Qantas Cyber Attack: An Insight into the Threat Landscape
Overview of the Incident
When Qantas announced a significant cyber attack compromising the personal data of millions of its customers, attention swiftly turned to the Scattered Spider hacking collective. This incident has raised concerns across the cybersecurity realm, highlighting vulnerabilities that could impact many organizations.
Connections to the ShinyHunters Group
On July 30, Bleeping Computer detailed a series of data breaches linked to high-profile companies such as Qantas, Allianz Life, LVMH, and Adidas. These attacks have been attributed to the ShinyHunters extortion group, known for employing voice phishing techniques to infiltrate Salesforce Customer Relationship Management (CRM) systems. The overlapping nature of tactics used by both ShinyHunters and Scattered Spider suggests a collaborative environment or at least shared strategies, according to insights from various cybersecurity experts.
Expert Insights on the Attack Patterns
Allan Liska, an Intelligence Analyst at Recorded Future, emphasized the significant similarities in tactics, techniques, and procedures (TTPs) employed by Scattered Spider and ShinyHunters. This overlap indicates a potential alliance or at least operational familiarity among these groups. Bleeping Computer further correlated ShinyHunters with a series of targeted intrusions on Salesforce CRM platforms, raising speculation that Qantas might have experienced a similar breach.
The Salesforce Vulnerability
Despite Qantas not explicitly confirming that the attack involved a compromise of its Salesforce platform, industry experts have raised questions regarding this possibility. Google’s Threat Intelligence Group (GTIG) issued warnings in June about a threat actor identified as UNC6040, which was actively targeting Salesforce instances. This actor reportedly utilized a modified version of Salesforce’s own Data Loader application to extract sensitive data from victim organizations.
Unauthorized Access and Data Exfiltration
Reports from GTIG reveal that in some cases involving the Data Loader, the perpetrators directly solicited user credentials and multi-factor authentication codes. This method facilitated unauthorized access and enabled the hackers to extract valuable data seamlessly. When UNC6040 communicated with its victims, it frequently claimed affiliations with the ShinyHunters group.
Revelations from Court Documents
Court documents obtained by Cyber Daily have unveiled correspondence between Qantas and its hackers, although the hackers’ name there was redacted. However, Bleeping Computer sources suggest that the true identity of the hackers aligns with ShinyHunters, fitting the structural patterns observed in previous attacks.
Ongoing Threats and Recent Arrests
The ShinyHunters group remains a pertinent threat; several individuals associated with them were recently arrested in France. Nevertheless, the group boasts a history of successful breaches, targeting not only Salesforce but also other major corporations, including AT&T, Ticketmaster, and Pizza Hut.
While some arrests have been made, the activity of ShinyHunters suggests a larger network at play. Analysts suspect that both ShinyHunters and Scattered Spider may be part of a more expansive, enigmatic collective known as The Com. This group is thought to possess advanced technical skills and is primarily English-speaking, although little concrete information is available.
Conclusion
As Qantas continues to grapple with the aftermath of this cyber attack, the narrative underscores a pressing concern within the cybersecurity landscape. The interconnected nature of these hacking groups poses ongoing challenges for organizations striving to safeguard their data and maintain customer trust.


