least 1 incident.
Qantas cyber incidents detection timeline including parent company and subsidiaries

We would like to acknowledge the Traditional Custodians of the local lands and waterways on which we live, work and fly. We pay our respects to Elders past and present. Spirit is everything to us, and joining the Qantas team means bringing your spirit to ours. We have over 26,000 exceptional employees, and every year we fly millions of customers around Australia and the world – together. If you hop on board with the team, you'll experience a workplace where creativity, diversity and innovation are encouraged. We aim to give every member of the Qantas Group the support to follow their dreams, face new challenges, and let their future take flight. Ultimately, people are our priority – those who work for us and those who travel with us. For the latest information on the cyber incident: https://bit.ly/3I7jNfM Member of the oneworld Alliance. Please read the Qantas LinkedIn House Rules at http://bit.ly/QFhouserules


Delta Air Lines (NYSE: DAL) is the U.S. global airline leader in safety, innovation, reliability and customer experience. Powered by our employees around the world, Delta has for a decade led the airline industry in operational excellence while maintaining our reputation for award-winning customer s

When JetBlue first took flight in February 2000, our founding goal was to bring humanity back to air travel, and over two decades later, we still put our customers, crewmembers and communities at the center of everything we do. Before we even had aircraft to fly, our founders selected five values

As one of the three major air carriers in China, headquartered in Shanghai, China Eastern Airlines operates 111 domestic and overseas branches across the globe. Flying a fleet of 730 aircraft which is one of the youngest fleets in major airlines worldwide. Moreover, it boasts the largest-scale in-fl

Red. Hot. Spicy. That’s not just our tagline, it’s how we fly. Red reflects the bold spirit we bring to every journey, energetic, passionate, and full of heart. Hot captures the warmth of our service and the vibrant destinations we connect. Spicy is our drive to keep travel exciting through innovati
Canada's largest airline, the country’s flag carrier and a founding member of Star Alliance, the world's most comprehensive air transportation network celebrating its 25thanniversary in 2022, Air Canada provides scheduled passenger service directly to 51 airports in Canada, 51 in the United States a

Embark on an adventure with a commitment to service, excellence and humanity. Our team is what powers our airline. We are proudly dedicated to our purpose of caring for people on life’s journey, including connecting our customers to the people and places they love or providing our team members devel

It all starts here. 23 years ago, a dream took flight - shaping and forever changing the travel industry in Asia. The idea was simple: Make flying affordable for everyone. We made that dream happen. We started an airline in 2001. Today, we’ve evolved to become something much bigger. We’re now a wo
At Southwest®, everything we do—from our smiling People to our policies—is designed to let you go with Heart. No matter what comes up in your travels, we’ve got your back. Because while any airline can fly you, only Southwest lets you go with Heart. Application fees don’t fly. The only way to apply

Ryanair Holdings plc, Europe’s largest airline group, is the parent company of Ryanair DAC, Lauda, Buzz and Ryanair UK. Carrying 160m+ guests p.a. on over 3,000 daily flights to/from 225 airports. Plan to carry 225m+ guests p.a. by 2026. Unfortunately, we are unable to answer customer service que
.png)
When courts ban people from accessing leaked data – as happened after the airline's data breach – only hackers and scammers win.
Recent executive changes at Qantas follow a major data breach, as the airline looks to restore its reputation and tighten digital security.
Tech News News: Qantas CEO Vanessa Hudson announced a key executive departure, with Chief Customer and Digital Officer Catriona Larritt...
Qantas cyber security boss resigns, prompting executive reshuffle ... Qantas will reorganise its executive team following the resignation of its...
Larritt, who has been with Qantas since 2015, previously held key roles across Jetstar and Freight before assuming her current position in September 2023.
(Reuters) -Qantas's chief customer and digital officer Catriona Larritt will step down by the end of December, according to an internal memo seen by...
Qantas's chief customer and digital officer Catriona Larritt will step down by the end of December, according to an internal memo seen by...
The breach was discovered after the hacker group began leaking stolen data on its dark web platform, accusing the airline of poor cybersecurity...
Qantas Airways confirmed that hackers leaked customer data on the dark web after the airline missed the ransom deadline.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Qantas is https://www.qantas.com.
According to Rankiteo, Qantas’s AI-generated cybersecurity score is 100, reflecting their Critical security posture.
According to Rankiteo, Qantas currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Qantas is not certified under SOC 2 Type 1.
According to Rankiteo, Qantas does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Qantas is not listed as GDPR compliant.
According to Rankiteo, Qantas does not currently maintain PCI DSS compliance.
According to Rankiteo, Qantas is not compliant with HIPAA regulations.
According to Rankiteo,Qantas is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Qantas operates primarily in the Airlines and Aviation industry.
Qantas employs approximately 17,358 people worldwide.
Qantas presently has no subsidiaries across any sectors.
Qantas’s official LinkedIn profile has approximately 603,826 followers.
Qantas is classified under the NAICS code 481, which corresponds to Air Transportation.
Yes, Qantas has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/qantas.
Yes, Qantas maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/qantas.
As of December 11, 2025, Rankiteo reports that Qantas has experienced 12 cybersecurity incidents.
Qantas has an estimated 3,516 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware, Cyber Attack and Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an incident response plan activated with likely (e.g., google’s mitigation for unc6040), incident response plan activated with salesforce flash warning (fbi), and third party assistance with resecurity (threat intelligence), third party assistance with fbi (investigation), third party assistance with dark web monitoring firms, and law enforcement notified with fbi (flash warning), law enforcement notified with potential gdpr regulators (eu), law enforcement notified with australian authorities (qantas), and containment measures with salesforce instance isolation, containment measures with oauth token revocation, containment measures with dark web takedown attempts (ddos on dls), and remediation measures with patch management (salesforce), remediation measures with multi-factor authentication (mfa) enforcement, remediation measures with employee training (anti-phishing), and recovery measures with data restoration (backups), recovery measures with customer notification (e.g., stellantis), recovery measures with regulatory filings, and communication strategy with public statements (downplaying impact, e.g., salesforce), communication strategy with customer advisories (deadline: 2025-10-10), communication strategy with media engagement, and network segmentation with likely (to isolate salesforce instances), and enhanced monitoring with fbi indicators of compromise (iocs), enhanced monitoring with dark web threat intelligence, and incident response plan activated with yes (24/7 support line, identity protection advice), and third party assistance with external cybersecurity experts, third party assistance with legal support (nsw supreme court injunction), and law enforcement notified with yes (investigated with authorities), and containment measures with legal injunction to block data access/use, and remediation measures with customer support (identity protection advice), remediation measures with monitoring for suspicious activity, and communication strategy with public statements, communication strategy with customer advisories, and enhanced monitoring with likely (advised customers to monitor accounts), and incident response plan activated with yes (collaboration with acsc, afp, and cybersecurity experts), and third party assistance with australian cyber security centre (acsc), third party assistance with australian federal police (afp), third party assistance with specialist cybersecurity experts (unnamed), and law enforcement notified with yes (afp, fbi involved; nsw supreme court injunction obtained), and containment measures with legal injunction to block data access/release, containment measures with dark web monitoring, and remediation measures with investigation into leaked data scope, remediation measures with identity protection services for affected customers, and recovery measures with 24/7 support line for customers, recovery measures with ongoing updates via qantas website, and communication strategy with public statements (via abc, information age), communication strategy with website updates, communication strategy with direct customer notifications (via email/support line), and enhanced monitoring with likely (given collaboration with acsc/afp), and and third party assistance with australian security services, third party assistance with legal counsel (for injunction), and and containment measures with legal injunction to block data dissemination, containment measures with access revocation for compromised systems, and remediation measures with customer notifications (email), remediation measures with impact analysis (google), and communication strategy with public statements (qantas, google), communication strategy with media engagement, and and third party assistance with salesforce, third party assistance with law enforcement, and and containment measures with credential resets, containment measures with increased monitoring for unusual activity, containment measures with injunction to deter data dissemination, and remediation measures with strengthened monitoring capabilities, remediation measures with supplier access tightening, and recovery measures with customer communications (scam awareness), recovery measures with identity protection support, and communication strategy with public statements, communication strategy with customer advisories on scam prevention, and and incident response plan activated with yes (investigation ongoing since july), and third party assistance with federal government, third party assistance with australian federal police, third party assistance with cybersecurity experts, and law enforcement notified with yes, and containment measures with nsw supreme court injunction to block data access, containment measures with dark web monitoring, and recovery measures with customer notifications (july), recovery measures with advisories on phishing risks, and communication strategy with public statements (july and post-dark web leak), communication strategy with direct emails to affected customers, communication strategy with media interviews (e.g., transport minister catherine king), and enhanced monitoring with dark web channels monitored to confirm leaked data, and and and containment measures with legal injunction to prevent data spread (australia-only), and communication strategy with public disclosure, communication strategy with customer notifications (e.g., google notified affected partners), and incident response plan activated with yes (collaboration with cybersecurity experts), and third party assistance with cybersecurity experts (unnamed), third party assistance with australian security agencies, and law enforcement notified with yes (australian authorities), and containment measures with court injunction to block data access/use, containment measures with third-party platform review, and recovery measures with customer communication, recovery measures with data leak investigation, and communication strategy with public statements (oct 12, 2025), communication strategy with social media updates, communication strategy with customer advisories, and incident response plan activated with likely (given scale, but not publicly confirmed), and third party assistance with cybersecurity firms (e.g., mandiant, crowdstrike) likely engaged, third party assistance with salesforce’s internal security team, and law enforcement notified with probable (fbi, interpol, or national cybercrime units), and containment measures with salesforce likely patched the exploited vulnerability, containment measures with affected companies may have isolated crm systems, containment measures with password resets for exposed accounts, and remediation measures with forensic analysis of breached systems, remediation measures with customer notifications (where legally required), remediation measures with credit monitoring services for affected individuals, and communication strategy with limited public statements (e.g., qantas acknowledged july 2025 third-party breach but did not name vendor), communication strategy with telegram/dark web monitoring for further leaks, and network segmentation with likely implemented post-breach, and enhanced monitoring with expected for salesforce and affected companies, and and third party assistance with cybersecurity experts, and and containment measures with court order to block data access/use, containment measures with third-party platform isolation, and remediation measures with increased team training, remediation measures with strengthened system monitoring/detection, and recovery measures with customer identity protection services, recovery measures with ongoing updates via website/support line, and communication strategy with public statements, communication strategy with customer notifications (specific data impact), communication strategy with website updates, and and third party assistance with idcare (identity support for affected customers), and recovery measures with case-by-case support via idcare, and communication strategy with statement on qantas website, communication strategy with no direct customer notifications (criticized), and communication strategy with public disclosure (confirmed exposure)..
Title: Trinity of Chaos Ransomware Collective Data Leak Site (DLS) Disclosure
Description: The Trinity of Chaos, a ransomware collective associated with Lapsus$, Scattered Spider, and ShinyHunters, launched a Data Leak Site (DLS) on the TOR network containing 39 companies impacted by past attacks. The group released previously undisclosed information about successful breaches, including data samples from Salesforce instances exploited via vishing and stolen OAuth tokens (Salesloft’s Drift AI chat integration). Threat actors threatened to report breaches to regulators (e.g., GDPR) and disclosed deadlines (October 10, 2025) for negotiation to prevent further data publication. The leaked data includes PII, internal communications, and records from Fortune 100 companies, airlines, and technology giants like Cisco and Google. The group claims over 1.5 billion records across 760 companies, with potential impacts including lawsuits, regulatory fines, and advanced phishing campaigns.
Date Publicly Disclosed: 2025-10-03
Type: Data Breach
Attack Vector: VishingStolen OAuth TokensSalesforce Instance Exploitation (Salesloft’s Drift AI Chat Integration)Dark Web Data Leak Site (DLS)Social Engineering
Vulnerability Exploited: Salesforce Instance MisconfigurationSalesloft’s Drift AI Chat Integration (OAuth Token Theft)Unpatched Systems (Historical)Human Error (Phishing/Vishing)
Threat Actor: Trinity of ChaosLapsus$Scattered SpiderShinyHuntersUNC6040UNC63951973cn
Motivation: Financial GainData MonetizationReputation DamageRegulatory Pressure (GDPR Fines)Disruption
Title: Qantas Customer Data Leak by Scattered Lapsus$ Hunters
Description: Hackers leaked the personal records of 5 million Qantas customers on the dark web after a ransom deadline passed. The data, stolen from a Salesforce database in June, included email addresses, phone numbers, birth dates, and frequent flyer numbers. The hacker collective Scattered Lapsus$ Hunters demanded payment to prevent the data from being shared, but Qantas refused to pay. The leak is part of a larger breach affecting over 40 global companies, with up to 1 billion customer records compromised.
Date Detected: 2024-06
Date Publicly Disclosed: 2024-09-21
Type: Data Breach
Attack Vector: Third-Party (Salesforce Database)Data Exfiltration
Threat Actor: Scattered Lapsus$ Hunters
Motivation: Financial Gain (Extortion)Reputation Damage
Title: Qantas Customer Data Leak via Third-Party Call Center Exploit
Description: Cybercriminals published 153GB of alleged Qantas customer data (5 million records) on the dark web and open internet after the airline refused to comply with ransom demands. The breach originated from a third-party call center exploit in June 2023, with data including names, email addresses, phone numbers, birth dates, and Qantas Frequent Flyer numbers. No financial data, passports, or login credentials were compromised. The leak was part of a broader campaign by the Scattered Lapsus$ Hunters (SLSH) group targeting Salesforce customers, though Qantas was one of only six victims whose data was ultimately released. The group declared a specific focus on Australian businesses, citing retaliation for past incidents like the 2022 Optus breach.
Date Detected: 2023-06
Date Publicly Disclosed: 2023-10-07
Type: Data Breach
Attack Vector: Third-Party Call Center ExploitVoice Phishing (UNC60400)Dark Web Data Dump
Vulnerability Exploited: Unspecified vulnerability in third-party call center platform (linked to Salesforce customer management instances)
Threat Actor: Scattered Lapsus$ Hunters (SLSH)UNC60400
Motivation: Financial Gain (Ransom Extortion)Retaliation Against Australian BusinessesReputation Damage
Title: Qantas Airways and Multiple Global Firms Data Breach via Salesforce Cyberattack
Description: Australian national carrier Qantas Airways confirmed that data from ~5.7 million customers stolen in a cyberattack was shared online, part of a broader leak affecting dozens of firms (including Disney, Google, IKEA, Toyota, McDonald's, Air France, and KLM). The attack targeted Salesforce, with hackers using social engineering to breach a third-party customer contact center system. Sensitive customer data (names, emails, addresses, birthdays, etc.) was exfiltrated and held for ransom by the Scattered Lapsus$ Hunters group. No financial or passport data was compromised. Qantas obtained a legal injunction to block data dissemination, though experts doubt its effectiveness.
Date Detected: 2023-07-XX
Date Publicly Disclosed: 2023-07-XX (Qantas); 2023-08-XX (Google); 2023-10-XX (public leak)
Type: Data Breach
Attack Vector: Social EngineeringPhishing (IT Impersonation)Third-Party Exploitation (Salesforce)
Vulnerability Exploited: Human error (tricked customer support employees into granting access)
Threat Actor: Scattered Lapsus$ Hunters (cybercriminal alliance)
Motivation: Financial Gain (Ransom)Data Theft for Dark Web Sale
Title: Qantas Customer Data Breach by Scattered Lapsus$ Hunters
Description: Hackers tied to the group 'Scattered Lapsus$ Hunters' published Qantas customer data on the dark web after a ransom deadline expired. The breach, linked to a compromised third-party Salesforce environment in mid-2025, exposed personal details of 5-5.7 million customers, including names, email addresses, phone numbers, dates of birth, and frequent-flyer numbers. No payment data or passport records were accessed. Qantas obtained an injunction to deter dissemination and has strengthened monitoring capabilities while supporting impacted customers.
Type: Data Breach
Attack Vector: Social EngineeringCredential AbuseThird-Party Vulnerability (Salesforce)
Vulnerability Exploited: Third-party Salesforce tenant misconfiguration/access controls
Threat Actor: Scattered Lapsus$ Hunters
Motivation: Financial Gain (Extortion)Data Theft for Dark Web Sale
Title: Qantas Customer Data Leak on the Dark Web
Description: Hackers from the cybercrime collective Scattered Lapsus$ Hunters released Qantas customer data onto the dark web after the airline and Salesforce refused to pay a ransom. The breach, initially disclosed in July, involved vishing (voice phishing) attacks to trick employees into granting access to customer data. Nearly 6 million records were compromised, including names, email addresses, phone numbers, birth dates, and frequent flyer numbers. The Australian government and Qantas are investigating the leak, which follows similar high-profile breaches affecting Medibank and Optus.
Date Detected: 2023-07-00
Date Publicly Disclosed: 2023-07-00
Type: Data Breach
Attack Vector: Vishing (Voice Phishing)
Vulnerability Exploited: Human Error (Social Engineering via Phone Calls)
Threat Actor: Scattered Lapsus$ Hunters
Motivation: Financial Gain (Extortion/Ransom)
Title: Salesforce Breach Exposes Data from 5.7 Million Qantas Customers and Other Global Brands
Description: A cyberattack on Salesforce exposed data from 5.7 million Qantas customers, along with other global brands like Disney, Google, Toyota, IKEA, McDonald’s, Air France, and KLM. The attackers, identified as Scattered Lapsus$ Hunters, used social engineering to gain access to third-party platforms and are holding the stolen data for ransom. Personal details such as names, email addresses, phone numbers, and dates of birth were compromised, though no financial or passport information was exposed. Qantas secured a legal injunction in Australia to limit data spread, but its effectiveness outside the country is questioned.
Date Detected: 2023-07-00
Date Publicly Disclosed: 2023-10-00
Type: Data Breach
Attack Vector: Social Engineering (Impersonation of IT Staff/Trusted Representatives)
Vulnerability Exploited: Human Error (Credential Sharing/System Access Granted via Deception)
Threat Actor: Scattered Lapsus$ Hunters
Motivation: Financial Gain (Ransom Extortion)
Title: Qantas Airways Customer Data Breach via Third-Party Salesforce Platform
Description: Australia's Qantas Airways confirmed that hackers released stolen customer data months after a cyber breach in July 2025. The breach targeted a third-party call center platform, exposing personal information of over 5 million customers, including names, email addresses, phone numbers, birth dates, home addresses, genders, and meal preferences. The hacker group Scattered Lapsus$ Hunters is believed to be responsible after their ransom deadline passed. Qantas obtained a court injunction to block further data dissemination but faced skepticism about its effectiveness.
Date Detected: 2025-07
Date Publicly Disclosed: 2025-10-12
Type: Data Breach
Attack Vector: Third-Party Platform Exploitation (Salesforce/Call Center)Data ExfiltrationPublic Data Release
Threat Actor: Scattered Lapsus$ Hunters
Motivation: Financial (Ransom)Data Theft for Dark Web SaleReputation Damage
Title: Massive Data Breach via Salesforce Vulnerability by Scattered Lapsus$ Hunters (2025)
Description: On October 3, 2025, hackers under the collective name 'Scattered Lapsus$ Hunters' (a fusion of Scattered Spider, Lapsus$, and ShinyHunters) claimed to have stolen 989 million records from 39 major global companies by exploiting a Salesforce vulnerability. The group demanded negotiations with Salesforce and the affected firms by October 10, 2025, threatening to release the entire dataset if ignored. On October 10, 2025, they publicly leaked data from 6 of the 39 companies: Qantas Airways, Vietnam Airlines, Albertsons, GAP, Fujifilm, and Engie Resources. The leaked data includes PII, loyalty program details, CRM metadata, and internal business records, posing severe risks of identity theft, fraud, and reputational damage.
Date Detected: 2025-10-03
Date Publicly Disclosed: 2025-10-03
Type: Data Breach
Attack Vector: Exploitation of Salesforce VulnerabilityUnauthorized Data Exfiltration
Vulnerability Exploited: Unspecified Salesforce vulnerability (likely API or authentication flaw)
Threat Actor: Name: Scattered Lapsus$ HuntersAffiliations: ['Scattered Spider', 'Lapsus$', 'ShinyHunters']Type: Hacktivist/Cybercriminal Collective
Motivation: Financial ExtortionReputation DamageData Theft for Dark Web Sales
Title: Qantas Airways Customer Data Breach via Third-Party Platform
Description: Australia's Qantas Airways confirmed that customer data was posted online following a July 2024 cyber incident impacting a third-party platform used by its contact center. The breach exposed service records for 6 million people, including names, email addresses, phone numbers, birth dates, and frequent flyer numbers. The airline secured a court order to block further dissemination of the stolen data and implemented enhanced security measures, including increased team training and system monitoring. The FBI linked the attack to the 'Scattered Spider' cybercrime group, known for social engineering and MFA bypass techniques targeting large corporations and their IT vendors.
Date Detected: 2024-07
Date Publicly Disclosed: 2024-07
Type: Data Breach
Attack Vector: Social EngineeringMFA BypassThird-Party Platform Exploitation
Vulnerability Exploited: Weak IT Help Desk Authentication ProtocolsInsufficient Third-Party Vendor Security
Threat Actor: Scattered Spider
Motivation: Data TheftExtortion
Title: Qantas Customer Data Leak on the Dark Web
Description: Frustration is mounting among Qantas customers after their names and addresses were released on the dark web by the cybercrime collective Scattered Lapsus$ Hunters. The stolen data of 5.7 million customers was exposed after Qantas failed to pay the demanded ransom. The breach occurred in July when cybercriminals tricked a Qantas call center worker in the Philippines into handing over access to customer information stored on the third-party platform Salesforce. Affected customers have criticized Qantas for poor communication and lack of support, while experts warn of potential scams and regulatory fines under the Australian Privacy Act.
Date Detected: 2023-07-00
Type: Data Breach
Attack Vector: Social EngineeringThird-Party Compromise (Salesforce)Insider Manipulation (Call Center Worker)
Vulnerability Exploited: Human Error (Tricked Call Center Worker)Third-Party Platform Security (Salesforce)
Threat Actor: Scattered Lapsus$ Hunters
Motivation: Financial Gain (Ransom Demand)Data Theft for Dark Web Sale
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Stolen OAuth Tokens (Salesloft Drift)Vishing AttacksCompromised Corporate EmailsExploited Salesforce Misconfigurations, Salesforce Database (compromised between April 2024–September 2025), Third-Party Call Center (linked to Salesforce customer management platform), Customer support employees (tricked via IT impersonation), Compromised Salesforce tenant (third-party), Vishing (voice phishing calls to employees), Salesforce Customer Contact Centre (via Third-Party Platform), Third-Party Call Center Platform (Salesforce-linked), Exploited Salesforce vulnerability (likely API or authentication flaw), Third-Party Contact Center Platform and Qantas Call Center Worker in the Philippines (Tricked via Social Engineering).

