Threat Summary
Category: Commercial Aviation Data Breach
Features: Third-party platform compromise, large-scale customer data exposure, multi-country privacy impact, extortion-driven data publication, brand impersonation scams
Delivery Method: Salesforce supply-chain infiltration via third-party API credentials, credential harvesting, exfiltration, and controlled leak publication
Threat Actor: Scattered LAPSUS$ Hunters (possible rebrand of Scattered Spider / LAPSUS$ hybrid operators), financially motivated, with cross-regional nodes in Eastern Europe, Southeast Asia, and the U.S.
The Australian airline Qantas has confirmed that cybercriminals released personal data stolen during a July 2024 breach involving a Salesforce-linked third-party platform, affecting 5.7 million passengers.
The incident, first classified as a “third-party data exposure,” has evolved into a coordinated extortion and publication campaign led by the threat group Scattered LAPSUS$ Hunters, which has now leaked datasets from six major corporations simultaneously.
Qantas’ confirmation follows the group’s decision to publicly release data stolen from its systems and from several other high-profile clients of Salesforce after the company refused to pay a ransom demand.
The attackers exploited the data-synchronization layer between Salesforce and Qantas’ internal loyalty database, compromising APIs used for Frequent Flyer data management and marketing analytics synchronization.
Qantas has obtained an Australian court injunction barring citizens from viewing or redistributing the leaked material, citing data protection and victim privacy laws.
But outside the jurisdictional reach of that injunction, copies of the data are already circulating across Telegram, Tor markets, and breach forums, with metadata samples confirming the authenticity of customer records.
Core Narrative
The Qantas attack originated in early July 2024, when a misconfigured Salesforce connector exposed internal API keys to an external data-logging repository.
Within days, the attackers accessed the dataset, extracted records, and began selectively releasing fragments as proof-of-hack.
At the time, Qantas assured customers that “no sensitive financial or passport information” had been compromised — a statement now under scrutiny as deeper leaks reveal contact, biometric preference, and travel itinerary metadata tied to nearly 1.7 million users.
The breach data includes:
- 2.8 million records with names, emails, and Frequent Flyer IDs
- 1.7 million with addresses, phone numbers, and demographic data
- Targeted files containing customer meal preferences, gender, and date of birth — valuable for social engineering and spear-phishing campaigns
Though Qantas emphasized that login credentials and payment details were not included, the behavioral depth of the data (meal types, routes, birthdays, gender indicators) can enable precise identity inference across multiple accounts.
These “secondary identifiers” have become prime raw material in AI-assisted identity fraud frameworks — especially when combined with breached airline data from previous LAPSUS$ and Scattered Spider leaks.
Salesforce’s refusal to pay the ransom triggered the release.
The attackers, maintaining a global leak hub on both the clear web and the dark net, published partial datasets tied to Qantas, Vietnam Airlines, and four unnamed multinationals two weeks after their extortion demand was ignored.
Within 24 hours, the FBI dismantled the group’s original leak domains — but within hours, mirror sites reappeared under new infrastructure hosted across Russia, Romania, and Indonesia.
This confirmed that Scattered LAPSUS$ Hunters are operating as a resilient hybrid cell, capable of domain regeneration and cross-platform persistence — a hallmark of advanced distributed cyber gangs leveraging bot-driven rehosting automation.
Infrastructure at Risk
- Aviation Sector: Loyalty systems, ticketing databases, and biometric check-in APIs
- Third-Party SaaS Integrations: Salesforce, Amadeus, and custom CRM extensions
- Consumer Communication Channels: Impersonation emails, fake refund scams, and phishing clones of Qantas domains
- Regulatory Systems: Cross-border exposure involving the Australian Privacy Commissioner and New Zealand’s Office of the Privacy Commissioner
- Government Coordination: Sensitive transportation-sector telemetry that could reveal flight pattern analytics or internal administrative IDs
While no flight operations were disrupted, the attack directly undermined customer trust, creating a long-tail impact that extends into reputation, compliance risk, and future litigation exposure.
Experts estimate remediation and monitoring costs will surpass A$45 million within the first quarter of 2025.
Policy / Allied Pressure
The breach has intensified scrutiny from Australia’s Office of the Australian Information Commissioner (OAIC) and New Zealand’s Privacy Commissioner, both of which are demanding tighter controls over cross-border data transfers involving foreign SaaS vendors.
Qantas’ immediate response — a customer hotline, a fraud advisory campaign, and internal leadership pay reductions — reflects an attempt at visible accountability, but analysts question whether reactive measures will prevent future systemic exposure.
This incident reignites the global debate on data sovereignty, especially regarding multinational CRM systems where foreign cloud infrastructure processes domestic citizen data.
