Qantas Company Cyber Security Posture

qantas.com

We would like to acknowledge the Traditional Custodians of the local lands and waterways on which we live, work and fly. We pay our respects to Elders past and present. ย  Spirit is everything to us, and joining the Qantas team means bringing your spirit to ours. We have over 26,000 exceptional employees, and every year we fly millions of customers around Australia and the world โ€“ together.ย  ย  If you hop on board with the team, you'll experience a workplace where creativity, diversity and innovation are encouraged. We aim to give every member of the Qantas Group the support to follow their dreams, face new challenges, and let their future take flight. Ultimately, people are our priority โ€“ those who work for us and those who travel with us.ย  Member of the oneworld Alliance. Please read the Qantas LinkedIn House Rules at http://bit.ly/QFhouserules

Qantas Company Details

Linkedin ID:

qantas

Employees number:

16861 employees

Number of followers:

547735.0

NAICS:

481

Industry Type:

Airlines and Aviation

Homepage:

qantas.com

IP Addresses:

Scan still pending

Company ID:

QAN_1344183

Scan Status:

In-progress

AI scoreQantas Risk Score (AI oriented)

Between 900 and 1000

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

globalscoreQantas Global Score
blurone
Ailogo

Qantas Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 900 and 1000

Qantas Company Cyber Security News & History

Past Incidents
3
Attack Types
2
EntityTypeSeverityImpactSeenUrl IDDetailsView
QantasBreach8547/2025QAN609070225Link
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Australian airline Qantas suffered a cyber incident where hackers breached a contact center containing 6 million customer records. The data stolen includes customer names, emails, phone numbers, frequent flyer numbers, and birth dates. The airline confirmed that financial information and passport details were not compromised. The attack, which appears to be contained, has raised concerns in the airline industry about cyberattacks.

Qantas AirwaysCyber Attack8547/2025QAN612070225Link
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Qantas Airways, Australiaโ€™s flagship carrier, experienced a significant cybersecurity breach affecting up to 6 million customers. Cybercriminals gained unauthorized access to a third-party customer service platform used by the airlineโ€™s contact centre operations. The compromised data includes names, emails, phone numbers, birth dates, and frequent flyer numbers, but no financial data. The airline has contained the system, notified authorities, and implemented additional security measures. A dedicated support hotline has been established, and flight operations remain unaffected.

QantasBreach8547/2025QAN535071025Link
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: The Qantas incident exposed the details of up to 5.7 million customers, leading to a rise in sophisticated hybrid scams that combine digital theft and physical-world exploitation. Victims are manipulated into sharing one-time passcodes, resulting in significant financial losses. Banks often refuse reimbursement, citing a breach of terms, and law enforcement is reluctant to investigate, leaving victims with little recourse.

Qantas Company Subsidiaries

SubsidiaryImage

We would like to acknowledge the Traditional Custodians of the local lands and waterways on which we live, work and fly. We pay our respects to Elders past and present. ย  Spirit is everything to us, and joining the Qantas team means bringing your spirit to ours. We have over 26,000 exceptional employees, and every year we fly millions of customers around Australia and the world โ€“ together.ย  ย  If you hop on board with the team, you'll experience a workplace where creativity, diversity and innovation are encouraged. We aim to give every member of the Qantas Group the support to follow their dreams, face new challenges, and let their future take flight. Ultimately, people are our priority โ€“ those who work for us and those who travel with us.ย  Member of the oneworld Alliance. Please read the Qantas LinkedIn House Rules at http://bit.ly/QFhouserules

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=qantas' -H 'apikey: YOUR_API_KEY_HERE'
newsone

Qantas Cyber Security News

2025-07-14T06:20:00.000Z
Why the Qantas hack should send chills around corporate Australia

The lesson here isn't that the airline failed โ€“ it's that most Australian companies don't yet have the visibility or capability to avoid theย ...

2025-07-05T07:00:00.000Z
Qantas attack reveals one phone call is all it takes to crack cybersecurityโ€™s weakest link: humans

Other sectors also at risk from attacks, including healthcare, finance and telecommunications, expert warns.

2025-07-09T15:07:10.000Z
Qantas says cyberattack affected 5.7 million customers

The incident follows a notorious hacker gang's pivot to targeting transportation companies with its trademark social-engineering attacks.

2025-07-09T22:06:40.000Z
Qantas confirms personal data of over a million customers leaked in breach

Australia's Qantas Airways said on Wednesday more than a million customers had their phone number, birth date or home address accessed inย ...

2025-07-14T19:00:50.000Z
Qantas cyberattack: learnings for brokers

The data of 5.7 million customers was compromised but there was no evidence any stolen information was "released"

2025-07-14T01:03:02.000Z
Qantas data breach exposes up to six million customer profiles

The airline was hit by a cyber attack on a platform storing names, email addresses and phone numbers.

