Salesforce breach escalates: Qantas & Vietnam Airlines data leaked on dark web 

The recent developments surrounding the Salesforce data breach serve as a stark reminder of the persistent threats organizations face. What began as a concerning incident earlier this summer has now escalated dramatically, with threat actors following through on their threats and releasing a substantial trove of Qantas customer data to the public.  

This is a stark, real-world demonstration of the evolving nature of threats, organizational attack surface and a critical wake-up call for IT leaders to manage their exposure. 

Timeline of the incident 

The Qantas data breach began on June 30th, 2025, when the company detected unusual activity on a third-party customer service platform, leading to a confirmation of a cyberattack on July 2nd, 2025. The breach exposed personal information of up to six million customers. 

Date/Period Event Significance 
Mid-2025 Initial intrusions began, targeting Salesforce instances of global organizations via social engineering and third-party app compromises (e.g., Salesloft Drift). Attackers secured data without breaching the core Salesforce platform itself, exploiting customer-side vulnerabilities. 
October 6th, 2025 Scattered LAPSUS$ Hunters launches a dedicated Data Leak Site (DLS), listing 39 victims and issuing a final ransom deadline. The extortion campaign enters its public phase, weaponizing brand reputation. 
October 10th, 2025 The final ransom deadline passes without payment from Salesforce or the victims. The critical pivot point: the threat actors lose their leverage, leading to the data dump. 
October 11th-13th, 2025 Qantas and Vietnam Airlines data, along with data from four other victims, is publicly released onto the dark web. The breach escalates to a full-blown public crisis, demonstrating the actor’s intent to damage non-paying victims. 

Our analysis of the escalation and public exposure  

Scattered LAPSUS$ Hunters, have followed through on their ultimatum. This is a significant data dump designed to inflict maximum reputational and financial damage. 

Track external threats across the open and dark web.

Our ongoing analysis of the threat group’s Data Leak Site (DLS) and Telegram channels reveals a concerning picture. So far, we’ve identified six victims whose data has been publicly exposed in connection with this Salesforce attack.

Screenshot Current Leaks
Six identified victims of the Salesforce attack  
  • Qantas: Approximately 153GB of client data, affecting over 5 million customer records, was released. This data includes names, emails, dates of birth, and frequent flyer numbers – all the components needed for highly effective spear-phishing and social engineering attacks. 
  • Vietnam Airlines: A substantial 64GB of customer data, including over 7.3 million unique customer email addresses and related PII, was also exposed. 
  • The Broader Risk: These two airlines are the largest of six victims whose data has been leaked so far, with the threat group listing over 30 other organizations whose data they claim to hold. 
Screenshot future leaks
Examples of victims allegedly affected by the Salesforce hack whose data is yet to be released 

What we understand about Scattered LAPSUS$ Hunters: The playbook 

The threat group’s activity during this whole campaign, as well as on both their DLS and Telegram channels highlights their sophistication and determination. They are not simply passive data holders; they are active communicators, leveraging these platforms to: 

  • Publicly name and shame victims: The DLS serves as a public ledger of their “achievements,” listing companies they claim to have breached and whose data they intend to release. This public shaming tactic adds immense pressure on victim organisations. 
screenshot leak announcement
List of companies the group claim to have breached 
  • Issue threats and ultimatum: Through Telegram, they communicate publicly, issuing threats and setting deadlines for ransom payments. Their public communications often display a confrontational stance, even towards law enforcement and security researchers. 
Screenshot FBI threat
Figure 4. “Fullz” section. Source: Brian’s Club
  • Showcase “proof” of compromise: Before a full data dump, they often release small samples of data as “proof of life” to legitimize their claims and further pressure victims. 
  • Coordinate and recruit: While less overt, these platforms can also serve as a means for the group to coordinate their activities and potentially even recruit new members or affiliates.
screenshot scattered lapsus$ recruitment campaign
Scattered LAPSUS$ Hunters recruitment campaign. They wanted help to email employees of victim organisations with the DLS prior to the release of data 

The significant volume of data released from Qantas and Vietnam Airlines, coupled with the group’s ongoing threats against 39 other listed companies, suggests that this could indeed be just the beginning. The impact on customer trust, brand reputation, and regulatory penalties for these organisations will be substantial. 

This incident highlights two critical realities  

The third-party exposure trap   

Your security perimeter is no longer just your firewall; it encompasses where your data resides and who has access. The compromise of Qantas and Vietnam Airlines data stemmed from weaknesses in their trusted third-party SaaS platform, Salesforce. A security lapse anywhere in your digital ecosystem can become your organization’s liability. 

The weaponization of identity   

Threat actors are increasingly targeting individuals to bypass technical controls. The primary tactic of the LAPSUS$ Hunters is social engineering – exploiting employees to gain access and potentially leading to significant data leaks. 

Protect your business going forward  

Outpost24 is committed to providing the visibility needed for proactive resilience. We believe that the future needs a more proactive, intelligence-led approach. We need to shift from reactive measures to proactive resilience. The ability to continuously identify, prioritize and limit your exposures fast, before incidents escalate.  

Our CompassDRP solution offers crucial dark web intelligence to spot threats early. you can monitor your known (and unknown!) public-facing internal assets, as well as threats from external channels across the open, deep, and dark web. Once identified, these threats are prioritized and ready for remediation.  

Asset discovery + threat intelligence powered DRP.

Is your organization’s email domain linked to compromised credentials? Let’s find out. Powered with threat intelligence used by CompassDRP, this free look-up delivers actionable intelligence via email. All we need is your corporate email address and we’ll be in touch with your results. Get your free results now.

About the Author

KrakenLabs Threat Intelligence Team, Outpost24

KrakenLabs is Outpost24’s Cyber Threat Intelligence team. Our team helps businesses stay ahead of malicious actors in the ever-evolving threat landscape, helping you keep your assets and brand reputation safe. With a comprehensive threat hunting infrastructure, our Threat Intelligence solution covers a broad range of threats on the market to help your business detect and deter external threats.