Key Takeaways:
- Qantas confirmed a cyberattack linked to compromised frequent flyer accounts but did not attribute it to any specific group.
- The disclosure comes amid a series of aviation-related breaches reportedly tied to the Scattered Spider threat group.
- Qantas says no core systems were breached, and passwords were not stolen—access likely occurred through reused credentials.
- The incident follows recent attacks on major airline technology vendors, raising concerns about broader supply chain vulnerabilities.
- Cybersecurity teams across the aviation sector are reviewing identity and access protocols in response to the uptick in targeting.
Australian airline Qantas has disclosed a recent cybersecurity incident affecting a limited number of frequent flyer accounts. The company emphasized that while personal details were exposed in some cases, the core systems remained secure and there is no indication that Qantas itself was directly breached.
According to the company, the breach appears to have occurred through credential stuffing—a tactic where previously stolen username-password combinations are used to access other accounts. This method implies that the attackers exploited weak or reused credentials rather than exploiting a direct vulnerability within Qantas’ infrastructure.
“We’ve identified unauthorized access to a small number of frequent flyer accounts and taken steps to secure them,” the airline said in a public statement. “Our systems remain secure, and there is no evidence of a breach into Qantas’ IT network.”
The timing of the announcement is noteworthy. Over the past several weeks, cyber incidents across the aviation sector have escalated, with several linked to a financially motivated group known as Scattered Spider. The group is known for its social engineering tactics and has previously targeted high-profile companies in the U.S., particularly in the telecommunications and hospitality sectors. They have also been linked to intrusions involving aviation industry contractors and service providers.
Although Qantas did not directly attribute the attack to Scattered Spider, the nature of the breach and its alignment with a broader wave of aviation-focused attacks has fueled speculation about potential connections.
In parallel, U.S. cybersecurity officials and aviation IT vendors have been ramping up efforts to respond to the group’s growing footprint. One high-profile incident involved a U.S.-based aviation support firm, which reportedly suffered a significant breach impacting airline schedules and crew management tools.
The Qantas incident involved the airline’s loyalty program, which is integrated with its mobile app and online portal. Affected users had their points tampered with or viewed by unauthorized parties, though Qantas says any changes have been reversed and those accounts have been locked pending password resets.
No financial loss has been reported, and the airline says it will continue monitoring accounts for suspicious activity. Customers have been advised to avoid password reuse and enable multi-factor authentication where available.
The aviation industry’s dependence on interlinked IT platforms—ranging from passenger booking and baggage handling to flight planning and crew scheduling—has created an expansive attack surface. As airlines outsource more core functions to cloud-based and third-party systems, attackers have found new entry points through weak links in the supply chain.
Recent breaches in airline technology vendors have already prompted calls for enhanced standards around identity and access management, particularly for external contractors and vendors with deep system access.
While the Qantas breach appears limited in scope, it underscores the growing challenge of securing customer data in an environment where attackers are increasingly sophisticated and well-resourced.
For aviation security leaders, it’s a reminder that customer-facing platforms like loyalty programs can be both a valuable asset and a potential vulnerability.
Learn how AI Agents can supercharge your company’s profits and productivity at TMC’s AI Agent Event, Sept 29-30, 2025 in DC.
If you liked this post, you’ll love one of the the leading global business communications and technology events since 1999, the ITEXPO #TECHSUPERSHOW, Feb 10-12, 2026 Fort Lauderdale, Florida.
Don’t forget the collocated MSP Expo – just for managed service providers!
Aside from his role as CEO of TMC and chairman of ITEXPO #TECHSUPERSHOW Feb 10-12, 2026, Rich Tehrani is CEO of RT Advisors and a Registered Representative (investment banker) with and offering securities through Four Points Capital Partners LLC (Four Points) (Member FINRA/SIPC). He handles capital/debt raises as well as M&A. RT Advisors is not owned by Four Points.
The above is not an endorsement or recommendation to buy/sell any security or sector mentioned. No companies mentioned above are current or past clients of RT Advisors.
The views and opinions expressed above are those of the participants. While believed to be reliable, the information has not been independently verified for accuracy. Any broad, general statements made herein are provided for context only and should not be construed as exhaustive or universally applicable.
Portions of this article may have been developed with the assistance of artificial intelligence, which may have contributed to ideation, content generation, factual review, or editing