2025-07-03T07:00:00.000Z
The Qantas Cyber Attack: A Wake-Up Call for Cybersecurity in Critical Industries

The 2024 cyberattack on Qantas Airways, which exposed the personal data of 6 million customers, has become a defining moment in theย ...

2025-07-10T02:20:00.000Z
How can we stay safe after data breaches? Step 1 is to change the cybersecurity laws

How can we stay safe after data breaches? Step 1 is to change the cybersecurity laws. Published: July 9, 2025 10:20pm EDT.

2025-07-07T20:42:17.000Z
Australian Airline Qantas Confirms Contact With Possible Hackers

Last week, Australian airline Qantas reported a data breach that saw the personal information of up to six million customers put in jeopardy.

similarCompanies

Qantas Similar Companies

Iberia

Iberia is Spainโ€™s number-one airline group and the leader in the Europe-Latin America market, with the single greatest array of destinations and flight frequencies. Together with British Airways, weโ€™re part of the IAG Group, with the third-highest receipts in Europe and sixth worldwide.. Iberia is a

Aerolineas Argentinas

Aerolโˆšโ‰ neas Argentinas es la compaโˆšยฑโˆšโ‰ a lโˆšโ‰ der en el mercado aerocomercial argentino y referente en la regiโˆšโ‰ฅn desde 1950. Su flota de 84 aviones alcanza 38 destinos en Argentina y otros 22 a nivel regional e internacional. Con la reciente incorporaciโˆšโ‰ฅn de 2 aeronaves de cargas, la compaโˆšยฑโˆšโ‰ a expan

American Airlines

Embark on an adventure with a commitment to service, excellence and humanity. Our team is what powers our airline. We are proudly dedicated to our purpose of caring for people on lifeโ€™s journey, including connecting our customers to the people and places they love or providing our team members devel

GOL Linhas Aรฉreas

Somos a maior Companhia Aรฉrea do Paรญs e estamos entre as que mais crescem no mundo. A nossa histรณria comeรงou em 2001 e, desde entรฃo, somos responsรกveis por inovar o mercado da aviaรงรฃo no Brasil. Tudo isso graรงas ร  dedicaรงรฃo do nosso Time para garantir o nosso Valor nรบmero 1, a Seguranรงa, entregand

Servisair

Servisair is a leading global provider of aviation ground services delivering an integrated range of handling solutions across 128 locations. We form part of the Derichebourg Group, which also has divisions in Corporate and Environmental Services, collectively employing 47,000 staff throughout 30

Malaysia Airports

Our Vision A Global Airport Group That Champions Connectivity and Sustainability Our Brand Promise Hosting Joyful Connections About Malaysia Airports Malaysia Airports manages and operates 39 airports in Malaysia and one international airport in Istanbul, Turkey. The 39 airports in Malays

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Qantas CyberSecurity History Information

How many cyber incidents has Qantas faced?

Total Incidents: According to Rankiteo, Qantas has faced 3 incidents in the past.

What types of cybersecurity incidents have occurred at Qantas?

Incident Types: The types of cybersecurity incidents that have occurred incidents Breach and Cyber Attack.

What was the total financial impact of these incidents on Qantas?

Total Financial Loss: The total financial loss from these incidents is estimated to be $6 thousand.

How does Qantas detect and respond to cybersecurity incidents?

Detection and Response: The company detects and responds to cybersecurity incidents through law enforcement notified with Yes, but rarely pursued and incident response plan activated with Yes and third party assistance with Yes and law enforcement notified with Yes and containment measures with System contained, additional security measures implemented and communication strategy with Dedicated support hotline established and enhanced monitoring with Yes and law enforcement notified with Australian Cyber Security Centre, Australian Federal Police, Office of the Australian Information Commissioner and communication strategy with Email notifications, Support line for customers.

Incident Details

Can you provide details on each incident?

Incident : Fraud

Title: Convergence Scam Targeting Bank Customers

Description: Scammers are using stolen personal data to mimic bank calls and trick victims into sharing one-time passcodes, leading to financial loss.

Type: Fraud

Attack Vector: Social Engineering

Vulnerability Exploited: Personal Data Leaks

Threat Actor: Cyber Criminals

Motivation: Financial Gain

Incident : Data Breach

Title: Qantas Airways Cybersecurity Breach

Description: A significant cybersecurity breach affecting up to 6 million customers, with cybercriminals gaining unauthorized access to a third-party customer service platform used by the airlineโ€™s contact centre operations.

Date Detected: Monday

Type: Data Breach

Attack Vector: Third-party customer service platform

Threat Actor: Cybercriminals

Motivation: Data Theft

Incident : Data Breach

Title: Qantas Data Breach

Description: Qantas warned customers that a cyber incident exposed customer data, including names, emails, phone numbers, frequent flyer numbers, and birth dates.

Date Detected: 2024-07-15

Date Publicly Disclosed: 2024-07-17

Type: Data Breach

Attack Vector: Phishing

Threat Actor: Scattered Spider

Motivation: Data Theft

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Breach.

How does the company identify the attack vectors used in incidents?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Stolen personal data, Third-party customer service platform and Third-party customer servicing platform.

Impact of the Incidents

What was the impact of each incident?

Incident : Fraud QAN535071025

Financial Loss: A$6,000 (example case)

Data Compromised: Personal data, credit card details

Customer Complaints: Significant

Brand Reputation Impact: High

Identity Theft Risk: High

Payment Information Risk: High

Incident : Data Breach QAN612070225

Data Compromised: Names, Email addresses, Phone numbers, Birth dates, Frequent flyer numbers

Systems Affected: Third-party customer service platform

Incident : Data Breach QAN609070225

Data Compromised: Customer names, Emails, Phone numbers, Frequent flyer numbers, Birth dates

Systems Affected: Third-party customer servicing platform

What is the average financial loss per incident?

Average Financial Loss: The average financial loss per incident is $2.00 thousand.

What types of data are most commonly compromised in incidents?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, phone numbers, emails, card details, Names, Email addresses, Phone numbers, Birth dates, Frequent flyer numbers and Personally Identifiable Information.

Which entities were affected by each incident?

Incident : Fraud QAN535071025

Entity Type: Company

Industry: Aviation

Location: Australia

Size: Large

Customers Affected: Up to 5.7 million

Incident : Data Breach QAN612070225

Entity Type: Airline

Industry: Aviation

Location: Australia

Customers Affected: 6 million

Incident : Data Breach QAN609070225

Entity Type: Airline

Industry: Aviation

Location: Australia

Customers Affected: 6 million

Response to the Incidents

What measures were taken in response to each incident?

Incident : Fraud QAN535071025

Law Enforcement Notified: Yes, but rarely pursued

Incident : Data Breach QAN612070225

Incident Response Plan Activated: Yes

Third Party Assistance: Yes

Law Enforcement Notified: Yes

Containment Measures: System contained, additional security measures implemented

Communication Strategy: Dedicated support hotline established

Enhanced Monitoring: Yes

Incident : Data Breach QAN609070225

Law Enforcement Notified: Australian Cyber Security Centre, Australian Federal Police, Office of the Australian Information Commissioner

Communication Strategy: Email notifications, Support line for customers

What is the company's incident response plan?

Incident Response Plan: The company's incident response plan is described as Yes.

How does the company involve third-party assistance in incident response?

Third-Party Assistance: The company involves third-party assistance in incident response through Yes.

Data Breach Information

What type of data was compromised in each breach?

Incident : Fraud QAN535071025

Type of Data Compromised: Names, phone numbers, emails, card details

Number of Records Exposed: Up to 5.7 million

Sensitivity of Data: High

Data Exfiltration: Yes

Personally Identifiable Information: Yes

Incident : Data Breach QAN612070225

Type of Data Compromised: Names, Email addresses, Phone numbers, Birth dates, Frequent flyer numbers

Number of Records Exposed: 6 million

Sensitivity of Data: High

Data Exfiltration: Possible

Personally Identifiable Information: Yes

Incident : Data Breach QAN609070225

Type of Data Compromised: Personally Identifiable Information

Number of Records Exposed: Significant portion of 6 million

Sensitivity of Data: Medium

Personally Identifiable Information: Customer names, Emails, Phone numbers, Frequent flyer numbers, Birth dates

How does the company handle incidents involving personally identifiable information (PII)?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through were System contained and additional security measures implemented.

Regulatory Compliance

Were there any regulatory violations and fines imposed for each incident?

Incident : Data Breach QAN612070225

Regulations Violated: Potential Privacy Act violations

Regulatory Notifications: Australian Cyber Security Centre (ACSC), Office of the Australian Information Commissioner (OAIC), Australian Federal Police (AFP)

Incident : Data Breach QAN609070225

Regulatory Notifications: Australian Cyber Security Centre, Australian Federal Police, Office of the Australian Information Commissioner

Lessons Learned and Recommendations

What lessons were learned from each incident?

Incident : Fraud QAN535071025

Lessons Learned: Need for stronger identity verification systems, transparency and regulation of data brokers, active enforcement of cyber-enabled fraud, and proactive education.

What recommendations were made to prevent future incidents?

Incident : Fraud QAN535071025

Recommendations: Never share one-time passcodes over the phone, Hang up and call the bank directly if in doubt, Be cautious about sharing personal information online, Banks should reassess policies on customer communication, Redesign verification processes to prevent harm

What are the key lessons learned from past incidents?

