In July 2025, Australia woke up to news that up to 6 million Qantas customer records had been stolen through a single phone call to a third-party call centre. The Qantas data breach was not the result of zero-day exploits or state-sponsored malware. It was social engineering. A hacking group known as Scattered Spider convinced a help-desk operator they were a legitimate employee, bypassed multi-factor authentication, and walked out with names, emails, phone numbers, dates of birth, and frequent flyer numbers. If Australia’s flag carrier can be taken down by one phone call, your SMB needs to understand exactly how this happened and what to do about it.

How the Qantas Data Breach Actually Unfolded
The Qantas data breach began on 30 June 2025, when attackers targeted a third-party contact centre used by the airline. Using a technique known as voice phishing (vishing), the attackers impersonated a staff member needing urgent access recovery.
The help-desk operator followed standard verification questions. The attackers had already harvested those answers from LinkedIn, data broker sites, and previous breaches. Within minutes, credentials were reset and MFA was reregistered to a device controlled by the attacker.
The lesson for Australian SMBs is brutal. Your weakest link is rarely your firewall. It is the human being answering the phone when someone sounds stressed and authoritative.
Who Is Scattered Spider and Why Are They Targeting Australia?
Scattered Spider is a loose collective of native-English-speaking cybercriminals specialising in social engineering attacks against help desks, IT support functions, and outsourced service providers. The Australian Signals Directorate issued a formal advisory on the group in July 2025.
Their preferred playbook includes:
- Researching targets using LinkedIn and public data
- Calling service desks pretending to be locked-out staff
- Convincing operators to reset passwords and re-enrol MFA
- Moving laterally within hours of gaining access
- Exfiltrating customer data for extortion
Security Awareness Training for Australian Businesses

Why SMBs Are Just as Exposed as Qantas
Most Australian small businesses outsource something: bookkeeping, IT support, payroll, or customer service. Every one of those relationships is a potential Scattered Spider entry point. The Qantas data breach happened through a third party, not through Qantas’ own systems.
Ask yourself:
- Who answers the phone when a “staff member” calls asking for a password reset?
- What verification steps are required before credentials are changed?
- Is MFA re-enrolment logged and approved by a second person?
- Do you know which of your vendors have access to your customer data?
Five Controls That Would Have Stopped Scattered Spider
- Callback verification. Every password reset request from a phone call must be verified by calling the staff member back on a number already on record
- Phishing-resistant MFA. Hardware security keys or passkeys defeat SIM-swap and re-enrolment attacks
- Help-desk scripts with code words. Internal staff should have pre-agreed verification phrases not available on social media
- Privileged access management. Limit how many people can reset credentials and log every action
- Third-party audits. Demand your vendors meet the same standards you hold internally
Business Cyber Security Policies for SMBs

Is Your Help Desk a Hacker’s Front Door?
The Qantas data breach shows that even $20 billion companies fall to one phone call. Your SMB has less margin for error.

- Audit your third-party access paths
- Deploy phishing-resistant MFA across every critical system
Frequently Asked Questions
Q: Was the Qantas data breach caused by a Qantas system failure?
A: No. The breach occurred through a third-party contact centre. This is exactly why vendor risk management is now a front-line cyber security control for every business.
Q: Would MFA alone have stopped this attack?
A: Not by itself. Scattered Spider specifically targets MFA re-enrolment. Phishing-resistant MFA combined with strict help-desk verification processes is required.
Q: How quickly should my business act on this?
A: Immediately. Scattered Spider is actively targeting Australian organisations across retail, hospitality, financial services, and professional services right now.
The Qantas data breach is not an airline problem. It is a wake-up call for every Australian SMB that relies on people, phones, and third-party vendors. The attackers are already here, and they are calling. The only question is whether your team knows what to say when they do.
(We are not looking to replace your current provider, just offering an alternative perspective)

Written by Neil Frick
Sources & References
- Cyber Daily – Qantas confirms cyber incident impacting customer data – https://www.cyberdaily.au/security/12317-qantas-confirms-cyber-incident-impacting-customer-data
- Australian Signals Directorate – Scattered Spider advisory – https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/scattered-spider
- ABC News – Qantas data breach: website seizure – https://www.abc.net.au/news/2025-10-10/article-qantas-data-breach-website-seizure/105879120