7.3 million customers
On October 11, 2025, it was revealed that Vietnam Airlines was the victim of a major data breach that exposed the personal information of 7.3 million customers. The attack is attributed to the Scattered LAPSUS$ Hunters threat group, which conducted a wide-ranging supply chain attack by compromising Salesforce environments. The initial breach occurred in June 2025, but the data was not publicly leaked until October. The compromised dataset is confirmed to contain 7.3 million unique email addresses and other PII. This incident, closely following the disclosure of a similar attack on Qantas Airways, underscores the significant systemic risk posed by attacks on major cloud service providers and the cascading impact on their customers.
This attack follows the same pattern as the Qantas breach, indicating a coordinated campaign by the Scattered LAPSUS$ Hunters group. The attackers targeted a third-party cloud platform, Salesforce, rather than Vietnam Airlines' internal network. By compromising the airline's CRM instance, they gained access to a trove of customer data. The initial access occurred in June 2025, giving the attackers a four-month dwell time before they began leaking the data as part of a broader extortion strategy. The delayed public acknowledgment by Vietnam Airlines, which reportedly came over two days after the data was released and only after international media coverage, has raised concerns about the company's incident response and transparency.
The TTPs are consistent with those used against Qantas and other victims of the same campaign.
T1078.004 - Cloud Accounts): The attackers likely used social engineering or credential theft to gain access to a privileged account within the Vietnam Airlines Salesforce environment.T1530 - Data from Cloud Storage): Once inside the CRM, the attackers exfiltrated the customer database, which contained 7.3 million unique records.T1537 - Transfer Data to Cloud Account): Data was likely moved from the compromised Salesforce instance to attacker-controlled storage.This incident is a textbook example of a supply chain attack where a single vulnerability or compromise at a major vendor (like Salesforce) can have a catastrophic ripple effect across dozens or even hundreds of its customers. It shifts the defensive focus from just protecting one's own perimeter to scrutinizing the security of all critical third-party services.
No specific file hashes, IP addresses, or domains were provided in the source articles.
Detection measures are identical to those for the Qantas breach, focusing on Salesforce security.
| Type | Value | Description | Context | Confidence |
|---|---|---|---|---|
| log_source | Salesforce Event Monitoring |
Logs detailing user logins, report exports, and API access. | Monitor for anomalous login locations, unusual user agents, or large data exports by support accounts. | high |
| user_account_pattern | Unusual activity from service or admin accounts | Compromised privileged accounts are key to large-scale data theft. | Monitor for activity outside of normal business hours or from unexpected geolocations. | high |
| api_endpoint | Salesforce Bulk API |
This API is designed for moving large data sets and could be abused for exfiltration. | Monitor API usage logs for unusually large queries or exports initiated by non-standard user accounts. | medium |
M1032 - Multi-factor Authentication): Mandate strong MFA for all users, especially privileged administrators, in all third-party cloud services.Scope of airline data breach expands to 13 million customers, now explicitly including Qantas, with more detailed PII compromised.
Enforce MFA on all cloud service accounts, especially those with access to sensitive customer data.
Mapped D3FEND Techniques:
Implement continuous monitoring and auditing of cloud environments to detect anomalous activity, such as mass data exports.
Mapped D3FEND Techniques:
Regularly review and harden the configuration of SaaS platforms like Salesforce to ensure proper permissions and security settings are in place.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats