BBC News, Sydney
Qantas is contacting customers after targeting its third party customer service platform after a cyber attack.
On June 30, the Australian airline detected “unusual activity” on a platform used by its contact center, which included names, email addresses, phone numbers, date and frequent flying numbers to store data of six million people.
According to a statement, when the breech was detected, Kantas “immediate steps and the system ingested”.
The company is still investigating the entire range of violations, but says it is expecting the ratio of stolen data to be “important”.
It has assured the public that passport details, credit card details and personal financial information were not conducted in the violation system, and no constant flyer accounts, passwords or PIN numbers have been compromised.
Qantas has informed the Australian federal police to violate the Australian Cyber ​​Security Center and the Australian Information Commissioner’s office.
“We honestly apologize to our customers and we recognize uncertainty, this will be the reason.”
He asked the customers if they were concerned, they were asked to call on the dedicated support line, and confirmed that there would be no effect on the operation of the Kantas or the security of the airline.
The cyber attack is the latest in a string of Australian data violations this year, in which Australians and nine media suffer from significant leaks in the last few months.
In March 2025, the office of the Australian Information Commissioner (OAIC) ​​released the data, stating that 2024 was the worst year for data violations in Australia since the records started in 2018.
In an OAIC statement, Australian Privacy Commissioner Carley said, “The trends that we are observing suggest the threat of data violations, especially through the efforts of malicious actors, is unlikely to decrease.”
MS Kind urged businesses and government agencies to increase safety measures and data security, and highlighted that both private and public sectors are unsafe for cyber attacks.