The absence of clear jurisdictional authority in transnational data flows leaves both customers and regulators in legal limbo, particularly when ransomware groups exploit that gap as leverage.
Vendor Defense / Reliance
Salesforce confirmed that its core infrastructure was not breached, placing responsibility on misconfigured third-party connectors — yet that deflection underscores the growing fragility of multi-tenant SaaS ecosystems.
Most corporations rely on dozens of API-based integrations across marketing, analytics, and operations — and a single compromised link can expose millions.
The case further illustrates why vendor due diligence must now include penetration testing of every connected system — not just those under direct control.
Cyber insurers are already classifying Salesforce-related third-party leaks as a “known systemic risk,” raising the likelihood of increased premiums and narrower coverage clauses for all clients using shared SaaS connectors.
Forecast — 30 Days
- Legal: Australian and New Zealand privacy agencies expected to issue coordinated enforcement notices against Qantas.
- Operational: Impersonation scams exploiting leaked data likely to surge, targeting loyalty program members via SMS and email.
- Geopolitical: Secondary leaks from other Salesforce clients may emerge — possible cross-sector chain reaction.
- Corporate: Airlines to increase spending on third-party cybersecurity assessments and adopt regional data localization mandates.
- Threat Landscape: Expect reactivation of LAPSUS$-linked operators using deepfake customer support calls to validate account resets.
The Scattered LAPSUS$ Hunters are not only escalating their operations — they are evolving into a distributed extortion network capable of global parallel attacks that outpace traditional incident response cycles.
TRJ Verdict
This breach marks a critical inflection point for aviation cybersecurity.
Qantas’ compromise was not an isolated incident — it was a live demonstration of the fragility embedded in the SaaS supply chain.
When corporate data sovereignty is outsourced to third-party ecosystems like Salesforce, resilience becomes a function of trust, not control — and trust is not a security model.
The breach illustrates a grim truth:
Corporations no longer own their data. They lease it — and pay the ransom when someone else loses it.
Regulators remain trapped in reactive postures, issuing statements after the data is already weaponized.
Meanwhile, threat actors leverage automation, anonymity, and replication to make every takedown irrelevant before it completes.
Until companies enforce architectural isolation, regional data segmentation, and contractual cyber liability, this cycle will continue.
Qantas didn’t just lose customer data — it lost the narrative.
And in the new cyber economy, control of the narrative is the most valuable data of all.
🔥 NOW AVAILABLE! 🔥
📖 INK & FIRE: BOOK 1 📖
A bold and unapologetic collection of poetry that ignites the soul. Ink & Fire dives deep into raw emotions, truth, and the human experience—unfiltered and untamed.
🔥 Kindle Edition 👉 https://a.co/d/9EoGKzh
🔥 Paperback 👉 https://a.co/d/9EoGKzh
🔥 Hardcover Edition 👉 https://a.co/d/0ITmDIB
🔥 NOW AVAILABLE! 🔥
📖 INK & FIRE: BOOK 2 📖
A bold and unapologetic collection of poetry that ignites the soul. Ink & Fire dives deep into raw emotions, truth, and the human experience—unfiltered and untamed just like the first one.
🔥 Kindle Edition 👉 https://a.co/d/1xlx7J2
🔥 Paperback 👉 https://a.co/d/a7vFHN6
🔥 Hardcover Edition 👉 https://a.co/d/efhu1ON
Get your copy today and experience poetry like never before. #InkAndFire #PoetryUnleashed #FuelTheFire
🚨 NOW AVAILABLE! 🚨
📖 THE INEVITABLE: THE DAWN OF A NEW ERA 📖
A powerful, eye-opening read that challenges the status quo and explores the future unfolding before us. Dive into a journey of truth, change, and the forces shaping our world.
🔥 Kindle Edition 👉 https://a.co/d/0FzX6MH
🔥 Paperback 👉 https://a.co/d/2IsxLof
🔥 Hardcover Edition 👉 https://a.co/d/bz01raP
Get your copy today and be part of the new era. #TheInevitable #TruthUnveiled #NewEra
🚀 NOW AVAILABLE! 🚀
📖 THE FORGOTTEN OUTPOST 📖
The Cold War Moon Base They Swore Never Existed
What if the moon landing was just the cover story?
Dive into the boldest investigation The Realist Juggernaut has ever published—featuring declassified files, ghost missions, whistleblower testimony, and black-budget secrets buried in lunar dust.
🔥 Kindle Edition 👉 https://a.co/d/2Mu03Iu
🛸 Paperback Coming Soon
Discover the base they never wanted you to find. TheForgottenOutpost #RealistJuggernaut #MoonBaseTruth #ColdWarSecrets #Declassified


Comment on “Qantas Data Breach Expands: Scattered LAPSUS$ Hunters Leak Exposes 5.7 Million Customers Across Global Airline Network”