Data Compromised: Pii (passenger info, loyalty points, activity history), Internal communications, Customer-vendor relationships, Employee records (law enforcement, military, federal agencies), Advertising partner data (google adwords), Salesforce records (accounts, contacts, opportunities)
Systems Affected: Salesforce InstancesSalesloft’s Drift AI Chat IntegrationCorporate Email SystemsDark Web Data Leak Site (DLS)Telegram Channels
Operational Impact: Disrupted Retail/Production (e.g., Jaguar Land Rover)Regulatory Investigations (GDPR, Criminal Negligence)Potential LawsuitsGovernment Shutdown Overlap (U.S. Federal Agencies)
Customer Complaints: ['Expected due to PII exposure']
Brand Reputation Impact: High (Fortune 100 companies, global brands)Loss of Trust in Salesforce SecurityMedia Scrutiny
Legal Liabilities: GDPR Fines (EU-based victims)Criminal Negligence Charges (e.g., Qantas)Class-Action Lawsuits
Identity Theft Risk: ['High (1.5B+ records with PII)', 'Targeted Phishing/Social Engineering']
Payment Information Risk: ['Low (Most samples lack passwords but include PII)']

Data Compromised: Email addresses, Phone numbers, Birth dates, Frequent flyer numbers
Systems Affected: Salesforce Database
Operational Impact: Customer Support BurdenLegal Injunctions
Customer Complaints: Expected (due to personal data exposure)
Brand Reputation Impact: High (negative publicity, loss of customer trust)
Legal Liabilities: NSW Supreme Court Injunction to Prevent Data Misuse
Identity Theft Risk: High (personal data exposed, risk of phishing/scams)
Payment Information Risk: Low (no credit card or financial data exposed)

Data Compromised: Customer names, Email addresses, Phone numbers, Birth dates, Qantas frequent flyer numbers
Systems Affected: Third-Party Call Center PlatformCustomer Management System (Salesforce Instance)
Operational Impact: Ongoing investigation and customer support operations; legal injunctions to mitigate data spread
Customer Complaints: Reported concerns from affected customers (e.g., Troy Hunt confirmed personal/family data exposure)
Brand Reputation Impact: High; publicized leak of 5M records, including high-profile individuals (e.g., Troy Hunt), with potential long-term trust erosion
Legal Liabilities: NSW Supreme Court Interim Injunction (July 2023)Potential GDPR/Privacy Act ViolationsAFP/FBI Investigation
Identity Theft Risk: Moderate (PII exposed but no financial/password data)
Payment Information Risk: None (no credit card or financial data compromised)

Systems Affected: Salesforce corporate serversQantas customer contact center system
Operational Impact: Legal injunction filed; customer notifications; reputational damage
Brand Reputation Impact: High (publicized breach of 5.7M records; part of multi-company attack)
Legal Liabilities: Legal injunction obtained (Supreme Court of New South Wales)
Identity Theft Risk: Moderate (PII exposed: names, emails, addresses, birthdays)
Payment Information Risk: None (no credit card or financial data compromised)

Data Compromised: Names, Email addresses, Phone numbers, Dates of birth, Frequent-flyer numbers
Systems Affected: Salesforce Tenant (Third-Party)
Operational Impact: Increased Customer Service LoadsIdentity Protection CostsReputational Damage
Conversion Rate Impact: Potential decline in frequent-flyer engagement and bookings
Customer Complaints: Expected increase due to phishing risks and trust erosion
Brand Reputation Impact: Severe; undermined passenger trust, regulatory scrutiny
Legal Liabilities: Potential fines under Australia's post-Optus regimeEnforceable undertakings
Identity Theft Risk: High (phishing, account takeover attempts)
Payment Information Risk: None (no payment data exposed)

Data Compromised: Names, Email addresses, Phone numbers, Birth dates, Frequent flyer numbers, Home addresses (for some customers), Gender (for some customers)
Systems Affected: Qantas Customer Database (hosted on Salesforce platform)
Operational Impact: Increased customer support demands, reputational damage, legal injunctions to prevent data access
Customer Complaints: Reports of impersonation attempts and unauthorized account access post-breach
Brand Reputation Impact: High (part of a series of major Australian breaches, including Medibank and Optus)
Legal Liabilities: NSW Supreme Court injunction filed to block access to stolen data; potential regulatory scrutiny
Identity Theft Risk: High (phishing attempts reported, including MyGov account access attempts)
Payment Information Risk: None (credit card details reportedly not affected)

Systems Affected: Salesforce Customer Contact Centre Platform
Brand Reputation Impact: High (Global Brands Affected, Public Disclosure of Breach)
Legal Liabilities: Qantas Secured Injunction from Supreme Court of New South Wales to Prevent Data Publication/Sharing
Identity Theft Risk: Moderate (Personal Details Like Names, Emails, Phone Numbers, DOBs Exposed)
Payment Information Risk: None (No Credit Card, Passport, or Banking Information Compromised)

Data Compromised: Names (5m+ customers), Email addresses (5m+ customers), Frequent flyer details (5m+ customers), Home/business addresses (~1m customers), Phone numbers (~1m customers), Birth dates (~1m customers), Genders (~1m customers), Meal preferences (~1m customers)
Systems Affected: Third-Party Call Center Platform (Salesforce-linked)Customer Database
Operational Impact: Customer Trust ErosionLegal Injunction EnforcementCybersecurity Investigation Overhead
Customer Complaints: High (public outcry reported)
Brand Reputation Impact: Severe (one of Australia's largest breaches, trending on social media)
Legal Liabilities: Court Injunction Filed to Block Data DisseminationPotential Regulatory Fines (under Australian cyber resilience laws)
Identity Theft Risk: High (PII including addresses, birth dates, and phone numbers exposed)

Data Compromised: Total Records: 9, 8, 9, 0, 0, 0, 0, 0, 0, Leaked Records: {, ', Q, a, n, t, a, s, , A, i, r, w, a, y, s, ', :, , 5, 0, 0, 0, 0, 0, 0, ,, , ', V, i, e, t, n, a, m, , A, i, r, l, i, n, e, s, ', :, , 2, 3, 0, 0, 0, 0, 0, 0, ,, , ', A, l, b, e, r, t, s, o, n, s, ', :, , 6, 7, 2, 0, 0, 0, ,, , ', G, A, P, ,, , I, N, C, ., ', :, , 2, 2, 4, 0, 0, 0, ,, , ', F, u, j, i, f, i, l, m, ', :, , 2, 2, 4, 0, 0, 0, ,, , ', E, n, g, i, e, , R, e, s, o, u, r, c, e, s, ', :, , 5, 3, 7, 0, 0, 0, ,, , ', t, o, t, a, l, _, l, e, a, k, e, d, ', :, , 2, 9, 7, 3, 3, 0, 0, 0, }, Data Types: [, ', P, e, r, s, o, n, a, l, l, y, , I, d, e, n, t, i, f, i, a, b, l, e, , I, n, f, o, r, m, a, t, i, o, n, , (, P, I, I, ), ', ,, , ', L, o, y, a, l, t, y, , P, r, o, g, r, a, m, , D, a, t, a, ', ,, , ', I, n, t, e, r, n, a, l, , C, R, M, , M, e, t, a, d, a, t, a, ', ,, , ', B, u, s, i, n, e, s, s, , C, o, n, t, a, c, t, , D, e, t, a, i, l, s, ', ,, , ', G, e, o, l, o, c, a, t, i, o, n, , D, a, t, a, ', ,, , ', F, i, n, a, n, c, i, a, l, , T, r, a, n, s, a, c, t, i, o, n, , R, e, c, o, r, d, s, ', ,, , ', C, o, r, p, o, r, a, t, e, , T, a, x, , I, n, f, o, r, m, a, t, i, o, n, ', ,, , ', T, r, a, v, e, l, , H, i, s, t, o, r, y, ', ,, , ', C, u, s, t, o, m, e, r, , P, r, e, f, e, r, e, n, c, e, s, ', ,, , ', I, n, t, e, r, n, a, l, , R, e, p, o, r, t, s, /, L, i, n, k, s, ', ],
Systems Affected: Salesforce CRM PlatformThird-Party Vendor Systems (e.g., Qantas' July 2025 breach)
Operational Impact: Potential disruption to customer service operations (e.g., loyalty programs, CRM)Increased fraud monitoring costsRegulatory scrutiny and compliance burdens
Customer Complaints: ['Expected surge due to PII exposure and identity theft risks']
Brand Reputation Impact: Severe damage to trust in affected companies and SalesforcePotential customer churnNegative media coverage
Legal Liabilities: GDPR violations (for EU customer data)Class-action lawsuitsRegulatory fines (e.g., CCPA, APPI, etc.)
Identity Theft Risk: ['High (due to exposed PII: passports, addresses, DOB, etc.)']
Payment Information Risk: ['Moderate (some datasets include financial metadata but not full payment details)']

Data Compromised: Names, Email addresses, Phone numbers, Birth dates, Frequent flyer numbers
Systems Affected: Third-Party Contact Center Platform
Operational Impact: Increased Security MeasuresLegal Court Order EnforcementCustomer Notification Campaign
Brand Reputation Impact: High (Public Disclosure of 6M Records, Media Coverage)
Legal Liabilities: Court Order to Block Data Dissemination
Identity Theft Risk: Moderate (PII Exposed but No Financial/Passport Data)
Payment Information Risk: None (Credit Card/Payment Details Not Affected)

Data Compromised: Names, Addresses, Personally identifiable information (pii)
Systems Affected: Salesforce (Third-Party Platform)
Operational Impact: Customer Trust ErosionReputational DamagePotential Regulatory Fines
Customer Complaints: ['Poor Communication', 'Lack of Direct Notifications', 'Anxiety Over Identity Theft Risks']
Brand Reputation Impact: Severe Damage Due to Poor HandlingPublic CriticismMedia Scrutiny
Legal Liabilities: Potential Fines Under Australian Privacy ActRegulatory Investigations
Identity Theft Risk: ['High (Due to PII Exposure)']

Data Compromised: Customer data (up to 5.7 million records)
Brand Reputation Impact: Potential reputational damage due to exposure of customer data
Identity Theft Risk: High (customer data exposed on dark web)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Pii (Passenger Records, Loyalty Points), Corporate Emails, Internal Communications, Customer-Vendor Relationships, Employee Data (Law Enforcement/Military), Advertising Partner Data (Google Adwords), Salesforce Records (Accounts, Contacts, Cases), , Personal Identifiable Information (Pii), Contact Information, , Personally Identifiable Information (Pii), Loyalty Program Data, , Personal Identifiable Information (Pii), Customer Records, , Personal Identifiable Information (Pii), Frequent-Flyer Data, , Personally Identifiable Information (Pii), Customer Account Data, , Personal Identifiable Information (Pii), Frequent Flyer Information, Contact Details, Demographic Data (Gender, Meal Preferences), Addresses (Home/Business), , Personally Identifiable Information (Pii), Customer Profiles, Frequent Flyer Data, Preference Data (E.G., Meal Choices), , Personally Identifiable Information (Pii), Loyalty Program Data, Customer Relationship Management (Crm) Metadata, Internal Business Records, Geolocation Data, Corporate Contact Information, Travel History, Financial Metadata (E.G., Currency Used, Points Balance), , Personal Identifiable Information (Pii), Service Records, , Names, Addresses, Personally Identifiable Information (Pii), and Customer data.

Entity Name: Toyota Motor Corporation
Entity Type: Automotive
Industry: Manufacturing
Location: Global (HQ: Japan)
Size: Large (Fortune 100)

Entity Name: FedEx
Entity Type: Logistics
Industry: Transportation
Location: Global (HQ: USA)
Size: Large (Fortune 100)

Entity Name: Disney/Hulu
Entity Type: Entertainment
Industry: Media
Location: Global (HQ: USA)
Size: Large (Fortune 100)

Entity Name: Republic Services
Entity Type: Waste Management
Industry: Environmental Services
Location: USA
Size: Large

Entity Name: UPS
Entity Type: Logistics
Industry: Transportation
Location: Global (HQ: USA)
Size: Large (Fortune 100)

Entity Name: Aeromexico
Entity Type: Airline
Industry: Aviation
Location: Mexico
Size: Large
Customers Affected: 39M+ records (claimed)

Entity Name: Home Depot
Entity Type: Retail
Industry: Home Improvement
Location: Global (HQ: USA)
Size: Large (Fortune 100)

Entity Name: Marriott
Entity Type: Hospitality
Industry: Hotels
Location: Global (HQ: USA)
Size: Large (Fortune 100)

Entity Name: Vietnam Airlines
Entity Type: Airline
Industry: Aviation
Location: Vietnam
Size: Large

Entity Name: Walgreens
Entity Type: Retail
Industry: Pharmacy
Location: USA
Size: Large (Fortune 100)

Entity Name: Stellantis
Entity Type: Automotive
Industry: Manufacturing
Location: Global (HQ: Netherlands)
Size: Large (Fortune 100)
Customers Affected: North American customers (disclosed 2025-09-21)

Entity Name: McDonald's
Entity Type: Food Service
Industry: Restaurant
Location: Global (HQ: USA)
Size: Large (Fortune 100)

Entity Name: KFC
Entity Type: Food Service
Industry: Restaurant
Location: Global (HQ: USA)
Size: Large

Entity Name: ASICS
Entity Type: Retail
Industry: Apparel
Location: Global (HQ: Japan)
Size: Large

Entity Name: GAP
Entity Type: Retail
Industry: Apparel
Location: Global (HQ: USA)
Size: Large

Entity Name: HMH (Houghton Mifflin Harcourt)
Entity Type: Education
Industry: Publishing
Location: USA
Size: Medium

Entity Name: Fujifilm
Entity Type: Technology
Industry: Imaging
Location: Global (HQ: Japan)
Size: Large

Entity Name: Instructure (Canvas)
Entity Type: Education Technology
Industry: EdTech
Location: USA
Size: Medium

Entity Name: Albertsons
Entity Type: Retail
Industry: Grocery
Location: USA
Size: Large

Entity Name: Engie Resources
Entity Type: Energy
Industry: Utilities
Location: Global (HQ: France)
Size: Large

Entity Name: Instacart
Entity Type: E-Commerce
Industry: Grocery Delivery
Location: USA
Size: Large

Entity Name: Petco
Entity Type: Retail
Industry: Pet Supplies
Location: USA
Size: Large

Entity Name: Kering (Gucci, Balenciaga, Brioni, Alexander McQueen)
Entity Type: Luxury Goods
Industry: Fashion
Location: Global (HQ: France)
Size: Large

Entity Name: Puma
Entity Type: Retail
Industry: Apparel
Location: Global (HQ: Germany)
Size: Large

Entity Name: Cartier
Entity Type: Luxury Goods
Industry: Jewelry
Location: Global (HQ: Switzerland)
Size: Large

Entity Name: Adidas
Entity Type: Retail
Industry: Apparel
Location: Global (HQ: Germany)
Size: Large

Entity Name: TripleA (AAA)
Entity Type: Automotive Services
Industry: Insurance
Location: USA
Size: Large

Entity Name: Qantas Airways
Entity Type: Airline
Industry: Aviation
Location: Australia
Size: Large

Entity Name: CarMax
Entity Type: Automotive Retail
Industry: Used Cars
Location: USA
Size: Large

Entity Name: Saks Fifth Avenue
Entity Type: Retail
Industry: Luxury Department Store
Location: USA
Size: Large

Entity Name: 1-800 Accountant
Entity Type: Financial Services
Industry: Accounting
Location: USA
Size: Small/Medium

Entity Name: Air France & KLM
Entity Type: Airline
Industry: Aviation
Location: Europe (France/Netherlands)
Size: Large

Entity Name: Google (AdSense/AdWords)
Entity Type: Technology
Industry: Advertising
Location: Global (HQ: USA)
Size: Large (Fortune 100)

Entity Name: Cisco
Entity Type: Technology
Industry: Networking
Location: Global (HQ: USA)
Size: Large (Fortune 100)

Entity Name: Pandora.net
Entity Type: E-Commerce
Industry: Jewelry
Location: Global (HQ: USA)
Size: Large

Entity Name: TransUnion
Entity Type: Financial Services
Industry: Credit Reporting
Location: Global (HQ: USA)
Size: Large

Entity Name: Chanel
Entity Type: Luxury Goods
Industry: Fashion
Location: Global (HQ: France)
Size: Large

Entity Name: IKEA
Entity Type: Retail
Industry: Furniture
Location: Global (HQ: Netherlands)
Size: Large

Entity Name: Jaguar Land Rover
Entity Type: Automotive
Industry: Manufacturing
Location: UK
Size: Large

Entity Name: Noi Bai Airport
Entity Type: Transportation
Industry: Aviation
Location: Vietnam
Size: Large

Entity Name: Tan Son Nhat Airport
Entity Type: Transportation
Industry: Aviation
Location: Vietnam
Size: Large

Entity Name: National Credit Information Center (CIC) of Vietnam
Entity Type: Financial Services
Industry: Credit Reporting
Location: Vietnam
Size: Government
Customers Affected: 160M+ records (claimed)

Entity Name: Salesforce (Customer Instances)
Entity Type: Technology
Industry: CRM
Location: Global (HQ: USA)
Size: Large

Entity Name: Qantas
Entity Type: Airline
Industry: Aviation
Location: Australia
Size: Large (5 million customers affected)
Customers Affected: 5,000,000

Entity Name: Salesforce
Entity Type: Cloud Services Provider
Industry: Technology
Location: Global
Size: Large

Entity Name: Gap
Entity Type: Retailer
Industry: Fashion
Location: Global

Entity Name: Vietnam Airlines
Entity Type: Airline
Industry: Aviation
Location: Vietnam

Entity Name: Toyota
Entity Type: Automotive Manufacturer
Industry: Automotive
Location: Global

Entity Name: Disney
Entity Type: Entertainment
Industry: Media
Location: Global

Entity Name: McDonald’s
Entity Type: Fast Food
Industry: Hospitality
Location: Global

Entity Name: Ikea
Entity Type: Retailer
Industry: Furniture
Location: Global

Entity Name: Adidas
Entity Type: Retailer
Industry: Sportswear
Location: Global

Entity Name: Qantas Airways
Entity Type: Airline
Industry: Aviation/Transportation
Location: Australia (Headquarters: Sydney, NSW)
Size: Large (29,000+ employees, ASX-listed)
Customers Affected: 5,000,000

Entity Name: Qantas Airways
Entity Type: Airline
Industry: Aviation
Location: Australia
Size: Large (national carrier)
Customers Affected: 5.7 million

Entity Name: Salesforce
Entity Type: Software Provider
Industry: Technology (CRM)
Location: Global (HQ: USA)
Size: Large

Entity Name: Disney
Entity Type: Entertainment Conglomerate
Industry: Media/Entertainment
Location: Global (HQ: USA)
Size: Large

Entity Name: Google
Entity Type: Technology Company
Industry: Tech/Cloud Services
Location: Global (HQ: USA)
Size: Large

Entity Name: IKEA
Entity Type: Retailer
Industry: Furniture/Retail
Location: Global (HQ: Netherlands)
Size: Large

Entity Name: Toyota
Entity Type: Automaker
Industry: Automotive
Location: Global (HQ: Japan)
Size: Large

Entity Name: McDonald's
Entity Type: Fast Food Chain
Industry: Food Service
Location: Global (HQ: USA)
Size: Large

Entity Name: Air France
Entity Type: Airline
Industry: Aviation
Location: France
Size: Large

Entity Name: KLM
Entity Type: Airline
Industry: Aviation
Location: Netherlands
Size: Large

Entity Name: Qantas
Entity Type: Airline
Industry: Aviation
Location: Australia
Size: Large (millions of customers)
Customers Affected: 5-5.7 million

Entity Name: Qantas
Entity Type: Airline
Industry: Aviation/Transportation
Location: Australia
Size: Large (nearly 6 million customer records compromised)
Customers Affected: 5,900,000 (approx.)

Entity Name: Salesforce
Entity Type: Cloud Software Provider
Industry: Technology
Location: Global (HQ: USA)
Size: Enterprise

Entity Name: Qantas
Entity Type: Airline
Industry: Aviation
Location: Australia
Size: Large
Customers Affected: 5.7 million

Entity Name: Disney
Entity Type: Corporation
Industry: Entertainment
Location: Global
Size: Large

Entity Name: Google
Entity Type: Corporation
Industry: Technology
Location: Global
Size: Large

Entity Name: Toyota
Entity Type: Corporation
Industry: Automotive
Location: Global
Size: Large

Entity Name: IKEA
Entity Type: Corporation
Industry: Retail
Location: Global
Size: Large

Entity Name: McDonald’s
Entity Type: Corporation
Industry: Food Service
Location: Global
Size: Large

Entity Name: Air France
Entity Type: Airline
Industry: Aviation
Location: France
Size: Large

Entity Name: KLM
Entity Type: Airline
Industry: Aviation
Location: Netherlands
Size: Large

Entity Name: Qantas Airways
Entity Type: Airline
Industry: Aviation/Transportation
Location: Australia
Size: Large (Fortune 500 equivalent)
Customers Affected: 5,000,000+

Entity Name: Qantas Airways Limited
Entity Type: Airline
Industry: Aviation/Transportation
Location: Australia
Size: Large (10,000+ employees)
Customers Affected: 5000000

Entity Name: Vietnam Airlines
Entity Type: Airline
Industry: Aviation/Transportation
Location: Vietnam
Size: Large (10,000+ employees)
Customers Affected: 23000000

Entity Name: Albertsons Companies, Inc.
Entity Type: Retailer
Industry: Grocery/Retail
Location: USA
Size: Large (250,000+ employees)
Customers Affected: 672000

Entity Name: GAP, INC.
Entity Type: Retailer
Industry: Fashion/Retail
Location: USA
Size: Large (100,000+ employees)
Customers Affected: 224000

Entity Name: Fujifilm
Entity Type: Manufacturer
Industry: Technology/Imaging
Location: Japan
Size: Large (80,000+ employees)
Customers Affected: 224000

Entity Name: Engie Resources
Entity Type: Energy Provider
Industry: Utilities/Energy
Location: USA/France
Size: Large (100,000+ employees)
Customers Affected: 537000

Entity Name: Salesforce
Entity Type: Cloud Provider
Industry: Technology/CRM
Location: USA
Size: Large (70,000+ employees)

Entity Name: KFC
Entity Type: Retailer
Industry: Food/Beverage
Location: Global
Size: Large

Entity Name: ASICS
Entity Type: Retailer
Industry: Sportswear
Location: Japan
Size: Large

Entity Name: UPS
Entity Type: Logistics
Industry: Transportation
Location: USA
Size: Large

Entity Name: IKEA
Entity Type: Retailer
Industry: Furniture
Location: Sweden
Size: Large

Entity Name: Petco
Entity Type: Retailer
Industry: Pet Supplies
Location: USA
Size: Large

Entity Name: Cisco
Entity Type: Technology
Industry: Networking
Location: USA
Size: Large

Entity Name: McDonald’s
Entity Type: Retailer
Industry: Food/Beverage
Location: USA
Size: Large

Entity Name: Cartier
Entity Type: Retailer
Industry: Luxury Goods
Location: France
Size: Large

Entity Name: Adidas
Entity Type: Retailer
Industry: Sportswear
Location: Germany
Size: Large

Entity Name: Instacart
Entity Type: Technology
Industry: E-Commerce
Location: USA
Size: Large

Entity Name: Marriott
Entity Type: Hospitality
Industry: Hotels
Location: USA
Size: Large

Entity Name: Walgreens
Entity Type: Retailer
Industry: Pharmacy
Location: USA
Size: Large

Entity Name: Pandora
Entity Type: Retailer
Industry: Jewelry
Location: Denmark
Size: Large

Entity Name: Chanel
Entity Type: Retailer
Industry: Luxury Goods
Location: France
Size: Large

Entity Name: CarMax
Entity Type: Retailer
Industry: Automotive
Location: USA
Size: Large

Entity Name: Disney/Hulu
Entity Type: Entertainment
Industry: Media
Location: USA
Size: Large

Entity Name: TransUnion
Entity Type: Financial Services
Industry: Credit Reporting
Location: USA
Size: Large

Entity Name: Aeroméxico
Entity Type: Airline
Industry: Aviation
Location: Mexico
Size: Large

Entity Name: Toyota Motor Corporation
Entity Type: Manufacturer
Industry: Automotive
Location: Japan
Size: Large

Entity Name: Stellantis
Entity Type: Manufacturer
Industry: Automotive
Location: Netherlands
Size: Large

Entity Name: Republic Services
Entity Type: Waste Management
Industry: Utilities
Location: USA
Size: Large

Entity Name: TripleA (AAA)
Entity Type: Insurance
Industry: Automotive Services
Location: USA
Size: Large

Entity Name: Saks Fifth Avenue
Entity Type: Retailer
Industry: Luxury Goods
Location: USA
Size: Large

Entity Name: 1-800Accountant
Entity Type: Financial Services
Industry: Accounting
Location: USA
Size: Medium

Entity Name: Houghton Mifflin Harcourt (HMH)
Entity Type: Education
Industry: Publishing
Location: USA
Size: Large

Entity Name: Instructure (Canvas)
Entity Type: Technology
Industry: EdTech
Location: USA
Size: Medium

Entity Name: Google AdSense
Entity Type: Technology
Industry: Advertising
Location: USA
Size: Large

Entity Name: HBO Max
Entity Type: Entertainment
Industry: Media
Location: USA
Size: Large

Entity Name: FedEx
Entity Type: Logistics
Industry: Transportation
Location: USA
Size: Large

Entity Name: Air France & KLM
Entity Type: Airline
Industry: Aviation
Location: France/Netherlands
Size: Large

Entity Name: Home Depot
Entity Type: Retailer
Industry: Home Improvement
Location: USA
Size: Large

Entity Name: Kering (Gucci, Balenciaga, etc.)
Entity Type: Retailer
Industry: Luxury Goods
Location: France
Size: Large

Entity Name: Qantas Airways
Entity Type: Airline
Industry: Aviation
Location: Australia
Size: Large (6M+ Customer Records Exposed)
Customers Affected: 6,000,000

Entity Name: Qantas
Entity Type: Airline
Industry: Aviation
Location: Australia
Size: Large (5.7 million customers affected)
Customers Affected: 5.7 million

Entity Name: Qantas
Entity Type: Corporation
Industry: Aviation
Location: Australia
Customers Affected: Up to 5.7 million

Incident Response Plan Activated: ['Likely (e.g., Google’s mitigation for UNC6040)', 'Salesforce Flash Warning (FBI)']
Third Party Assistance: Resecurity (Threat Intelligence), Fbi (Investigation), Dark Web Monitoring Firms.
Law Enforcement Notified: FBI (Flash Warning), Potential GDPR Regulators (EU), Australian Authorities (Qantas),
Containment Measures: Salesforce Instance IsolationOAuth Token RevocationDark Web Takedown Attempts (DDoS on DLS)
Remediation Measures: Patch Management (Salesforce)Multi-Factor Authentication (MFA) EnforcementEmployee Training (Anti-Phishing)
Recovery Measures: Data Restoration (Backups)Customer Notification (e.g., Stellantis)Regulatory Filings
Communication Strategy: Public Statements (Downplaying Impact, e.g., Salesforce)Customer Advisories (Deadline: 2025-10-10)Media Engagement
Network Segmentation: ['Likely (to isolate Salesforce instances)']
Enhanced Monitoring: FBI Indicators of Compromise (IoCs)Dark Web Threat Intelligence

Incident Response Plan Activated: Yes (24/7 support line, identity protection advice)
Third Party Assistance: External Cybersecurity Experts, Legal Support (Nsw Supreme Court Injunction).
Law Enforcement Notified: Yes (investigated with authorities)
Containment Measures: Legal Injunction to Block Data Access/Use
Remediation Measures: Customer Support (Identity Protection Advice)Monitoring for Suspicious Activity
Communication Strategy: Public StatementsCustomer Advisories
Enhanced Monitoring: Likely (advised customers to monitor accounts)

Incident Response Plan Activated: Yes (collaboration with ACSC, AFP, and cybersecurity experts)
Third Party Assistance: Australian Cyber Security Centre (Acsc), Australian Federal Police (Afp), Specialist Cybersecurity Experts (Unnamed).
Law Enforcement Notified: Yes (AFP, FBI involved; NSW Supreme Court injunction obtained)
Containment Measures: Legal Injunction to Block Data Access/ReleaseDark Web Monitoring
Remediation Measures: Investigation into leaked data scopeIdentity protection services for affected customers
Recovery Measures: 24/7 Support Line for CustomersOngoing Updates via Qantas Website
Communication Strategy: Public Statements (via ABC, Information Age)Website UpdatesDirect Customer Notifications (via email/support line)
Enhanced Monitoring: Likely (given collaboration with ACSC/AFP)

Incident Response Plan Activated: True
Third Party Assistance: Australian Security Services, Legal Counsel (For Injunction).
Containment Measures: Legal injunction to block data disseminationAccess revocation for compromised systems
Remediation Measures: Customer notifications (email)Impact analysis (Google)
Communication Strategy: Public statements (Qantas, Google)Media engagement

Incident Response Plan Activated: True
Third Party Assistance: Salesforce, Law Enforcement.
Containment Measures: Credential ResetsIncreased Monitoring for Unusual ActivityInjunction to Deter Data Dissemination
Remediation Measures: Strengthened Monitoring CapabilitiesSupplier Access Tightening
Recovery Measures: Customer Communications (Scam Awareness)Identity Protection Support
Communication Strategy: Public StatementsCustomer Advisories on Scam Prevention

Incident Response Plan Activated: Yes (investigation ongoing since July)
Third Party Assistance: Federal Government, Australian Federal Police, Cybersecurity Experts.
Law Enforcement Notified: Yes
Containment Measures: NSW Supreme Court injunction to block data accessDark web monitoring
Recovery Measures: Customer notifications (July)Advisories on phishing risks
Communication Strategy: Public statements (July and post-dark web leak)Direct emails to affected customersMedia interviews (e.g., Transport Minister Catherine King)
Enhanced Monitoring: Dark web channels monitored to confirm leaked data

Incident Response Plan Activated: True
Containment Measures: Legal Injunction to Prevent Data Spread (Australia-Only)
Communication Strategy: Public DisclosureCustomer Notifications (e.g., Google Notified Affected Partners)

Incident Response Plan Activated: Yes (collaboration with cybersecurity experts)
Third Party Assistance: Cybersecurity Experts (Unnamed), Australian Security Agencies.
Law Enforcement Notified: Yes (Australian authorities)
Containment Measures: Court Injunction to Block Data Access/UseThird-Party Platform Review
Recovery Measures: Customer CommunicationData Leak Investigation
Communication Strategy: Public Statements (Oct 12, 2025)Social Media UpdatesCustomer Advisories

Incident Response Plan Activated: ['Likely (given scale, but not publicly confirmed)']
Third Party Assistance: Cybersecurity Firms (E.G., Mandiant, Crowdstrike) Likely Engaged, Salesforce’S Internal Security Team.
Law Enforcement Notified: Probable (FBI, Interpol, or national cybercrime units),
Containment Measures: Salesforce likely patched the exploited vulnerabilityAffected companies may have isolated CRM systemsPassword resets for exposed accounts
Remediation Measures: Forensic analysis of breached systemsCustomer notifications (where legally required)Credit monitoring services for affected individuals
Communication Strategy: Limited public statements (e.g., Qantas acknowledged July 2025 third-party breach but did not name vendor)Telegram/Dark Web monitoring for further leaks
Network Segmentation: ['Likely implemented post-breach']
Enhanced Monitoring: Expected for Salesforce and affected companies

Incident Response Plan Activated: True
Third Party Assistance: Cybersecurity Experts.
Containment Measures: Court Order to Block Data Access/UseThird-Party Platform Isolation
Remediation Measures: Increased Team TrainingStrengthened System Monitoring/Detection
Recovery Measures: Customer Identity Protection ServicesOngoing Updates via Website/Support Line
Communication Strategy: Public StatementsCustomer Notifications (Specific Data Impact)Website Updates

Third Party Assistance: Idcare (Identity Support For Affected Customers).
Recovery Measures: Case-by-Case Support via IDCARE
Communication Strategy: Statement on Qantas WebsiteNo Direct Customer Notifications (Criticized)

Communication Strategy: Public disclosure (confirmed exposure)
Incident Response Plan: The company's incident response plan is described as Likely (e.g., Google’s mitigation for UNC6040), Salesforce Flash Warning (FBI), , Yes (24/7 support line, identity protection advice), Yes (collaboration with ACSC, AFP, and cybersecurity experts), , , Yes (investigation ongoing since July), , Yes (collaboration with cybersecurity experts), Likely (given scale, but not publicly confirmed), , .
Third-Party Assistance: The company involves third-party assistance in incident response through Resecurity (Threat Intelligence), FBI (Investigation), Dark Web Monitoring Firms, , External Cybersecurity Experts, Legal Support (NSW Supreme Court Injunction), , Australian Cyber Security Centre (ACSC), Australian Federal Police (AFP), Specialist Cybersecurity Experts (unnamed), , Australian security services, Legal counsel (for injunction), , Salesforce, Law Enforcement, , Federal Government, Australian Federal Police, Cybersecurity Experts, , Cybersecurity Experts (unnamed), Australian Security Agencies, , Cybersecurity firms (e.g., Mandiant, CrowdStrike) likely engaged, Salesforce’s internal security team, , Cybersecurity Experts, , IDCARE (Identity Support for Affected Customers), .

Type of Data Compromised: Pii (passenger records, loyalty points), Corporate emails, Internal communications, Customer-vendor relationships, Employee data (law enforcement/military), Advertising partner data (google adwords), Salesforce records (accounts, contacts, cases)
Number of Records Exposed: 1,563,633,235 (claimed total); 39M+ (Aeromexico); 160M+ (Vietnam CIC)
Sensitivity of Data: High (PII, Government/Military Personnel)Medium (Corporate Communications)
Data Exfiltration: Confirmed (Samples shared on DLS)Ongoing (Dark Web Monetization)
Data Encryption: ['Partial (Ransomware Threats, but no widespread encryption reported)']
File Types Exposed: CSV/Excel (Customer Records)EmailsPDFs (Internal Documents)Database Dumps
Personally Identifiable Information: NamesContact DetailsLoyalty Program DataTravel HistoryEmployee IDsGovernment Affiliation Records

Type of Data Compromised: Personal identifiable information (pii), Contact information
Number of Records Exposed: 5,000,000 (Qantas); up to 1,000,000,000 (global)
Sensitivity of Data: High (includes dates of birth, purchase histories, passport numbers for some victims)
Data Exfiltration: Yes (leaked on dark web)
Personally Identifiable Information: Email AddressesPhone NumbersBirth DatesFrequent Flyer NumbersPassport Numbers (for some global victims)

Type of Data Compromised: Personally identifiable information (pii), Loyalty program data
Number of Records Exposed: 5,000,000
Sensitivity of Data: Moderate (no financial/password data, but PII + family links exposed)
Data Exfiltration: Yes (153GB dumped to dark web and clear-web forums)
Data Encryption: No (data published in raw format)
Personally Identifiable Information: Full NamesEmail AddressesPhone NumbersDates of BirthFrequent Flyer Numbers

Type of Data Compromised: Personal identifiable information (pii), Customer records
Number of Records Exposed: 5.7 million (Qantas); unspecified for other firms
Sensitivity of Data: Moderate (no financial/passport data; includes addresses, birthdays, meal preferences)
Personally Identifiable Information: NamesEmail addressesPhone numbersHome/business addressesDates of birthGenderMeal preferencesFrequent flyer details

Type of Data Compromised: Personal identifiable information (pii), Frequent-flyer data
Number of Records Exposed: 5-5.7 million
Sensitivity of Data: High (sufficient for phishing/account takeover)

Type of Data Compromised: Personally identifiable information (pii), Customer account data
Number of Records Exposed: 5,900,000 (approx.)
Sensitivity of Data: Moderate to High (includes home addresses, birth dates, and frequent flyer details)
Data Exfiltration: Confirmed (data released on dark web)
Personally Identifiable Information: NamesEmail AddressesPhone NumbersBirth DatesHome Addresses (partial)Frequent Flyer Numbers

Type of Data Compromised: Personal identifiable information (pii), Frequent flyer information, Contact details, Demographic data (gender, meal preferences), Addresses (home/business)
Number of Records Exposed: 5.7 million (Qantas only; others unspecified)
Sensitivity of Data: Moderate (No Financial/Passport Data, but PII Exposed)

Type of Data Compromised: Personally identifiable information (pii), Customer profiles, Frequent flyer data, Preference data (e.g., meal choices)
Number of Records Exposed: 5,000,000+
Sensitivity of Data: High (includes addresses, birth dates, and contact details)
Data Exfiltration: Confirmed (data published by hackers post-ransom deadline)
Personally Identifiable Information: Full NamesEmail AddressesPhone NumbersHome/Business AddressesBirth DatesGenders

Type of Data Compromised: Personally identifiable information (pii), Loyalty program data, Customer relationship management (crm) metadata, Internal business records, Geolocation data, Corporate contact information, Travel history, Financial metadata (e.g., currency used, points balance)
Number of Records Exposed: {'total_claimed': 989000000, 'leaked_so_far': 29733000, 'unreleased': 959267000}
Sensitivity of Data: High (PII, passport numbers, internal CRM fields)
Data Exfiltration: Method: Likely via exploited Salesforce API or authentication flaw, Timeline: Prior to October 3, 2025 (discovery date), Storage: JSON/CSV files hosted on hacker-controlled leak portal,
Data Encryption: ['Unencrypted (data was in plaintext JSON/CSV formats)']
File Types Exposed: JSON (primary)CSV (Fujifilm)
Personally Identifiable Information: Full NamesDates of BirthPassport NumbersPhone NumbersEmail AddressesMailing Addresses (with geolocation)Frequent Flyer NumbersInternal Account IDsGenderAgeCorporate RolesTax Information (partial)

Type of Data Compromised: Personal identifiable information (pii), Service records
Number of Records Exposed: 6,000,000
Sensitivity of Data: Moderate (No Financial/Passport Data)
File Types Exposed: Customer Service Records
Personally Identifiable Information: NamesEmail AddressesPhone NumbersBirth DatesFrequent Flyer Numbers

Type of Data Compromised: Names, Addresses, Personally identifiable information (pii)
Number of Records Exposed: 5.7 million
Sensitivity of Data: High (PII cannot be changed, e.g., date of birth)
Data Exfiltration: Yes (Released on Dark Web)
Personally Identifiable Information: NamesAddressesPotentially Dates of Birth

Type of Data Compromised: Customer data
Number of Records Exposed: Up to 5.7 million
Sensitivity of Data: High (exposed on dark web)
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Patch Management (Salesforce), Multi-Factor Authentication (MFA) Enforcement, Employee Training (Anti-Phishing), , Customer Support (Identity Protection Advice), Monitoring for Suspicious Activity, , Investigation into leaked data scope, Identity protection services for affected customers, , Customer notifications (email), Impact analysis (Google), , Strengthened Monitoring Capabilities, Supplier Access Tightening, , Forensic analysis of breached systems, Customer notifications (where legally required), Credit monitoring services for affected individuals, , Increased Team Training, Strengthened System Monitoring/Detection, .
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by salesforce instance isolation, oauth token revocation, dark web takedown attempts (ddos on dls), , legal injunction to block data access/use, , legal injunction to block data access/release, dark web monitoring, , legal injunction to block data dissemination, access revocation for compromised systems, , credential resets, increased monitoring for unusual activity, injunction to deter data dissemination, , nsw supreme court injunction to block data access, dark web monitoring, , legal injunction to prevent data spread (australia-only), , court injunction to block data access/use, third-party platform review, , salesforce likely patched the exploited vulnerability, affected companies may have isolated crm systems, password resets for exposed accounts, , court order to block data access/use, third-party platform isolation and .

Ransom Demanded: ['Undisclosed (Negotiation Deadline: 2025-10-10)', 'Threats of Regulatory Reporting (GDPR)']
Ransomware Strain: Custom (Trinity of Chaos)Associated with Lapsus$/Scattered Spider TTPs
Data Encryption: ['Limited (Focus on Exfiltration + Extortion)']
Data Exfiltration: ['Massive (1.5B+ records claimed)']

Ransom Demanded: Yes (unspecified amount)
Ransom Paid: No
Data Encryption: No (data stolen but not encrypted)
Data Exfiltration: Yes

Ransom Demanded: Yes (amount undisclosed; deadline: 2023-10-10)
Ransom Paid: No
Data Encryption: No (data exfiltrated but not encrypted on Qantas systems)
Data Exfiltration: Yes (153GB)

Ransom Demanded: Yes (by Scattered Lapsus$ Hunters; amount undisclosed)
Ransom Paid: No (Qantas and Salesforce refused to negotiate)
Data Exfiltration: Yes

Ransom Demanded: Yes (by Scattered Lapsus$ Hunters; deadline passed)
Ransom Paid: No (ransom deadline ignored; data released)
Data Exfiltration: Yes

Ransom Demanded: ['Negotiation demanded (no specific amount disclosed)']
Ransom Paid: Unknown (no reports of payments)
Data Encryption: ['No (data was exfiltrated, not encrypted)']
Data Exfiltration: ['Yes (989M records claimed, 29.7M leaked)']

Data Exfiltration: True

Ransom Demanded: Yes (Unspecified Amount)
Ransom Paid: No
Data Exfiltration: Yes (Released on Dark Web)
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Data Restoration (Backups), Customer Notification (e.g., Stellantis), Regulatory Filings, , 24/7 Support Line for Customers, Ongoing Updates via Qantas Website, , Customer Communications (Scam Awareness), Identity Protection Support, , Customer notifications (July), Advisories on phishing risks, , Customer Communication, Data Leak Investigation, , Customer Identity Protection Services, Ongoing Updates via Website/Support Line, , Case-by-Case Support via IDCARE, .

Regulations Violated: GDPR (EU-based victims), Vietnam Data Protection Laws, Australian Privacy Act (Qantas), U.S. State Breach Laws,
Fines Imposed: ['Potential (e.g., Qantas previously fined for negligence)', 'GDPR Penalties (Up to 4% of global revenue)']
Legal Actions: Class-Action Lawsuits (Expected), Criminal Negligence Charges (Threatened), Regulatory Investigations (Ongoing),
Regulatory Notifications: GDPR Authorities (EU)FBI (USA)Vietnamese CERTAustralian OAIC

Legal Actions: NSW Supreme Court Injunction (to block data misuse),

Regulations Violated: Potential: Australian Privacy Act 1988, Potential: GDPR (for EU customers),
Legal Actions: NSW Supreme Court Interim Injunction (July 2023), AFP/FBI Investigation,
Regulatory Notifications: Australian Cyber Security Centre (ACSC)Australian Federal Police (AFP)

Legal Actions: Legal injunction (Qantas vs. data dissemination),

Regulations Violated: Australia's Privacy Act (post-Optus regime),
Legal Actions: Regulatory Scrutiny, Potential Enforceable Undertakings,

Legal Actions: NSW Supreme Court injunction to prevent data access,
Regulatory Notifications: Federal GovernmentAustralian Federal Police

Legal Actions: Qantas Secured Injunction from Supreme Court of New South Wales,

Regulations Violated: Australian Privacy Act (Mandatory Data Breach Notification), Potential GDPR (if EU customers affected),
Legal Actions: Court Injunction Filed (to block data dissemination),
Regulatory Notifications: Office of the Australian Information Commissioner (OAIC)

Regulations Violated: GDPR (for EU customer data), CCPA (California Consumer Privacy Act), APPI (Japan’s Act on the Protection of Personal Information), Australia’s Privacy Act 1988, Other regional data protection laws,
Legal Actions: Potential class-action lawsuits, Regulatory investigations (e.g., by ICO, FTC),
Regulatory Notifications: Likely required for GDPR (within 72 hours of discovery)State-level notifications in the U.S. (e.g., California Attorney General)

Legal Actions: Court Order to Prevent Data Dissemination,

Regulations Violated: Potential Violation of Australian Privacy Act (Australian Privacy Principles),
Fines Imposed: ['Speculated to be in Billions (Under Investigation)']
Legal Actions: Regulatory Investigation by Office of the Australian Information Commissioner,
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Class-Action Lawsuits (Expected), Criminal Negligence Charges (Threatened), Regulatory Investigations (Ongoing), , NSW Supreme Court Injunction (to block data misuse), , NSW Supreme Court Interim Injunction (July 2023), AFP/FBI Investigation, , Legal injunction (Qantas vs. data dissemination), , Regulatory Scrutiny, Potential Enforceable Undertakings, , NSW Supreme Court injunction to prevent data access, , Qantas Secured Injunction from Supreme Court of New South Wales, , Court Injunction Filed (to block data dissemination), , Potential class-action lawsuits, Regulatory investigations (e.g., by ICO, FTC), , Court Order to Prevent Data Dissemination, , Regulatory Investigation by Office of the Australian Information Commissioner, .

Lessons Learned: OAuth token security requires stricter monitoring (Salesloft Drift integration)., Dark Web monitoring is critical for early detection of leaked data., Regulatory threats (e.g., GDPR reporting) are increasingly used as leverage by ransomware groups., Supply chain risks (e.g., Salesforce instances) can amplify breach impacts across industries., Proactive communication with threat actors may prevent public disclosure (failed in this case)., Government shutdowns can hinder cybersecurity response capabilities.

Lessons Learned: Third-party vendor risks (Salesforce database targeted), Importance of refusing ransom payments to avoid encouraging cybercrime, Need for proactive customer support (identity protection advice) post-breach, Legal measures (injunctions) can mitigate damage but not prevent initial leaks

Lessons Learned: Social engineering remains a highly effective attack vector, exploiting human trust rather than technical vulnerabilities., Third-party vendor risks (e.g., Salesforce) can amplify breach impact across multiple organizations., Legal injunctions have limited efficacy in preventing dark web data dissemination.

Lessons Learned: Third-party vendor risks require stricter access controls and monitoring., Data minimization practices must be enforced to limit exposure., Proactive customer communication is critical to mitigate reputational harm., Incident response coordination with third parties (e.g., Salesforce) is essential.

Lessons Learned: The incident highlights the vulnerability of third-party platforms (e.g., Salesforce) as single points of failure for multiple organizations. Social engineering remains a highly effective attack vector, exploiting human error rather than technical flaws. Legal injunctions may have limited efficacy in cross-border cybercrime cases.

Lessons Learned: Third-party vendor risks require stricter oversight (e.g., call center platforms)., Court injunctions may be ineffective against cybercriminals (per Troy Hunt)., Need for proactive dark web monitoring to detect leaked data early., Customer data minimization (e.g., meal preferences) could reduce exposure.

Lessons Learned: Third-party vendor risks remain a critical attack vector, especially for cloud-based CRM platforms like Salesforce., Multi-factor authentication (MFA) and API security controls are essential for protecting customer data at scale., Proactive threat intelligence monitoring can help detect reconnaissance by groups like Scattered Lapsus$ Hunters., Transparency in breach disclosures (e.g., naming third-party vendors) can help customers assess their risk., Legacy data retention policies may exacerbate breaches (e.g., storing passport numbers or decades-old loyalty data).

Lessons Learned: Prioritize security over profit maximization for shareholders., Ensure timely and transparent communication with affected customers., Third-party platform security must be rigorously vetted and monitored., Proactive measures are needed to prevent social engineering attacks.

Recommendations: Implement Zero Trust Architecture for cloud services (e.g., Salesforce)., Enforce MFA and conditional access policies for all OAuth integrations., Conduct third-party risk assessments for SaaS providers (e.g., Drift, Salesloft)., Establish a Dark Web monitoring program to detect leaked credentials/data., Develop a pre-emptive regulatory engagement strategy (e.g., GDPR breach notifications)., Train employees on vishing/social engineering tactics used by groups like Lapsus$., Isolate high-value systems (e.g., airline passenger databases) with network segmentation., Prepare for DDoS attacks on leak sites (e.g., Trinity of Chaos DLS)., Coordinate with law enforcement (FBI, INTERPOL) for threat actor disruption., Review incident response plans for ransomware extortion + data leak scenarios.Implement Zero Trust Architecture for cloud services (e.g., Salesforce)., Enforce MFA and conditional access policies for all OAuth integrations., Conduct third-party risk assessments for SaaS providers (e.g., Drift, Salesloft)., Establish a Dark Web monitoring program to detect leaked credentials/data., Develop a pre-emptive regulatory engagement strategy (e.g., GDPR breach notifications)., Train employees on vishing/social engineering tactics used by groups like Lapsus$., Isolate high-value systems (e.g., airline passenger databases) with network segmentation., Prepare for DDoS attacks on leak sites (e.g., Trinity of Chaos DLS)., Coordinate with law enforcement (FBI, INTERPOL) for threat actor disruption., Review incident response plans for ransomware extortion + data leak scenarios.Implement Zero Trust Architecture for cloud services (e.g., Salesforce)., Enforce MFA and conditional access policies for all OAuth integrations., Conduct third-party risk assessments for SaaS providers (e.g., Drift, Salesloft)., Establish a Dark Web monitoring program to detect leaked credentials/data., Develop a pre-emptive regulatory engagement strategy (e.g., GDPR breach notifications)., Train employees on vishing/social engineering tactics used by groups like Lapsus$., Isolate high-value systems (e.g., airline passenger databases) with network segmentation., Prepare for DDoS attacks on leak sites (e.g., Trinity of Chaos DLS)., Coordinate with law enforcement (FBI, INTERPOL) for threat actor disruption., Review incident response plans for ransomware extortion + data leak scenarios.Implement Zero Trust Architecture for cloud services (e.g., Salesforce)., Enforce MFA and conditional access policies for all OAuth integrations., Conduct third-party risk assessments for SaaS providers (e.g., Drift, Salesloft)., Establish a Dark Web monitoring program to detect leaked credentials/data., Develop a pre-emptive regulatory engagement strategy (e.g., GDPR breach notifications)., Train employees on vishing/social engineering tactics used by groups like Lapsus$., Isolate high-value systems (e.g., airline passenger databases) with network segmentation., Prepare for DDoS attacks on leak sites (e.g., Trinity of Chaos DLS)., Coordinate with law enforcement (FBI, INTERPOL) for threat actor disruption., Review incident response plans for ransomware extortion + data leak scenarios.Implement Zero Trust Architecture for cloud services (e.g., Salesforce)., Enforce MFA and conditional access policies for all OAuth integrations., Conduct third-party risk assessments for SaaS providers (e.g., Drift, Salesloft)., Establish a Dark Web monitoring program to detect leaked credentials/data., Develop a pre-emptive regulatory engagement strategy (e.g., GDPR breach notifications)., Train employees on vishing/social engineering tactics used by groups like Lapsus$., Isolate high-value systems (e.g., airline passenger databases) with network segmentation., Prepare for DDoS attacks on leak sites (e.g., Trinity of Chaos DLS)., Coordinate with law enforcement (FBI, INTERPOL) for threat actor disruption., Review incident response plans for ransomware extortion + data leak scenarios.Implement Zero Trust Architecture for cloud services (e.g., Salesforce)., Enforce MFA and conditional access policies for all OAuth integrations., Conduct third-party risk assessments for SaaS providers (e.g., Drift, Salesloft)., Establish a Dark Web monitoring program to detect leaked credentials/data., Develop a pre-emptive regulatory engagement strategy (e.g., GDPR breach notifications)., Train employees on vishing/social engineering tactics used by groups like Lapsus$., Isolate high-value systems (e.g., airline passenger databases) with network segmentation., Prepare for DDoS attacks on leak sites (e.g., Trinity of Chaos DLS)., Coordinate with law enforcement (FBI, INTERPOL) for threat actor disruption., Review incident response plans for ransomware extortion + data leak scenarios.Implement Zero Trust Architecture for cloud services (e.g., Salesforce)., Enforce MFA and conditional access policies for all OAuth integrations., Conduct third-party risk assessments for SaaS providers (e.g., Drift, Salesloft)., Establish a Dark Web monitoring program to detect leaked credentials/data., Develop a pre-emptive regulatory engagement strategy (e.g., GDPR breach notifications)., Train employees on vishing/social engineering tactics used by groups like Lapsus$., Isolate high-value systems (e.g., airline passenger databases) with network segmentation., Prepare for DDoS attacks on leak sites (e.g., Trinity of Chaos DLS)., Coordinate with law enforcement (FBI, INTERPOL) for threat actor disruption., Review incident response plans for ransomware extortion + data leak scenarios.Implement Zero Trust Architecture for cloud services (e.g., Salesforce)., Enforce MFA and conditional access policies for all OAuth integrations., Conduct third-party risk assessments for SaaS providers (e.g., Drift, Salesloft)., Establish a Dark Web monitoring program to detect leaked credentials/data., Develop a pre-emptive regulatory engagement strategy (e.g., GDPR breach notifications)., Train employees on vishing/social engineering tactics used by groups like Lapsus$., Isolate high-value systems (e.g., airline passenger databases) with network segmentation., Prepare for DDoS attacks on leak sites (e.g., Trinity of Chaos DLS)., Coordinate with law enforcement (FBI, INTERPOL) for threat actor disruption., Review incident response plans for ransomware extortion + data leak scenarios.Implement Zero Trust Architecture for cloud services (e.g., Salesforce)., Enforce MFA and conditional access policies for all OAuth integrations., Conduct third-party risk assessments for SaaS providers (e.g., Drift, Salesloft)., Establish a Dark Web monitoring program to detect leaked credentials/data., Develop a pre-emptive regulatory engagement strategy (e.g., GDPR breach notifications)., Train employees on vishing/social engineering tactics used by groups like Lapsus$., Isolate high-value systems (e.g., airline passenger databases) with network segmentation., Prepare for DDoS attacks on leak sites (e.g., Trinity of Chaos DLS)., Coordinate with law enforcement (FBI, INTERPOL) for threat actor disruption., Review incident response plans for ransomware extortion + data leak scenarios.Implement Zero Trust Architecture for cloud services (e.g., Salesforce)., Enforce MFA and conditional access policies for all OAuth integrations., Conduct third-party risk assessments for SaaS providers (e.g., Drift, Salesloft)., Establish a Dark Web monitoring program to detect leaked credentials/data., Develop a pre-emptive regulatory engagement strategy (e.g., GDPR breach notifications)., Train employees on vishing/social engineering tactics used by groups like Lapsus$., Isolate high-value systems (e.g., airline passenger databases) with network segmentation., Prepare for DDoS attacks on leak sites (e.g., Trinity of Chaos DLS)., Coordinate with law enforcement (FBI, INTERPOL) for threat actor disruption., Review incident response plans for ransomware extortion + data leak scenarios.

Recommendations: Enhance third-party risk assessments (e.g., Salesforce security audits), Implement stricter data access controls and monitoring for high-value databases, Educate customers on phishing risks post-breach (personalized scams likely), Collaborate with law enforcement and cybersecurity firms for threat intelligence sharing, Consider proactive dark web monitoring for leaked dataEnhance third-party risk assessments (e.g., Salesforce security audits), Implement stricter data access controls and monitoring for high-value databases, Educate customers on phishing risks post-breach (personalized scams likely), Collaborate with law enforcement and cybersecurity firms for threat intelligence sharing, Consider proactive dark web monitoring for leaked dataEnhance third-party risk assessments (e.g., Salesforce security audits), Implement stricter data access controls and monitoring for high-value databases, Educate customers on phishing risks post-breach (personalized scams likely), Collaborate with law enforcement and cybersecurity firms for threat intelligence sharing, Consider proactive dark web monitoring for leaked dataEnhance third-party risk assessments (e.g., Salesforce security audits), Implement stricter data access controls and monitoring for high-value databases, Educate customers on phishing risks post-breach (personalized scams likely), Collaborate with law enforcement and cybersecurity firms for threat intelligence sharing, Consider proactive dark web monitoring for leaked dataEnhance third-party risk assessments (e.g., Salesforce security audits), Implement stricter data access controls and monitoring for high-value databases, Educate customers on phishing risks post-breach (personalized scams likely), Collaborate with law enforcement and cybersecurity firms for threat intelligence sharing, Consider proactive dark web monitoring for leaked data

Recommendations: Enhance employee training on social engineering and phishing (especially for customer support teams)., Implement multi-factor authentication (MFA) for third-party platform access., Conduct regular third-party risk assessments for vendors handling sensitive data., Develop cross-organizational incident response protocols for supply chain attacks.Enhance employee training on social engineering and phishing (especially for customer support teams)., Implement multi-factor authentication (MFA) for third-party platform access., Conduct regular third-party risk assessments for vendors handling sensitive data., Develop cross-organizational incident response protocols for supply chain attacks.Enhance employee training on social engineering and phishing (especially for customer support teams)., Implement multi-factor authentication (MFA) for third-party platform access., Conduct regular third-party risk assessments for vendors handling sensitive data., Develop cross-organizational incident response protocols for supply chain attacks.Enhance employee training on social engineering and phishing (especially for customer support teams)., Implement multi-factor authentication (MFA) for third-party platform access., Conduct regular third-party risk assessments for vendors handling sensitive data., Develop cross-organizational incident response protocols for supply chain attacks.

Recommendations: Implement stricter supplier access controls and audit trails., Enhance data minimization strategies to reduce exposure in third-party systems., Invest in advanced threat detection for credential abuse and social engineering., Develop a robust customer support framework for post-breach identity protection., Conduct regular third-party security assessments and penetration testing.Implement stricter supplier access controls and audit trails., Enhance data minimization strategies to reduce exposure in third-party systems., Invest in advanced threat detection for credential abuse and social engineering., Develop a robust customer support framework for post-breach identity protection., Conduct regular third-party security assessments and penetration testing.Implement stricter supplier access controls and audit trails., Enhance data minimization strategies to reduce exposure in third-party systems., Invest in advanced threat detection for credential abuse and social engineering., Develop a robust customer support framework for post-breach identity protection., Conduct regular third-party security assessments and penetration testing.Implement stricter supplier access controls and audit trails., Enhance data minimization strategies to reduce exposure in third-party systems., Invest in advanced threat detection for credential abuse and social engineering., Develop a robust customer support framework for post-breach identity protection., Conduct regular third-party security assessments and penetration testing.Implement stricter supplier access controls and audit trails., Enhance data minimization strategies to reduce exposure in third-party systems., Invest in advanced threat detection for credential abuse and social engineering., Develop a robust customer support framework for post-breach identity protection., Conduct regular third-party security assessments and penetration testing.

Recommendations: Enable two-step authentication for online accounts, Avoid clicking links in unsolicited emails/texts, Verify caller identities via official channels, Monitor credit reports for fraudulent activity, Use resources like IDCare, Australian Cyber Security Centre, and ScamwatchEnable two-step authentication for online accounts, Avoid clicking links in unsolicited emails/texts, Verify caller identities via official channels, Monitor credit reports for fraudulent activity, Use resources like IDCare, Australian Cyber Security Centre, and ScamwatchEnable two-step authentication for online accounts, Avoid clicking links in unsolicited emails/texts, Verify caller identities via official channels, Monitor credit reports for fraudulent activity, Use resources like IDCare, Australian Cyber Security Centre, and ScamwatchEnable two-step authentication for online accounts, Avoid clicking links in unsolicited emails/texts, Verify caller identities via official channels, Monitor credit reports for fraudulent activity, Use resources like IDCare, Australian Cyber Security Centre, and ScamwatchEnable two-step authentication for online accounts, Avoid clicking links in unsolicited emails/texts, Verify caller identities via official channels, Monitor credit reports for fraudulent activity, Use resources like IDCare, Australian Cyber Security Centre, and Scamwatch

Recommendations: Enhance employee training to recognize social engineering tactics (e.g., impersonation scams)., Implement multi-factor authentication (MFA) and stricter access controls for third-party platforms., Conduct regular audits of third-party vendors’ security practices., Develop cross-border legal strategies to address data breaches with global implications., Improve incident response coordination among affected entities in supply-chain attacks.Enhance employee training to recognize social engineering tactics (e.g., impersonation scams)., Implement multi-factor authentication (MFA) and stricter access controls for third-party platforms., Conduct regular audits of third-party vendors’ security practices., Develop cross-border legal strategies to address data breaches with global implications., Improve incident response coordination among affected entities in supply-chain attacks.Enhance employee training to recognize social engineering tactics (e.g., impersonation scams)., Implement multi-factor authentication (MFA) and stricter access controls for third-party platforms., Conduct regular audits of third-party vendors’ security practices., Develop cross-border legal strategies to address data breaches with global implications., Improve incident response coordination among affected entities in supply-chain attacks.Enhance employee training to recognize social engineering tactics (e.g., impersonation scams)., Implement multi-factor authentication (MFA) and stricter access controls for third-party platforms., Conduct regular audits of third-party vendors’ security practices., Develop cross-border legal strategies to address data breaches with global implications., Improve incident response coordination among affected entities in supply-chain attacks.Enhance employee training to recognize social engineering tactics (e.g., impersonation scams)., Implement multi-factor authentication (MFA) and stricter access controls for third-party platforms., Conduct regular audits of third-party vendors’ security practices., Develop cross-border legal strategies to address data breaches with global implications., Improve incident response coordination among affected entities in supply-chain attacks.

Recommendations: Implement zero-trust architecture for third-party integrations., Enhance incident response plans for ransomware/data extortion scenarios., Conduct regular third-party security audits (especially for customer-facing platforms)., Explore data anonymization for non-critical customer preferences., Advocate for stronger international cybercrime enforcement collaboration.Implement zero-trust architecture for third-party integrations., Enhance incident response plans for ransomware/data extortion scenarios., Conduct regular third-party security audits (especially for customer-facing platforms)., Explore data anonymization for non-critical customer preferences., Advocate for stronger international cybercrime enforcement collaboration.Implement zero-trust architecture for third-party integrations., Enhance incident response plans for ransomware/data extortion scenarios., Conduct regular third-party security audits (especially for customer-facing platforms)., Explore data anonymization for non-critical customer preferences., Advocate for stronger international cybercrime enforcement collaboration.Implement zero-trust architecture for third-party integrations., Enhance incident response plans for ransomware/data extortion scenarios., Conduct regular third-party security audits (especially for customer-facing platforms)., Explore data anonymization for non-critical customer preferences., Advocate for stronger international cybercrime enforcement collaboration.Implement zero-trust architecture for third-party integrations., Enhance incident response plans for ransomware/data extortion scenarios., Conduct regular third-party security audits (especially for customer-facing platforms)., Explore data anonymization for non-critical customer preferences., Advocate for stronger international cybercrime enforcement collaboration.

Recommendations: For Industry: Advocate for standardized third-party risk management frameworks., Push for stronger enforcement of data minimization principles in cloud services., Invest in dark web monitoring to detect leaked credentials early., For Industry: Advocate for standardized third-party risk management frameworks., Push for stronger enforcement of data minimization principles in cloud services., Invest in dark web monitoring to detect leaked credentials early., For Industry: Advocate for standardized third-party risk management frameworks., Push for stronger enforcement of data minimization principles in cloud services., Invest in dark web monitoring to detect leaked credentials early., For Industry: Advocate for standardized third-party risk management frameworks., Push for stronger enforcement of data minimization principles in cloud services., Invest in dark web monitoring to detect leaked credentials early..

Recommendations: Implement stricter access controls and multi-factor authentication for third-party platforms., Provide free identity monitoring services to affected customers., Enhance employee training to prevent social engineering attacks., Establish a clear, proactive communication plan for data breaches., Conduct regular security audits of third-party vendors.Implement stricter access controls and multi-factor authentication for third-party platforms., Provide free identity monitoring services to affected customers., Enhance employee training to prevent social engineering attacks., Establish a clear, proactive communication plan for data breaches., Conduct regular security audits of third-party vendors.Implement stricter access controls and multi-factor authentication for third-party platforms., Provide free identity monitoring services to affected customers., Enhance employee training to prevent social engineering attacks., Establish a clear, proactive communication plan for data breaches., Conduct regular security audits of third-party vendors.Implement stricter access controls and multi-factor authentication for third-party platforms., Provide free identity monitoring services to affected customers., Enhance employee training to prevent social engineering attacks., Establish a clear, proactive communication plan for data breaches., Conduct regular security audits of third-party vendors.Implement stricter access controls and multi-factor authentication for third-party platforms., Provide free identity monitoring services to affected customers., Enhance employee training to prevent social engineering attacks., Establish a clear, proactive communication plan for data breaches., Conduct regular security audits of third-party vendors.
Key Lessons Learned: The key lessons learned from past incidents are OAuth token security requires stricter monitoring (Salesloft Drift integration).,Dark Web monitoring is critical for early detection of leaked data.,Regulatory threats (e.g., GDPR reporting) are increasingly used as leverage by ransomware groups.,Supply chain risks (e.g., Salesforce instances) can amplify breach impacts across industries.,Proactive communication with threat actors may prevent public disclosure (failed in this case).,Government shutdowns can hinder cybersecurity response capabilities.Third-party vendor risks (Salesforce database targeted),Importance of refusing ransom payments to avoid encouraging cybercrime,Need for proactive customer support (identity protection advice) post-breach,Legal measures (injunctions) can mitigate damage but not prevent initial leaksSocial engineering remains a highly effective attack vector, exploiting human trust rather than technical vulnerabilities.,Third-party vendor risks (e.g., Salesforce) can amplify breach impact across multiple organizations.,Legal injunctions have limited efficacy in preventing dark web data dissemination.Third-party vendor risks require stricter access controls and monitoring.,Data minimization practices must be enforced to limit exposure.,Proactive customer communication is critical to mitigate reputational harm.,Incident response coordination with third parties (e.g., Salesforce) is essential.The incident highlights the vulnerability of third-party platforms (e.g., Salesforce) as single points of failure for multiple organizations. Social engineering remains a highly effective attack vector, exploiting human error rather than technical flaws. Legal injunctions may have limited efficacy in cross-border cybercrime cases.Third-party vendor risks require stricter oversight (e.g., call center platforms).,Court injunctions may be ineffective against cybercriminals (per Troy Hunt).,Need for proactive dark web monitoring to detect leaked data early.,Customer data minimization (e.g., meal preferences) could reduce exposure.Third-party vendor risks remain a critical attack vector, especially for cloud-based CRM platforms like Salesforce.,Multi-factor authentication (MFA) and API security controls are essential for protecting customer data at scale.,Proactive threat intelligence monitoring can help detect reconnaissance by groups like Scattered Lapsus$ Hunters.,Transparency in breach disclosures (e.g., naming third-party vendors) can help customers assess their risk.,Legacy data retention policies may exacerbate breaches (e.g., storing passport numbers or decades-old loyalty data).Prioritize security over profit maximization for shareholders.,Ensure timely and transparent communication with affected customers.,Third-party platform security must be rigorously vetted and monitored.,Proactive measures are needed to prevent social engineering attacks.
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Consider proactive dark web monitoring for leaked data, Collaborate with law enforcement and cybersecurity firms for threat intelligence sharing, Enhance third-party risk assessments (e.g., Salesforce security audits), Monitor credit reports for fraudulent activity, Educate customers on phishing risks post-breach (personalized scams likely), Avoid clicking links in unsolicited emails/texts, Verify caller identities via official channels, Enable two-step authentication for online accounts, Implement stricter data access controls and monitoring for high-value databases, Use resources like IDCare, Australian Cyber Security Centre and and Scamwatch.

Source: Resecurity Threat Intelligence Report

Source: FBI Flash Warning (Salesforce Exploitation)

Source: Trinity of Chaos Data Leak Site (TOR)
Date Accessed: 2025-10-03

Source: Telegram Channel (SLSH 6.0 Part 3)
Date Accessed: 2025-10-03

Source: Google Security Blog (UNC6040 Incident)
Date Accessed: 2025-06-04

Source: Stellantis Breach Disclosure
Date Accessed: 2025-09-21

Source: Qantas GDPR Fine Announcement

Source: The Guardian Australia
URL: https://www.theguardian.com/australia-news
Date Accessed: 2024-09-21

Source: Cyber Threat Intelligence (Jeremy Kirk, Executive Editor)
Date Accessed: 2024-09-21

Source: Have I Been Pwned (Troy Hunt)
URL: https://haveibeenpwned.com
Date Accessed: 2023-10-07

Source: Scattered Lapsus$ Hunters (SLSH) Telegram Channel
Date Accessed: 2023-10-10

Source: Australian Federal Police (AFP) Advisory
URL: https://www.cyber.gov.au/report
Date Accessed: 2023-10-09

Source: Agence France-Presse (AFP)

Source: Qantas Airways Statement (2023-07)

Source: Google Cloud Security Communications (2023-08)

Source: Unit 42 Research Note (Scattered Lapsus$ Hunters)

Source: FBI Warning on Salesforce Attacks

Source: The Guardian

Source: Shutterstock (reported imagery)

Source: ABC News
URL: https://www.abc.net.au/news
Date Accessed: 2023-10-00

Source: University of New South Wales (Professor Richard Buckland)
Date Accessed: 2023-10-00

Source: AFP (Agence France-Presse)

Source: Troy Hunt (Cybersecurity Researcher)

Source: Unit 42 (Cybersecurity Research Team)

Source: FBI Warning on Salesforce Client Scams

Source: CloudTech News (TechForge Media)

Source: New York Times (via Troy Hunt interview)
Date Accessed: 2025-10-12

Source: vcpost.com (original article)
Date Accessed: 2025-10-12

Source: Twitter (JT @Matkins2021)
URL: https://twitter.com/Matkins2021/status/xxxxxx
Date Accessed: 2025-10-12

Source: Hackread.com
URL: https://www.hackread.com/salesforce-data-breach-scattered-lapsus-hunters/
Date Accessed: 2025-10-10

Source: Telegram (Threat Actor Communication)
Date Accessed: 2025-10-10

Source: Qantas Airways (July 2025 Breach Acknowledgment)
Date Accessed: 2025-07-01

Source: Qantas Airways Public Statement

Source: FBI Alert on Scattered Spider (X/Twitter)

Source: FOX Business Article

Source: AAP (Bianca De Marchi)

Source: Reuters (Hollie Adams)
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Resecurity Threat Intelligence Report, and Source: FBI Flash Warning (Salesforce Exploitation), and Source: Trinity of Chaos Data Leak Site (TOR)Date Accessed: 2025-10-03, and Source: Telegram Channel (SLSH 6.0 Part 3)Date Accessed: 2025-10-03, and Source: Google Security Blog (UNC6040 Incident)Date Accessed: 2025-06-04, and Source: Stellantis Breach DisclosureDate Accessed: 2025-09-21, and Source: Qantas GDPR Fine Announcement, and Source: The Guardian AustraliaUrl: https://www.theguardian.com/australia-newsDate Accessed: 2024-09-21, and Source: Cyber Threat Intelligence (Jeremy Kirk, Executive Editor)Date Accessed: 2024-09-21, and Source: ABC News AustraliaDate Accessed: 2023-10, and Source: Information AgeDate Accessed: 2023-10-09, and Source: Have I Been Pwned (Troy Hunt)Url: https://haveibeenpwned.comDate Accessed: 2023-10-07, and Source: Scattered Lapsus$ Hunters (SLSH) Telegram ChannelDate Accessed: 2023-10-10, and Source: Australian Federal Police (AFP) AdvisoryUrl: https://www.cyber.gov.au/reportDate Accessed: 2023-10-09, and Source: Agence France-Presse (AFP), and Source: Qantas Airways Statement (2023-07), and Source: Google Cloud Security Communications (2023-08), and Source: Unit 42 Research Note (Scattered Lapsus$ Hunters), and Source: FBI Warning on Salesforce Attacks, and Source: The Guardian, and Source: Shutterstock (reported imagery), and Source: ABC NewsUrl: https://www.abc.net.au/newsDate Accessed: 2023-10-00, and Source: University of New South Wales (Professor Richard Buckland)Date Accessed: 2023-10-00, and Source: AFP (Agence France-Presse), and Source: Troy Hunt (Cybersecurity Researcher), and Source: Unit 42 (Cybersecurity Research Team), and Source: FBI Warning on Salesforce Client Scams, and Source: CloudTech News (TechForge Media)Url: https://www.cloudcomputing-news.net/, and Source: ReutersDate Accessed: 2025-10-12, and Source: The Guardian AustraliaDate Accessed: 2025-10-12, and Source: New York Times (via Troy Hunt interview)Date Accessed: 2025-10-12, and Source: vcpost.com (original article)Date Accessed: 2025-10-12, and Source: Twitter (JT @Matkins2021)Url: https://twitter.com/Matkins2021/status/xxxxxxDate Accessed: 2025-10-12, and Source: Hackread.comUrl: https://www.hackread.com/salesforce-data-breach-scattered-lapsus-hunters/Date Accessed: 2025-10-10, and Source: Telegram (Threat Actor Communication)Date Accessed: 2025-10-10, and Source: Qantas Airways (July 2025 Breach Acknowledgment)Date Accessed: 2025-07-01, and Source: Qantas Airways Public Statement, and Source: FBI Alert on Scattered Spider (X/Twitter), and Source: FOX Business Article, and Source: ABC NewsUrl: https://www.abc.net.au/news, and Source: AAP (Bianca De Marchi), and Source: Reuters (Hollie Adams).

Investigation Status: Ongoing (Multi-agency: FBI, GDPR authorities, private firms like Resecurity)

Investigation Status: Ongoing (in collaboration with authorities and external experts)

Investigation Status: Ongoing (Qantas collaborating with ACSC/AFP; data legitimacy confirmed by third parties)

Investigation Status: Ongoing (cooperation with Australian security services)

Investigation Status: Ongoing (authorities investigating)

Investigation Status: Ongoing (Qantas, federal government, and police involved)

Investigation Status: Ongoing (Cooperation with Australian Authorities; Salesforce Aware of Extortion Attempts)

Investigation Status: Ongoing (collaboration with cybersecurity experts and authorities)

Investigation Status: Ongoing (as of October 2025)

Investigation Status: Ongoing (Collaboration with Cybersecurity Experts)

Investigation Status: Ongoing (Regulatory and Internal)

Investigation Status: Confirmed (data exposed on dark web)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public Statements (Downplaying Impact, E.G., Salesforce), Customer Advisories (Deadline: 2025-10-10), Media Engagement, Public Statements, Customer Advisories, Public Statements (Via Abc, Information Age), Website Updates, Direct Customer Notifications (Via Email/Support Line), Public Statements (Qantas, Google), Media Engagement, Public Statements, Customer Advisories On Scam Prevention, Public Statements (July And Post-Dark Web Leak), Direct Emails To Affected Customers, Media Interviews (E.G., Transport Minister Catherine King), Public Disclosure, Customer Notifications (E.G., Google Notified Affected Partners), Public Statements (Oct 12, 2025), Social Media Updates, Customer Advisories, Limited Public Statements (E.G., Qantas Acknowledged July 2025 Third-Party Breach But Did Not Name Vendor), Telegram/Dark Web Monitoring For Further Leaks, Public Statements, Customer Notifications (Specific Data Impact), Website Updates, Statement On Qantas Website, No Direct Customer Notifications (Criticized) and Public disclosure (confirmed exposure).

Stakeholder Advisories: Fortune 100 Companies: Prepare For Potential Lawsuits And Regulatory Inquiries., Salesforce Customers: Audit Oauth Integrations (E.G., Drift) And Monitor For Iocs., Airlines: Expect Gdpr Fines And Customer Compensation Claims (E.G., Air France/Klm, Qantas)., Government Agencies: Assess Exposure Of Employee Data (E.G., Fbi, Dhs Records In Cisco Breach)., Advertising Partners: Review Google Adwords Account Security For Compromised Credentials..
Customer Advisories: Monitor financial accounts for fraud (PII exposure).Reset passwords for any services linked to breached companies (e.g., loyalty programs).Beware of phishing emails referencing the breach (e.g., fake 'compensation' offers).Freeze credit reports if SSNs or financial data were exposed (e.g., TransUnion customers).Contact affected companies for clarity on exposed data (e.g., Aeromexico’s 39M records).

Stakeholder Advisories: 24/7 Support Line For Affected Customers, Identity Protection Guidance.
Customer Advisories: Monitor accounts for suspicious activityBeware of personalized phishing emailsContact Qantas support for identity protection advice

Stakeholder Advisories: Qantas website updates; ACSC/AFP public warnings about scams
Customer Advisories: 24/7 Support LineIdentity Protection ServicesEncouragement to Monitor for Scams

Stakeholder Advisories: Public Statements By Qantas, Google; Media Briefings.
Customer Advisories: Email notifications to affected customers (Qantas, Google)

Stakeholder Advisories: Customer Communications On Scam Awareness, Regulatory Updates.
Customer Advisories: Guidance on spotting phishing attemptsIdentity protection resources

Stakeholder Advisories: Federal Government (Transport Minister Catherine King), Australian Federal Police, Cybersecurity Experts (E.G., Professor Richard Buckland).
Customer Advisories: Remain alert for phishing attempts (email, text, calls)Use two-step authenticationNever share passwords or sensitive login detailsCheck credit reports for fraudContact IDCare or Scamwatch if suspicious activity occurs

Customer Advisories: Qantas and Google Notified Affected Customers/Partners

Stakeholder Advisories: Australian Government (Cyber Resilience Laws), Office Of The Australian Information Commissioner (Oaic).
Customer Advisories: Public statement on Qantas website (Oct 12, 2025).Recommendations for customers to monitor for identity theft.Assurance that no further breaches detected.

Stakeholder Advisories: Salesforce: Likely Issued Private Advisories To Customers About The Vulnerability And Patching., Affected Companies: Internal Communications To Employees And Possibly Regulators., Cybersecurity Agencies: Alerts About The Threat Actor Group’S Tactics (E.G., Cisa, Ncsc, Acsc)..
Customer Advisories: Qantas: Previous advisory in July 2025 about a third-party breach (likely linked).Other Companies: Most have not issued public statements as of October 10, 2025.

Stakeholder Advisories: Public Updates Via Website, Customer Support Line.
Customer Advisories: Identity Protection Services OfferedSpecific Data Impact Notifications

Stakeholder Advisories: Statement On Qantas Website.
Customer Advisories: IDCARE Support Offered on Case-by-Case Basis
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Fortune 100 Companies: Prepare For Potential Lawsuits And Regulatory Inquiries., Salesforce Customers: Audit Oauth Integrations (E.G., Drift) And Monitor For Iocs., Airlines: Expect Gdpr Fines And Customer Compensation Claims (E.G., Air France/Klm, Qantas)., Government Agencies: Assess Exposure Of Employee Data (E.G., Fbi, Dhs Records In Cisco Breach)., Advertising Partners: Review Google Adwords Account Security For Compromised Credentials., Monitor Financial Accounts For Fraud (Pii Exposure)., Reset Passwords For Any Services Linked To Breached Companies (E.G., Loyalty Programs)., Beware Of Phishing Emails Referencing The Breach (E.G., Fake 'Compensation' Offers)., Freeze Credit Reports If Ssns Or Financial Data Were Exposed (E.G., Transunion Customers)., Contact Affected Companies For Clarity On Exposed Data (E.G., Aeromexico’S 39M Records)., , 24/7 Support Line For Affected Customers, Identity Protection Guidance, Monitor Accounts For Suspicious Activity, Beware Of Personalized Phishing Emails, Contact Qantas Support For Identity Protection Advice, , Qantas website updates; ACSC/AFP public warnings about scams, 24/7 Support Line, Identity Protection Services, Encouragement To Monitor For Scams, , Public Statements By Qantas, Google; Media Briefings, Email Notifications To Affected Customers (Qantas, Google), , Customer Communications On Scam Awareness, Regulatory Updates, Guidance On Spotting Phishing Attempts, Identity Protection Resources, , Federal Government (Transport Minister Catherine King), Australian Federal Police, Cybersecurity Experts (E.G., Professor Richard Buckland), Remain Alert For Phishing Attempts (Email, Text, Calls), Use Two-Step Authentication, Never Share Passwords Or Sensitive Login Details, Check Credit Reports For Fraud, Contact Idcare Or Scamwatch If Suspicious Activity Occurs, , Qantas And Google Notified Affected Customers/Partners, , Australian Government (Cyber Resilience Laws), Office Of The Australian Information Commissioner (Oaic), Public Statement On Qantas Website (Oct 12, 2025)., Recommendations For Customers To Monitor For Identity Theft., Assurance That No Further Breaches Detected., , Salesforce: Likely Issued Private Advisories To Customers About The Vulnerability And Patching., Affected Companies: Internal Communications To Employees And Possibly Regulators., Cybersecurity Agencies: Alerts About The Threat Actor Group’S Tactics (E.G., Cisa, Ncsc, Acsc)., Qantas: Previous Advisory In July 2025 About A Third-Party Breach (Likely Linked)., Other Companies: Most Have Not Issued Public Statements As Of October 10, 2025., , Public Updates Via Website, Customer Support Line, Identity Protection Services Offered, Specific Data Impact Notifications, , Statement On Qantas Website, Idcare Support Offered On Case-By-Case Basis and .

Entry Point: Stolen Oauth Tokens (Salesloft Drift), Vishing Attacks, Compromised Corporate Emails, Exploited Salesforce Misconfigurations,
Reconnaissance Period: ['Up to 3 years (e.g., Vietnam Airlines)', 'Historical access since 2019 (claimed)']
Backdoors Established: ['Persistent access via Salesforce instances', 'Dark Web data monetization channels']
High Value Targets: Fortune 100 Companies, Airlines (Pii-Rich Databases), Government/Military Personnel Data, Advertising Platforms (Google Adwords),
Data Sold on Dark Web: Fortune 100 Companies, Airlines (Pii-Rich Databases), Government/Military Personnel Data, Advertising Platforms (Google Adwords),

Entry Point: Salesforce Database (compromised between April 2024–September 2025)
High Value Targets: Customer Databases (Pii), Frequent Flyer Programs,
Data Sold on Dark Web: Customer Databases (Pii), Frequent Flyer Programs,

Entry Point: Third-Party Call Center (linked to Salesforce customer management platform)
Reconnaissance Period: Likely months (UNC60400 voice phishing campaigns targeted Salesforce customers for 'several months' per Google GTIG)
High Value Targets: Qantas Frequent Flyer Program Data, Customer Pii,
Data Sold on Dark Web: Qantas Frequent Flyer Program Data, Customer Pii,

Entry Point: Customer support employees (tricked via IT impersonation)
High Value Targets: Salesforce Corporate Servers, Customer Contact Center Systems,
Data Sold on Dark Web: Salesforce Corporate Servers, Customer Contact Center Systems,

Entry Point: Compromised Salesforce tenant (third-party)
High Value Targets: Customer Pii, Frequent-Flyer Data,
Data Sold on Dark Web: Customer Pii, Frequent-Flyer Data,

Entry Point: Vishing (voice phishing calls to employees)
High Value Targets: Salesforce-Linked Global Corporations (E.G., Disney, Google, Ikea, Toyota, Qantas),
Data Sold on Dark Web: Salesforce-Linked Global Corporations (E.G., Disney, Google, Ikea, Toyota, Qantas),

Entry Point: Salesforce Customer Contact Centre (via Third-Party Platform)
High Value Targets: Customer Databases (Pii), Frequent Flyer Programs,
Data Sold on Dark Web: Customer Databases (Pii), Frequent Flyer Programs,

Entry Point: Third-Party Call Center Platform (Salesforce-linked)
High Value Targets: Customer Pii, Frequent Flyer Data,
Data Sold on Dark Web: Customer Pii, Frequent Flyer Data,

Entry Point: Exploited Salesforce Vulnerability (Likely Api Or Authentication Flaw),
Reconnaissance Period: ['Unknown (likely weeks/months prior to October 3 disclosure)']
Backdoors Established: ['Possible (to maintain persistence for data exfiltration)']
High Value Targets: Airlines (Qantas, Vietnam Airlines, Air France/Klm) For Pii And Loyalty Data, Retailers (Gap, Albertsons) For Customer Purchase Histories, Luxury Brands (Cartier, Chanel) For High-Net-Worth Individual Data,
Data Sold on Dark Web: Airlines (Qantas, Vietnam Airlines, Air France/Klm) For Pii And Loyalty Data, Retailers (Gap, Albertsons) For Customer Purchase Histories, Luxury Brands (Cartier, Chanel) For High-Net-Worth Individual Data,

Entry Point: Third-Party Contact Center Platform
High Value Targets: Customer Service Records (6M Profiles),
Data Sold on Dark Web: Customer Service Records (6M Profiles),

Entry Point: Qantas Call Center Worker in the Philippines (Tricked via Social Engineering)
High Value Targets: Customer Pii Data On Salesforce,
Data Sold on Dark Web: Customer Pii Data On Salesforce,

Root Causes: Insecure Oauth Token Management In Salesforce Integrations (Drift)., Lack Of Dark Web Monitoring For Early Leak Detection., Delayed Patching Of Known Salesforce Vulnerabilities (Unc6040/Unc6395)., Insufficient Segmentation Of High-Value Data (E.G., Airline Passenger Records)., Failure To Engage With Threat Actors Preemptively (E.G., Salesforce’S Dismissed Claims)., Regulatory Gaps In Cross-Border Data Breach Notifications (E.G., Vietnam Cic).,
Corrective Actions: Salesforce: Enforce Token Expiration And Anomaly Detection For Oauth Integrations., Companies: Implement Dark Web Monitoring For Brand/Employee Data., Airlines: Encrypt Pii And Limit Access To Loyalty Program Databases., Government: Mandate Breach Disclosure Timelines (E.G., 72 Hours Under Gdpr)., Advertising Platforms: Audit Third-Party Access To Customer Data (E.G., Google Adwords Partners)., Law Enforcement: Prioritize Disruption Of Ransomware Leak Sites (E.G., Ddos Mitigation).,

Root Causes: Third-Party Vulnerability (Salesforce Database Breach), Likely Insufficient Access Controls Or Monitoring For Exfiltration, Threat Actor Sophistication (Scattered Lapsus$ Hunters' Expertise In System Connections),
Corrective Actions: Strengthen Third-Party Security Requirements, Enhance Data Encryption And Access Logging, Improve Incident Response Coordination With Vendors, Expand Customer Notification And Protection Programs,

Root Causes: Third-Party Vendor Security Weaknesses, Voice Phishing Vulnerabilities (Unc60400), Inadequate Data Segmentation (Pii Accessible Via Call Center),

Root Causes: Successful Social Engineering (It Impersonation) Targeting Customer Support Staff., Inadequate Access Controls For Third-Party Platforms (Salesforce)., Lack Of Mfa Or Behavioral Authentication For High-Risk Systems.,

Root Causes: Inadequate Third-Party Access Controls In Salesforce Environment., Social Engineering/Credential Abuse Vulnerabilities., Lack Of Data Minimization In Third-Party Integrations.,
Corrective Actions: Strengthened Monitoring And Credential Reset Policies., Tighter Supplier Access Controls., Enhanced Incident Response Coordination With Vendors., Customer-Facing Scam Prevention Campaigns.,

Root Causes: Successful Vishing Attack Exploiting Human Error, Inadequate Verification Of Caller Identities,

Root Causes: Social Engineering Exploits (Impersonation Of It Staff), Inadequate Access Controls For Third-Party Platforms, Human Error (Employees Tricked Into Sharing Credentials),

Root Causes: Inadequate Third-Party Vendor Security Controls., Lack Of Real-Time Data Exfiltration Detection., Over-Reliance On Legal Measures (E.G., Injunctions) To Mitigate Cyber Threats.,
Corrective Actions: Termination/Remediation Of Vulnerable Third-Party Contracts., Deployment Of Dark Web Monitoring Tools., Review Of Data Retention Policies (E.G., Necessity Of Storing Meal Preferences).,

Root Causes: Inadequate Security Controls In Salesforce’S Api/Authentication Systems., Over-Reliance On Third-Party Vendors Without Robust Oversight (E.G., Qantas’ July 2025 Breach)., Excessive Data Collection/Retention (E.G., Storing Passport Numbers In Crm Systems)., Delayed Patching Or Lack Of Detection For The Exploited Vulnerability.,
Corrective Actions: Salesforce: Emergency Patches, Enhanced Logging, And Customer Notifications., Affected Companies: Data Minimization Efforts, Crm Access Reviews, And Incident Response Drills., Industry: Push For Stricter Third-Party Risk Management Standards In Cloud Services.,

Root Causes: Third-Party Vendor Vulnerabilities, Social Engineering Exploits (Mfa Bypass),
Corrective Actions: Enhanced Training, System Monitoring Upgrades, Third-Party Security Audits (Implied),

Root Causes: Social Engineering Attack On Call Center Worker, Inadequate Third-Party Security (Salesforce Access Controls), Poor Incident Communication And Customer Support,
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Resecurity (Threat Intelligence), Fbi (Investigation), Dark Web Monitoring Firms, , Fbi Indicators Of Compromise (Iocs), Dark Web Threat Intelligence, , External Cybersecurity Experts, Legal Support (Nsw Supreme Court Injunction), , Likely (advised customers to monitor accounts), Australian Cyber Security Centre (Acsc), Australian Federal Police (Afp), Specialist Cybersecurity Experts (Unnamed), , Likely (given collaboration with ACSC/AFP), Australian Security Services, Legal Counsel (For Injunction), , Salesforce, Law Enforcement, , , Federal Government, Australian Federal Police, Cybersecurity Experts, , Dark web channels monitored to confirm leaked data, Cybersecurity Experts (Unnamed), Australian Security Agencies, , Cybersecurity Firms (E.G., Mandiant, Crowdstrike) Likely Engaged, Salesforce’S Internal Security Team, , Expected For Salesforce And Affected Companies, , Cybersecurity Experts, , , Idcare (Identity Support For Affected Customers), .
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Salesforce: Enforce Token Expiration And Anomaly Detection For Oauth Integrations., Companies: Implement Dark Web Monitoring For Brand/Employee Data., Airlines: Encrypt Pii And Limit Access To Loyalty Program Databases., Government: Mandate Breach Disclosure Timelines (E.G., 72 Hours Under Gdpr)., Advertising Platforms: Audit Third-Party Access To Customer Data (E.G., Google Adwords Partners)., Law Enforcement: Prioritize Disruption Of Ransomware Leak Sites (E.G., Ddos Mitigation)., , Strengthen Third-Party Security Requirements, Enhance Data Encryption And Access Logging, Improve Incident Response Coordination With Vendors, Expand Customer Notification And Protection Programs, , Strengthened Monitoring And Credential Reset Policies., Tighter Supplier Access Controls., Enhanced Incident Response Coordination With Vendors., Customer-Facing Scam Prevention Campaigns., , Termination/Remediation Of Vulnerable Third-Party Contracts., Deployment Of Dark Web Monitoring Tools., Review Of Data Retention Policies (E.G., Necessity Of Storing Meal Preferences)., , Salesforce: Emergency Patches, Enhanced Logging, And Customer Notifications., Affected Companies: Data Minimization Efforts, Crm Access Reviews, And Incident Response Drills., Industry: Push For Stricter Third-Party Risk Management Standards In Cloud Services., , Enhanced Training, System Monitoring Upgrades, Third-Party Security Audits (Implied), .
Ransom Payment History: The company has Paid ransoms in the past.
Last Ransom Demanded: The amount of the last ransom demanded was ['Undisclosed (Negotiation Deadline: 2025-10-10)', 'Threats of Regulatory Reporting (GDPR)'].
Last Attacking Group: The attacking group in the last incident were an Trinity of ChaosLapsus$Scattered SpiderShinyHuntersUNC6040UNC63951973cn, Scattered Lapsus$ Hunters, Scattered Lapsus$ Hunters (SLSH)UNC60400, Scattered Lapsus$ Hunters (cybercriminal alliance), Scattered Lapsus$ Hunters, Scattered Lapsus$ Hunters, Scattered Lapsus$ Hunters, Scattered Lapsus$ Hunters, Name: Scattered Lapsus$ HuntersAffiliations: ['Scattered Spider', 'Lapsus$', 'ShinyHunters']Type: Hacktivist/Cybercriminal Collective, Scattered Spider and Scattered Lapsus$ Hunters.
Most Recent Incident Detected: The most recent incident detected was on 2024-06.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2024-07.
Most Significant Data Compromised: The most significant data compromised in an incident were PII (Passenger Info, Loyalty Points, Activity History), Internal Communications, Customer-Vendor Relationships, Employee Records (Law Enforcement, Military, Federal Agencies), Advertising Partner Data (Google AdWords), Salesforce Records (Accounts, Contacts, Opportunities), , Email Addresses, Phone Numbers, Birth Dates, Frequent Flyer Numbers, , Customer Names, Email Addresses, Phone Numbers, Birth Dates, Qantas Frequent Flyer Numbers, , , Names, Email Addresses, Phone Numbers, Dates of Birth, Frequent-Flyer Numbers, , Names, Email Addresses, Phone Numbers, Birth Dates, Frequent Flyer Numbers, Home Addresses (for some customers), Gender (for some customers), , , Names (5M+ customers), Email addresses (5M+ customers), Frequent flyer details (5M+ customers), Home/Business addresses (~1M customers), Phone numbers (~1M customers), Birth dates (~1M customers), Genders (~1M customers), Meal preferences (~1M customers), Total Records: 989000000, Leaked Records: {'Qantas Airways': 5000000, 'Vietnam Airlines': 23000000, 'Albertsons': 672000, 'GAP, INC.': 224000, 'Fujifilm': 224000, 'Engie Resources': 537000, 'total_leaked': 29733000}, Data Types: ['Personally Identifiable Information (PII)', 'Loyalty Program Data', 'Internal CRM Metadata', 'Business Contact Details', 'Geolocation Data', 'Financial Transaction Records', 'Corporate Tax Information', 'Travel History', 'Customer Preferences', 'Internal Reports/Links'], , Total Records: 989000000, Leaked Records: {'Qantas Airways': 5000000, 'Vietnam Airlines': 23000000, 'Albertsons': 672000, 'GAP, INC.': 224000, 'Fujifilm': 224000, 'Engie Resources': 537000, 'total_leaked': 29733000}, Data Types: ['Personally Identifiable Information (PII)', 'Loyalty Program Data', 'Internal CRM Metadata', 'Business Contact Details', 'Geolocation Data', 'Financial Transaction Records', 'Corporate Tax Information', 'Travel History', 'Customer Preferences', 'Internal Reports/Links'], , Names, Email Addresses, Phone Numbers, Birth Dates, Frequent Flyer Numbers, , Names, Addresses, Personally Identifiable Information (PII), and Customer data (up to 5.7 million records).
Most Significant System Affected: The most significant system affected in an incident were Salesforce InstancesSalesloft’s Drift AI Chat IntegrationCorporate Email SystemsDark Web Data Leak Site (DLS)Telegram Channels and Salesforce Database and Third-Party Call Center PlatformCustomer Management System (Salesforce Instance) and Salesforce corporate serversQantas customer contact center system and Salesforce Tenant (Third-Party) and Qantas Customer Database (hosted on Salesforce platform) and Salesforce Customer Contact Centre Platform and Third-Party Call Center Platform (Salesforce-linked)Customer Database and Salesforce CRM PlatformThird-Party Vendor Systems (e.g., Qantas' July 2025 breach) and Third-Party Contact Center Platform and Salesforce (Third-Party Platform).
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was resecurity (threat intelligence), fbi (investigation), dark web monitoring firms, , external cybersecurity experts, legal support (nsw supreme court injunction), , australian cyber security centre (acsc), australian federal police (afp), specialist cybersecurity experts (unnamed), , australian security services, legal counsel (for injunction), , salesforce, law enforcement, , federal government, australian federal police, cybersecurity experts, , cybersecurity experts (unnamed), australian security agencies, , cybersecurity firms (e.g., mandiant, crowdstrike) likely engaged, salesforce’s internal security team, , cybersecurity experts, , idcare (identity support for affected customers), .
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Salesforce Instance IsolationOAuth Token RevocationDark Web Takedown Attempts (DDoS on DLS), Legal Injunction to Block Data Access/Use, Legal Injunction to Block Data Access/ReleaseDark Web Monitoring, Legal injunction to block data disseminationAccess revocation for compromised systems, Credential ResetsIncreased Monitoring for Unusual ActivityInjunction to Deter Data Dissemination, NSW Supreme Court injunction to block data accessDark web monitoring, Legal Injunction to Prevent Data Spread (Australia-Only), Court Injunction to Block Data Access/UseThird-Party Platform Review, Salesforce likely patched the exploited vulnerabilityAffected companies may have isolated CRM systemsPassword resets for exposed accounts and Court Order to Block Data Access/UseThird-Party Platform Isolation.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Salesforce Records (Accounts, Contacts, Opportunities), PII (Passenger Info, Loyalty Points, Activity History), Home/Business addresses (~1M customers), Addresses, Names, Phone Numbers, Customer data (up to 5.7 million records), Frequent-Flyer Numbers, Gender (for some customers), Personally Identifiable Information (PII), Phone numbers (~1M customers), Birth dates (~1M customers), Customer-Vendor Relationships, Dates of Birth, Email Addresses, Customer Names, Birth Dates, Genders (~1M customers), Qantas Frequent Flyer Numbers, Email addresses (5M+ customers), Employee Records (Law Enforcement, Military, Federal Agencies), Meal preferences (~1M customers), Frequent Flyer Numbers, Internal Communications, Frequent flyer details (5M+ customers), Home Addresses (for some customers), Advertising Partner Data (Google AdWords) and Names (5M+ customers).
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 2.6B.
Highest Fine Imposed: The highest fine imposed for a regulatory violation was Potential (e.g., Qantas previously fined for negligence), GDPR Penalties (Up to 4% of global revenue), , Speculated to be in Billions (Under Investigation), .
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Class-Action Lawsuits (Expected), Criminal Negligence Charges (Threatened), Regulatory Investigations (Ongoing), , NSW Supreme Court Injunction (to block data misuse), , NSW Supreme Court Interim Injunction (July 2023), AFP/FBI Investigation, , Legal injunction (Qantas vs. data dissemination), , Regulatory Scrutiny, Potential Enforceable Undertakings, , NSW Supreme Court injunction to prevent data access, , Qantas Secured Injunction from Supreme Court of New South Wales, , Court Injunction Filed (to block data dissemination), , Potential class-action lawsuits, Regulatory investigations (e.g., by ICO, FTC), , Court Order to Prevent Data Dissemination, , Regulatory Investigation by Office of the Australian Information Commissioner, .
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Proactive measures are needed to prevent social engineering attacks.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Conduct regular third-party risk assessments for vendors handling sensitive data., Educate customers on phishing risks post-breach (personalized scams likely), Explore data anonymization for non-critical customer preferences., Invest in advanced threat detection for credential abuse and social engineering., Enhance employee training on social engineering and phishing (especially for customer support teams)., Enhance employee training to prevent social engineering attacks., Collaborate with law enforcement and cybersecurity firms for threat intelligence sharing, Conduct regular security audits of third-party vendors., Provide free identity monitoring services to affected customers., Implement zero-trust architecture for third-party integrations., Advocate for stronger international cybercrime enforcement collaboration., Enhance employee training to recognize social engineering tactics (e.g., impersonation scams)., Improve incident response coordination among affected entities in supply-chain attacks., Implement stricter access controls and multi-factor authentication for third-party platforms., Implement stricter data access controls and monitoring for high-value databases, Train employees on vishing/social engineering tactics used by groups like Lapsus$., Enhance data minimization strategies to reduce exposure in third-party systems., Consider proactive dark web monitoring for leaked data, Implement multi-factor authentication (MFA) and stricter access controls for third-party platforms., Review incident response plans for ransomware extortion + data leak scenarios., Develop a robust customer support framework for post-breach identity protection., Monitor credit reports for fraudulent activity, Conduct regular audits of third-party vendors’ security practices., Implement stricter supplier access controls and audit trails., Develop cross-border legal strategies to address data breaches with global implications., Establish a clear, proactive communication plan for data breaches., Establish a Dark Web monitoring program to detect leaked credentials/data., Enforce MFA and conditional access policies for all OAuth integrations., Prepare for DDoS attacks on leak sites (e.g., Trinity of Chaos DLS)., Conduct regular third-party security audits (especially for customer-facing platforms)., Enable two-step authentication for online accounts, Implement multi-factor authentication (MFA) for third-party platform access., Implement Zero Trust Architecture for cloud services (e.g., Salesforce)., Develop a pre-emptive regulatory engagement strategy (e.g., GDPR breach notifications)., Use resources like IDCare, Australian Cyber Security Centre, and Scamwatch, Conduct third-party risk assessments for SaaS providers (e.g., Drift, Salesloft)., Enhance third-party risk assessments (e.g., Salesforce security audits), Avoid clicking links in unsolicited emails/texts, Isolate high-value systems (e.g., airline passenger databases) with network segmentation., Coordinate with law enforcement (FBI, INTERPOL) for threat actor disruption., Verify caller identities via official channels, Develop cross-organizational incident response protocols for supply chain attacks., Enhance incident response plans for ransomware/data extortion scenarios. and Conduct regular third-party security assessments and penetration testing..
Most Recent Source: The most recent source of information about an incident are vcpost.com (original article), Information Age, Hackread.com, ABC News, FBI Flash Warning (Salesforce Exploitation), Troy Hunt (Cybersecurity Researcher), Australian Federal Police (AFP) Advisory, University of New South Wales (Professor Richard Buckland), Resecurity Threat Intelligence Report, Qantas GDPR Fine Announcement, Qantas Airways Statement (2023-07), Unit 42 (Cybersecurity Research Team), Unit 42 Research Note (Scattered Lapsus$ Hunters), The Guardian Australia, New York Times (via Troy Hunt interview), Google Security Blog (UNC6040 Incident), Reuters, Reuters (Hollie Adams), Scattered Lapsus$ Hunters (SLSH) Telegram Channel, FBI Warning on Salesforce Client Scams, AAP (Bianca De Marchi), AFP (Agence France-Presse), Qantas Airways (July 2025 Breach Acknowledgment), Cyber Threat Intelligence (Jeremy Kirk, Executive Editor), Telegram Channel (SLSH 6.0 Part 3), Agence France-Presse (AFP), The Guardian, Stellantis Breach Disclosure, FBI Warning on Salesforce Attacks, Google Cloud Security Communications (2023-08), CloudTech News (TechForge Media), Have I Been Pwned (Troy Hunt), FBI Alert on Scattered Spider (X/Twitter), Trinity of Chaos Data Leak Site (TOR), Qantas Airways Public Statement, Shutterstock (reported imagery), Twitter (JT @Matkins2021), Telegram (Threat Actor Communication), FOX Business Article and ABC News Australia.
Most Recent URL for Additional Resources: The most recent URL for additional resources on cybersecurity best practices is https://www.theguardian.com/australia-news, https://haveibeenpwned.com, https://www.cyber.gov.au/report, https://www.abc.net.au/news, https://www.cloudcomputing-news.net/, https://twitter.com/Matkins2021/status/xxxxxx, https://www.hackread.com/salesforce-data-breach-scattered-lapsus-hunters/, https://www.abc.net.au/news .
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing (Multi-agency: FBI, GDPR authorities, private firms like Resecurity).
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Fortune 100 companies: Prepare for potential lawsuits and regulatory inquiries., Salesforce customers: Audit OAuth integrations (e.g., Drift) and monitor for IoCs., Airlines: Expect GDPR fines and customer compensation claims (e.g., Air France/KLM, Qantas)., Government agencies: Assess exposure of employee data (e.g., FBI, DHS records in Cisco breach)., Advertising partners: Review Google AdWords account security for compromised credentials., 24/7 support line for affected customers, Identity protection guidance, Qantas website updates; ACSC/AFP public warnings about scams, Public statements by Qantas, Google; media briefings, Customer communications on scam awareness, Regulatory updates, Federal Government (Transport Minister Catherine King), Australian Federal Police, Cybersecurity Experts (e.g., Professor Richard Buckland), Australian Government (cyber resilience laws), Office of the Australian Information Commissioner (OAIC), Salesforce: Likely issued private advisories to customers about the vulnerability and patching., Affected Companies: Internal communications to employees and possibly regulators., Cybersecurity Agencies: Alerts about the threat actor group’s tactics (e.g., CISA, NCSC, ACSC)., Public Updates via Website, Customer Support Line, Statement on Qantas Website, .
Most Recent Customer Advisory: The most recent customer advisory issued were an Monitor financial accounts for fraud (PII exposure).Reset passwords for any services linked to breached companies (e.g., loyalty programs).Beware of phishing emails referencing the breach (e.g., fake 'compensation' offers).Freeze credit reports if SSNs or financial data were exposed (e.g., TransUnion customers).Contact affected companies for clarity on exposed data (e.g., Aeromexico’s 39M records)., Monitor accounts for suspicious activityBeware of personalized phishing emailsContact Qantas support for identity protection advice, 24/7 Support LineIdentity Protection ServicesEncouragement to Monitor for Scams, Email notifications to affected customers (Qantas, Google), Guidance on spotting phishing attemptsIdentity protection resources, Remain alert for phishing attempts (email, text, calls)Use two-step authenticationNever share passwords or sensitive login detailsCheck credit reports for fraudContact IDCare or Scamwatch if suspicious activity occurs, Qantas and Google Notified Affected Customers/Partners, Public statement on Qantas website (Oct 12, 2025).Recommendations for customers to monitor for identity theft.Assurance that no further breaches detected., Qantas: Previous advisory in July 2025 about a third-party breach (likely linked).Other Companies: Most have not issued public statements as of October 10, 2025., Identity Protection Services OfferedSpecific Data Impact Notifications and IDCARE Support Offered on Case-by-Case Basis.
Most Recent Entry Point: The most recent entry point used by an initial access broker were an Compromised Salesforce tenant (third-party), Third-Party Contact Center Platform, Third-Party Call Center (linked to Salesforce customer management platform), Vishing (voice phishing calls to employees), Third-Party Call Center Platform (Salesforce-linked), Salesforce Database (compromised between April 2024–September 2025), Salesforce Customer Contact Centre (via Third-Party Platform), Customer support employees (tricked via IT impersonation) and Qantas Call Center Worker in the Philippines (Tricked via Social Engineering).
Most Recent Reconnaissance Period: The most recent reconnaissance period for an incident was Up to 3 years (e.g., Vietnam Airlines)Historical access since 2019 (claimed), Likely months (UNC60400 voice phishing campaigns targeted Salesforce customers for 'several months' per Google GTIG), Unknown (likely weeks/months prior to October 3 disclosure).
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Insecure OAuth token management in Salesforce integrations (Drift).Lack of Dark Web monitoring for early leak detection.Delayed patching of known Salesforce vulnerabilities (UNC6040/UNC6395).Insufficient segmentation of high-value data (e.g., airline passenger records).Failure to engage with threat actors preemptively (e.g., Salesforce’s dismissed claims).Regulatory gaps in cross-border data breach notifications (e.g., Vietnam CIC)., Third-party vulnerability (Salesforce database breach)Likely insufficient access controls or monitoring for exfiltrationThreat actor sophistication (Scattered Lapsus$ Hunters' expertise in system connections), Third-Party Vendor Security WeaknessesVoice Phishing Vulnerabilities (UNC60400)Inadequate Data Segmentation (PII accessible via call center), Successful social engineering (IT impersonation) targeting customer support staff.Inadequate access controls for third-party platforms (Salesforce).Lack of MFA or behavioral authentication for high-risk systems., Inadequate third-party access controls in Salesforce environment.Social engineering/credential abuse vulnerabilities.Lack of data minimization in third-party integrations., Successful vishing attack exploiting human errorInadequate verification of caller identities, Social Engineering Exploits (Impersonation of IT Staff)Inadequate Access Controls for Third-Party PlatformsHuman Error (Employees Tricked into Sharing Credentials), Inadequate third-party vendor security controls.Lack of real-time data exfiltration detection.Over-reliance on legal measures (e.g., injunctions) to mitigate cyber threats., Inadequate security controls in Salesforce’s API/authentication systems.Over-reliance on third-party vendors without robust oversight (e.g., Qantas’ July 2025 breach).Excessive data collection/retention (e.g., storing passport numbers in CRM systems).Delayed patching or lack of detection for the exploited vulnerability., Third-Party Vendor VulnerabilitiesSocial Engineering Exploits (MFA Bypass), Social Engineering Attack on Call Center WorkerInadequate Third-Party Security (Salesforce Access Controls)Poor Incident Communication and Customer Support.
Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Salesforce: Enforce token expiration and anomaly detection for OAuth integrations.Companies: Implement Dark Web monitoring for brand/employee data.Airlines: Encrypt PII and limit access to loyalty program databases.Government: Mandate breach disclosure timelines (e.g., 72 hours under GDPR).Advertising platforms: Audit third-party access to customer data (e.g., Google AdWords partners).Law enforcement: Prioritize disruption of ransomware leak sites (e.g., DDoS mitigation)., Strengthen third-party security requirementsEnhance data encryption and access loggingImprove incident response coordination with vendorsExpand customer notification and protection programs, Strengthened monitoring and credential reset policies.Tighter supplier access controls.Enhanced incident response coordination with vendors.Customer-facing scam prevention campaigns., Termination/remediation of vulnerable third-party contracts.Deployment of dark web monitoring tools.Review of data retention policies (e.g., necessity of storing meal preferences)., Salesforce: Emergency patches, enhanced logging, and customer notifications.Affected Companies: Data minimization efforts, CRM access reviews, and incident response drills.Industry: Push for stricter third-party risk management standards in cloud services., Enhanced TrainingSystem Monitoring UpgradesThird-Party Security Audits (Implied).
.png)
FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions prior to 16.0.96 and 17.0.1 through 17.0.9 have a weak default password. By default, this is a 6 digit numeric value which can be brute forced. (This is the app_password parameter). Depending on local configuration, this password could be the extension, voicemail, user manager, DPMA or EPM phone admin password. This issue is fixed in versions 16.0.96 and 17.0.10.
Neuron is a PHP framework for creating and orchestrating AI Agents. In versions 2.8.11 and below, the MySQLWriteTool executes arbitrary SQL provided by the caller using PDO::prepare() + execute() without semantic restrictions. This is consistent with the name (“write tool”), but in an LLM/agent context it becomes a high-risk capability: prompt injection or indirect prompt manipulation can cause execution of destructive queries such as DROP TABLE, TRUNCATE, DELETE, ALTER, or privilege-related statements (subject to DB permissions). Deployments that expose an agent with MySQLWriteTool enabled to untrusted input and/or run the tool with a DB user that has broad privileges are impacted. This issue is fixed in version 2.8.12.
Neuron is a PHP framework for creating and orchestrating AI Agents. Versions 2.8.11 and below use MySQLSelectTool, which is vulnerable to Read-Only Bypass. MySQLSelectTool is intended to be a read-only SQL tool (e.g., for LLM agent querying, however, validation based on the first keyword (e.g., SELECT) and a forbidden-keyword list does not block file-writing constructs such as INTO OUTFILE / INTO DUMPFILE. As a result, an attacker who can influence the tool input (e.g., via prompt injection through a public agent endpoint) may write arbitrary files to the DB server if the MySQL/MariaDB account has the FILE privilege and server configuration permits writes to a useful location (e.g., a web-accessible directory). This issue is fixed in version 2.8.12.
Okta Java Management SDK facilitates interactions with the Okta management API. In versions 11.0.0 through 20.0.0, race conditions may arise from concurrent requests using the ApiClient class. This could cause a status code or response header from one request’s response to influence another request’s response. This issue is fixed in version 20.0.1.
The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. When using versions 4.11.0 through 4.11.2 and 4.12.0, simultaneous requests on the same client may result in improper lookups in the TokenRequestCache for the request results. This issue is fixed in versions 4.11.2 and 4.12.1.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.