Phishing Attack Prevention: What the Booking.com and Super Fund Attacks Teach Australian SMBs
When hackers compromised Booking.com’s supply chain in April 2026, the real attack started the next day with a flood of hyper-targeted phishing emails to genuine customers. When 20,000 Australian superannuation accounts were drained in the April 2025 super fund attacks, the attackers did not hack the funds. They used credentials stolen from unrelated breaches to log in as the real members. Every day in Australia, phishing emails, smishing texts, and vishing calls are bypassing technology and walking straight into inboxes that belong to trusted staff. Phishing attack prevention is no longer about training staff to spot bad grammar. It is about rebuilding the layers of defence that assume one email will get through, because it will. Why 2025 Was the Year Phishing Got Personal The modern phishing attack is almost unrecognisable compared to five years ago. In 2025 and 2026, Australian businesses are facing: The ACSC recorded over 84,700 cybercrime reports in FY2024-25, with business email compromise, identity fraud, and phishing dominating the categories. The Booking.com Supply Chain Phishing Attack In April 2026, Booking.com confirmed that attackers had accessed customer names, emails, addresses, and booking details via a compromised third party. The immediate follow-up was a wave of convincing phishing emails to those customers, referencing real bookings and asking for payment “verification.” This is the phishing attack of 2026: legitimate data stolen from one source, weaponised against real customers the next day, with specific and verifiable detail that defeats traditional detection. The Super Fund Credential Stuffing Attack In April 2025, more than 20,000 super accounts across AustralianSuper, REST, Hostplus, Australian Retirement Trust, and Insignia Financial were compromised. Attackers did not breach the super funds. They used credentials stolen from unrelated data breaches, betting that users had reused the same password. Four AustralianSuper members lost a combined $500,000. A 74-year-old Queensland woman lost $406,000 overnight. The attack was pure phishing-derived credential harvesting combined with password reuse. The Six Layers of Modern Phishing Attack Prevention Technology alone will not stop phishing. People alone will not either. Modern phishing attack prevention requires six overlapping layers: Recommended Link: Security Awareness Training That Actually Works The Process Controls That Matter as Much as Technology Technology stops the easy attacks. Process stops the sophisticated ones: Recommended Link: Email and Office 365 Security for Australian Businesses How Confident Are You That Your Next Phishing Email Will Be Caught?Phishing attack prevention is now a layered discipline. A single control is not enough. Frequently Asked Questions Q: What is the single most effective phishing attack prevention control?A: Phishing-resistant MFA on every business system. Microsoft’s own data shows it blocks more than 99.9% of automated credential attacks. It is not perfect, but nothing else comes close. Q: How often should staff receive phishing training?A: Quarterly at minimum, with monthly phishing simulations for high-risk roles such as finance, executive assistants, and HR. Annual training alone is not enough. Q: If a staff member falls for a phishing email, who is responsible?A: This is why a “pause and verify” culture matters. Staff who report incidents quickly should be supported, not punished. Blame cultures make phishing worse because staff hide mistakes. The Booking.com incident, the super fund attack, the Qantas call-centre compromise, and every other major 2025-2026 Australian breach share one common feature: phishing, in some form, was the entry point. Phishing attack prevention is no longer an IT checkbox. It is the front line of your entire business. The question is whether you are treating it that way today, or whether you will be explaining to customers why you did not. (We are not looking to replace your current provider, just offering an alternative perspective) Written by Neil Frick Sources & References
Read MoreDark Web Monitoring: Are Your Business Credentials Already For Sale?
Here is a fact that should concern every Australian business owner: the credentials used to access your email, accounting software, and business banking may already be sitting on dark web marketplaces, available for purchase by anyone willing to pay. The ACSC sent 9,587 credential exposure notifications to approximately 220 organisations in less than eight months in 2024-25. These were cases where they could prove credentials were already compromised — the true number of exposed businesses is far higher. The challenge is that most businesses have no idea their credentials are exposed until an attacker uses them. By then, the damage is already underway. This is where dark web monitoring becomes not a luxury but a foundational security control for every Australian SMB. How Your Credentials End Up on the Dark Web The path from your business systems to dark web marketplaces is unfortunately well-worn. It starts somewhere you may not even be thinking about. Step 1: A breach happens somewhere you use your email address. This might be a previous employer, a conference registration site, a retail platform, or any number of services that have suffered data breaches. LinkedIn, Ticketmaster, Adobe — major breaches expose billions of credentials. Step 2: Your credentials are harvested and sold. Data from breaches is aggregated, packaged, and sold on dark web marketplaces. Criminals buy massive credential databases and run them through automation tools to identify working logins. Step 3: Information stealer malware compounds the problem. Beyond large data breaches, info stealer malware — distributed through phishing emails, malicious downloads, and fake software — actively harvests credentials directly from infected devices. It captures passwords stored in browsers, session tokens, and financial data before transmitting everything to criminal infrastructure. In 2024-25, the ACSC documented a case where a utility company employee’s personal device was infected with info stealer malware. Work credentials stored in the employee’s personal Google account were extracted and used to attempt access to corporate systems. The only thing that prevented a breach was MFA. The Information Stealer Ecosystem: A Silent Threat to Australian Businesses Information stealers are now offered as Malware-as-a-Service (MaaS) on criminal marketplaces, making them accessible to entry-level cybercriminals. Common variants target: Usernames and passwords from all browsers Session cookies (bypassing MFA in some cases) Cryptocurrency wallet data Financial application credentials Corporate VPN credentials Microsoft 365 and Google Workspace tokens The most alarming aspect of info stealers is that they operate silently. An infected device shows no obvious symptoms. The theft happens invisibly, and the stolen data may sit on criminal infrastructure for months before being used or sold. What Dark Web Monitoring Actually Does Effective dark web monitoring continuously scans criminal infrastructure so you know about exposure before attackers act on it. This includes: Criminal forums and marketplaces where stolen credentials are bought and sold Paste sites where hackers publicly dump breach data Telegram channels used for distributing stolen data Dark web leak sites operated by ransomware groups Breach databases being compiled and traded When your email domain or specific credentials appear in any of these sources, you receive an alert. This gives you a critical window to: Force password resets before credentials are used Identify which employees or systems are exposed Determine whether MFA is in place to block potential use Investigate whether devices may be infected with info stealers The ACSC’s Operation Aquila, a joint operation with the AFP, specifically pursues cybercriminals who use information stealer capabilities against Australians. But government pursuit of criminals is a lagging response. Your best defence is knowing your credentials are exposed before someone acts on them. What to Do When Credentials Are Found on the Dark Web Immediate actions: Force a password reset for all affected accounts Check those accounts for unusual login history or activity Verify MFA is enabled and active on all affected accounts Scan affected devices for info stealer malware Rotate credentials for any systems the affected user had access to Review recent financial transactions for signs of fraudulent activity Systemic actions: Implement regular password rotation policies Deploy MFA across all business systems without exception Review your browser password manager policies — avoid storing corporate credentials in personal browser accounts Educate staff on the info stealer threat and safe browsing practices The ASD’s Cyber Hygiene Improvement Program The ACSC’s Cyber Hygiene Improvement Programs (CHIPs) scan Australian organisations’ internet-facing infrastructure and alert them to vulnerabilities — including exposed credentials. In FY2024-25, CHIPs performed 478 high-priority operational assessments, distributed over 14,400 reports to 3,900 organisations, and sent 11,000 notifications about indicators of compromise. This represents the government side of the equation. Commercial dark web monitoring provides the private sector complement: continuous, real-time surveillance of criminal infrastructure for your specific credentials and domain. Your Business Credentials May Already Be For Sale. Find Out Now, Before Someone Buys Them. Netlogyx provides ongoing dark web monitoring as part of our managed security services, giving you visibility into your credential exposure and the ability to act before attackers do. Conduct an initial dark web scan for your business domain Review your credential exposure across historical breaches Implement ongoing monitoring with real-time alerting Frequently Asked Questions Q: How quickly can stolen credentials be used after a breach? A: Very quickly. Research shows that credentials stolen in large breaches can be tested against other platforms within hours. Info stealer data is often sold within days of collection. The window between exposure and exploitation can be extremely short, which is why real-time monitoring matters. Q: Does changing my password after a breach notification protect me? A: For password-based access, yes. However, if an info stealer harvested session cookies, attackers may have session tokens that bypass MFA and allow access without a password. This is why credential exposure alerts should trigger a comprehensive review, not just a password reset. Q: Our company is small and not well-known. Why would anyone target our credentials? A: Dark web credential markets do not distinguish by business size. Your credentials are valuable because they grant access to business banking, accounting software, client
Read MoreAustralia’s Superannuation Funds Under Fire: What SMBs Must Learn from the 2025 Credential Stuffing Attack
In early April 2025, Australian retirement savers woke up to a nightmare. Over 20,000 superannuation accounts across AustralianSuper, REST, Hostplus, Australian Retirement Trust, and Insignia Financial were compromised in a wave of credential stuffing attacks. Four AustralianSuper members lost a combined $500,000. One Queensland woman aged 74 had $406,000 drained from her retirement account overnight. If cybercriminals can breach institutions managing hundreds of billions of dollars, the message for Australian small and medium businesses is crystal clear: no one is immune. What Actually Happened in the Super Fund Attack? Credential stuffing is not sophisticated hacking. Attackers simply obtained lists of stolen usernames and passwords from previous data breaches, then used automated tools to try those same credentials against super fund login portals. People who reused passwords across multiple platforms became the victims. This is the critical point for SMB owners. The technique used against institutions managing $4.2 trillion in retirement savings is the same technique being used against your email systems, accounting platforms, and cloud services every day. The attack chain was simple: Why SMBs Are Even More Vulnerable Superannuation funds, despite their gaps, had security teams, incident response protocols, and regulatory oversight. Most Australian SMBs have none of these safeguards. According to the ASD Annual Cyber Threat Report 2024-25, SME owners experienced significantly higher rates of cybercrime than other business types, with an average cost of $56,600 per incident for small businesses, up 14% from the previous year. If your team is using the same password for Microsoft 365, your CRM, your accounting software, and their personal email — you are one data breach away from this exact scenario playing out in your business. The Five Steps Every SMB Must Take Now 1. Deploy Multi-Factor Authentication (MFA) on everythingThe super fund attack succeeded partly because MFA was not mandatory across all platforms. If your team can log in to business systems using only a username and password, you have a critical gap. Phishing-resistant MFA, such as authenticator apps or hardware keys, should be non-negotiable. 2. Audit your credential exposureDark web monitoring services can alert you when your business credentials appear in breach databases. By the time attackers are attempting logins, the credentials are often months old. Proactive monitoring gives you time to act before the attack begins. 3. Enforce unique passwords across all systemsPassword reuse is the entire mechanism that makes credential stuffing possible. Deploy a business password manager and enforce strong, unique credentials for every system. This single step eliminates the primary vector used in the super fund attacks. 4. Implement access controls and least privilegeNot every staff member needs access to every system. Restricting access limits the blast radius if a credential is compromised. A compromised account with limited privileges causes significantly less damage. 5. Have an incident response planWhen AustralianSuper detected the attack, they locked accounts and notified members within hours. Most SMBs would have no structured response. A documented plan, tested annually, dramatically reduces the damage from any breach. Ready to find out if your business credentials are already exposed? Netlogyx offers a no-obligation cybersecurity consultation where we check your dark web exposure, review your access controls, and identify your highest-risk gaps before an attacker does. Frequently Asked Questions Q: What is credential stuffing and how is it different from hacking?A: Credential stuffing does not involve breaking into a system. Attackers use usernames and passwords already stolen from other breaches and test them at scale against new platforms. It works because people reuse passwords. It requires no special hacking skill — just automation and purchased data. Q: How do I know if my business credentials have been exposed?A: Dark web monitoring services continuously scan criminal marketplaces and breach databases for your domain and email addresses. A managed IT provider like Netlogyx can set this up as part of your security stack and alert you immediately when your credentials appear. Q: Is MFA enough to prevent credential stuffing?A: Yes, in almost all cases. Even if an attacker has your correct username and password, they cannot pass the MFA challenge without physical access to your authenticator device. Phishing-resistant MFA stops credential stuffing almost completely. The super fund attack was a national wake-up call. The same tools and techniques used to steal retirement savings are targeting Australian SMBs every day. The difference is that large institutions, despite their flaws, had teams and systems in place to detect and respond. Most small businesses do not – yet. Netlogyx Technology Specialists works with businesses across Brisbane, the Gold Coast, and Southeast Queensland to close exactly these gaps. We build cybersecurity that fits your business, not your IT provider’s product catalogue. (We are not looking to replace your current provider, just offering an alternative perspective) Written by the Netlogyx Technology Specialists Team Sources & References
Read More