Key Lessons Learned: The key lessons learned from past incidents are Need for stronger identity verification systems, transparency and regulation of data brokers, active enforcement of cyber-enabled fraud, and proactive education.

What recommendations has the company implemented to improve cybersecurity?

Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Never share one-time passcodes over the phone, Hang up and call the bank directly if in doubt, Be cautious about sharing personal information online, Banks should reassess policies on customer communication, Redesign verification processes to prevent harm.

References

Where can I find more information about each incident?

Incident : Fraud QAN535071025

Source: Article on convergence scams

Incident : Data Breach QAN609070225

Source: FBI

Incident : Data Breach QAN609070225

Source: Mandiant

Incident : Data Breach QAN609070225

Source: Palo Alto Networks

Where can stakeholders find additional resources on cybersecurity best practices?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Article on convergence scams, and Source: FBI, and Source: Mandiant, and Source: Palo Alto Networks.

Investigation Status

What is the current status of the investigation for each incident?

Incident : Fraud QAN535071025

Investigation Status: Ongoing

Incident : Data Breach QAN612070225

Investigation Status: Ongoing

Incident : Data Breach QAN609070225

Investigation Status: Ongoing

How does the company communicate the status of incident investigations to stakeholders?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through were Dedicated support hotline established, Email notifications and Support line for customers.

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident?

Incident : Data Breach QAN609070225

Customer Advisories: Email notifications, Support line for customers

What advisories does the company provide to stakeholders and customers following an incident?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Email notifications and Support line for customers.

Initial Access Broker

How did the initial access broker gain entry for each incident?

Incident : Fraud QAN535071025

Entry Point: Stolen personal data

High Value Targets: Bank customers

Data Sold on Dark Web: Bank customers

Incident : Data Breach QAN612070225

Entry Point: Third-party customer service platform

Incident : Data Breach QAN609070225

Entry Point: Third-party customer servicing platform

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident?

Incident : Fraud QAN535071025

Root Causes: Stolen personal data, weak enforcement, outdated verification systems

Corrective Actions: Stronger identity verification, regulation of data brokers, active enforcement

What is the company's process for conducting post-incident analysis?

Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Yes, Yes.

What corrective actions has the company taken based on post-incident analysis?

Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Stronger identity verification, regulation of data brokers, active enforcement.

Additional Questions

General Information

Who was the attacking group in the last incident?

Last Attacking Group: The attacking group in the last incident were an Cyber Criminals, Cybercriminals and Scattered Spider.

Incident Details

What was the most recent incident detected?

Most Recent Incident Detected: The most recent incident detected was on Monday.

What was the most recent incident publicly disclosed?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2024-07-17.

Impact of the Incidents

What was the highest financial loss from an incident?

Highest Financial Loss: The highest financial loss from an incident was A$6,000 (example case).

What was the most significant data compromised in an incident?

Most Significant Data Compromised: The most significant data compromised in an incident were Personal data, credit card details, Names, Email addresses, Phone numbers, Birth dates, Frequent flyer numbers, Customer names, Emails, Phone numbers, Frequent flyer numbers and Birth dates.

What was the most significant system affected in an incident?

Most Significant System Affected: The most significant system affected in an incident was Third-party customer service platform and Third-party customer servicing platform.

Response to the Incidents

What third-party assistance was involved in the most recent incident?

Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Yes.

What containment measures were taken in the most recent incident?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were System contained and additional security measures implemented.

Data Breach Information

What was the most sensitive data compromised in a breach?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Personal data, credit card details, Names, Email addresses, Phone numbers, Birth dates, Frequent flyer numbers, Customer names, Emails, Phone numbers, Frequent flyer numbers and Birth dates.

What was the number of records exposed in the most significant breach?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 17.7M.

Lessons Learned and Recommendations

What was the most significant lesson learned from past incidents?

Most Significant Lesson Learned: The most significant lesson learned from past incidents was Need for stronger identity verification systems, transparency and regulation of data brokers, active enforcement of cyber-enabled fraud, and proactive education.

What was the most significant recommendation implemented to improve cybersecurity?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Never share one-time passcodes over the phone, Hang up and call the bank directly if in doubt, Be cautious about sharing personal information online, Banks should reassess policies on customer communication, Redesign verification processes to prevent harm.

References

What is the most recent source of information about an incident?

Most Recent Source: The most recent source of information about an incident are Article on convergence scams, FBI, Mandiant and Palo Alto Networks.

Investigation Status

What is the current status of the most recent investigation?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.

Stakeholder and Customer Advisories

What was the most recent customer advisory issued?

Most Recent Customer Advisory: The most recent customer advisory issued was were an Email notifications and Support line for customers.

Initial Access Broker

What was the most recent entry point used by an initial access broker?

Most Recent Entry Point: The most recent entry point used by an initial access broker were an Third-party customer service platform, Stolen personal data and Third-party customer servicing platform.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge