Vincent
Created: April 4, 2025
Updated: April 24, 2025
Discover why superannuation funds are vulnerable and how regulations, including FSC Standard No. 29, recommend MFA and phishing-resistant authentication.
Read the full articleAlready read by 5,000+ enterprise security leaders.
Yes, several major Australian superannuation funds were affected by the recent cyberattack. These include AustralianSuper, Australian Retirement Trust, Rest, Hostplus, and Insignia Financial. While not all members experienced financial loss, many accounts were targeted through a method called credential stuffing, where attackers used stolen passwords to attempt unauthorized logins. Some accounts had money stolen - up to $500,000 across four accounts - while others experienced suspicious activity, such as login attempts or personal data exposure.
Affected funds have confirmed:
If you are a member of any of the named funds, it’s strongly recommended to log into your account and check for unusual activity, especially changes to contact or banking information. Even if your fund hasn’t reported a breach, vigilance is key, as threat actors continue to exploit weak or reused passwords.
In early April 2025, cybercriminals launched a coordinated attack on Australian superannuation funds by using previously leaked usernames and passwords found on the dark web. Unlike typical data breaches that involve hacking into a company’s servers, this was a credential stuffing attack, where attackers used already-compromised credentials to log into individual accounts.
AustralianSuper: Confirmed that 600 accounts had login credentials stolen. Four members lost approximately $500,000 in total. Accounts were locked and affected members were notified immediately. Rest: Detected unauthorized activity affecting around 8,000 members. No financial loss occurred due to quick shutdown of systems. However, limited personal data (like names and emails) was accessed. Insignia Financial: Identified suspicious login attempts through credential stuffing on its Expand platform. Accounts were protected, and no losses reported. Australian Retirement Trust: Detected unusual login activity and proactively locked affected accounts. No financial or data compromise confirmed so far. Hostplus: Also reported ongoing investigation. No customer losses or data breaches confirmed yet.
Just because your fund hasn’t been publicly named doesn’t guarantee safety. Many breaches are discovered in stages, and attackers often target multiple institutions over time.
To protect your superannuation:
Credential stuffing attacks are especially dangerous for superannuation accounts because:
This incident is a wake-up call for both funds and members to improve their cybersecurity hygiene.
Discover why superannuation funds are vulnerable and how regulations, including FSC Standard No. 29, recommend MFA and phishing-resistant authentication.
Read the full articleAlready read by 5,000+ enterprise security leaders.
Enjoyed this read?
🤝 Join our Passkeys Community
Share passkeys implementation tips and get support to free the world from passwords.
🚀 Subscribe to Substack
Get the latest news, strategies, and insights about passkeys sent straight to your inbox.