Expert Reaction

EXPERT REACTION: Australian superannuation funds hit by cyber attack

Publicly released:
Australia; NSW; VIC; QLD; WA; ACT
Image by Jan Vašek from Pixabay
Image by Jan Vašek from Pixabay

Australia's National Cyber Security Coordinator has confirmed that cyber criminals are targeting individual account holders of a number of superannuation funds. Super fund members are advised to follow the advice of their superannuation funds: check your accounts, remain engaged with your funds if you are concerned you have been impacted, and be vigilant of potential fraud. In a statement, AustralianSuper said they had identified that cyber criminals may have used up to 600 members’ stolen passwords to log into their accounts in attempts to commit fraud. Below, Australian experts comment on the attacks.

Expert Reaction

These comments have been collated by the Science Media Centre to provide a variety of expert perspectives on this issue. Feel free to use these quotes in your stories. Views expressed are the personal opinions of the experts named. They do not represent the views of the SMC or any other organisation unless specifically stated.

Associate Professor Mihai Lazarescu is from the Faculty of Science and Engineering at Curtin University

Credential stuffing is a common attack used by malicious entities as it is simple to deploy and cheap in terms of resources to use. If the attack was indeed using credential stuffing, there are several methods that can be used to prevent a breach. A very effective approach is to enforce Multiple Factor Authentication (MFA), as that would block access even if the password is valid. MFA also alerts the user that another entity is attempting to access their account. In addition, one can use a CAPTCHA defense to prevent password guessing bots from automatically querying login pages.

Last updated:  04 Apr 2025 5:43pm
Contact information
Contact details are only visible to registered journalists.
Declared conflicts of interest None declared.

Dr Suranga Seneviratne is from the School of Computer Science at the University of Sydney

While we wait for more details on how this attack occurred and the full impact of it, it's crucial that all Australians remain vigilant over the next few days.

This could further lead to mass-scale 'spray and pray' phishing attacks over SMS and email, targeting super fund members who may be in panic and seeking more information. With heightened anxiety around superannuation balances due to Trump's tariff announcement, opportunistic scammers may try to take advantage of the situation.

Remember, scammers often strike during times of confusion, vulnerability, or misunderstanding. Avoid making hasty decisions, and always double-check any communication from your fund to ensure it's legitimate.

Last updated:  04 Apr 2025 3:55pm
Contact information
Contact details are only visible to registered journalists.
Declared conflicts of interest None declared.

Professor Paul Haskell-Dowland is Professor of Cyber Security Practice at Edith Cowan University

An attack on Australian Superannuation was always inevitable, some would say overdue. Australia is seen as an easy target by global cyber-criminal gangs, with superannuation funds clearly in the crosshairs due to high value funds.

While information is sparse at present, there are reports that stolen credentials may have been used – reinforcing that some Australian super funds lack the necessary security to adequately protect their sizable assets.

Australians should be checking their super fund balance and watching for email notifications from the relevant provider. In particular, checking for changes to personal information and banking details. It is, however, important that individuals do not click on links in emails, even if directed to do so… go directly to the website and login as you normally would. If advised to change your password, do so as soon as practical (never re-using a password) and be alert to scams that may use this incident to trick you into following links or calling support lines.

Providers will be reviewing security protocols– this is a clear warning shot that cybersecurity needs to be taken more seriously. As a minimum, providers should be using two-factor authentication (2FA) to secure access to accounts.

Last updated:  04 Apr 2025 3:45pm
Contact information
Contact details are only visible to registered journalists.
Declared conflicts of interest None declared.

Toby Murray is a Professor in the School of Computing and Information Systems at The University of Melbourne

These incidents are a timely reminder that cyber security requires a collective effort from financial organisations and consumers alike. Financial organisations can protect their consumers by implementing fraud detection systems that automatically detect suspicious transactions, and unusual account logins. In addition, financial organisations should implement mandatory multi-factor authentication for user accounts. Requiring users to prove who they are with something in addition to a password - whether a one-time code, or by clicking a link sent to their registered email address, or by using an authenticator app on their smartphone - makes it much harder for criminals who obtain user passwords to take over their accounts. 

Consumers also need to do their part by making sure they do not reuse passwords between websites. This is especially important for passwords used to protect accounts on financial organisations like their super fund or online banking. Using a password manager is a great way to make it easy to have unique passwords for each website you visit. 

In the meantime, members of affected super funds should be on the lookout for scams in the coming days. Just as we did following other high profile security incidents, we should expect to see scammers taking advantage of the uncertainty created by these latest breaches. This may include sending SMS messages to super fund members in relation to these incidents. If you are unsure, do not trust SMS messages you receive and instead phone your super company directly.

Last updated:  04 Apr 2025 3:45pm
Contact information
Contact details are only visible to registered journalists.
Declared conflicts of interest Toby is Director of the Defence Science Institute, which receives Commonwealth and State government funding. He also currently receives research funding from Google and the Department of Defence.

Dr Mohiuddin Ahmed is a Senior Lecturer of Computing and Security discipline in the School of Science at Edith Cowan University. He is also coordinating the Postgraduate Cyber Security courses.

It’s a wake up call for all Australians with superannuation accounts. Hackers try to compromise these accounts as they are not regularly checked like bank accounts and lack robust security protocols. It's important that both superannuation companies and individuals work together to ensure the safety of the super funds

Last updated:  04 Apr 2025 3:43pm
Contact information
Contact details are only visible to registered journalists.
Declared conflicts of interest None declared.

Professor Daswin De Silva is Deputy Director of the Centre for Data Analytics and Cognition (CDAC) at La Trobe University

This cybersecurity hack on some of Australia's largest super funds, AustralianSuper, REST and Insignia appears to have been orchestrated as a credential stuffing attack, where stolen or leaked username/passwords are used by hackers to gain unauthorised access. Credential stuffing attacks exploit the widespread poor practice of using the same username/password combination on multiple accounts and systems.

Given that only some accounts were affected, it is quite likely these breached accounts did not implement the more secure multifactor authentication (MFA) mechanism. MFA uses more than one method to verify an individual’s identity, such as one-time password codes (OTP) sent to a pre-verified mobile phone number or an Authenticator app. Password managers should be used to address the dependence on reusing the same password on many accounts and to auto-generate long/complex passwords.

However, increasing access to highly capable AI tools will no doubt increase the frequency and sophistication of cyberattacks. On the organisational side, stronger and complex security checks should be enforced - even when a user who is already logged in subsequently requests a large funds transfer or access to sensitive data. One member’s loss of at least $100,000 in retirement savings further indicates this MFA practice might be uncommon in older Australians who might be better served using non-digital means of access to their accounts.

This potential lack of cyber literacy serves as a reminder for critical infrastructure organisations (banks, super, energy etc) and government services to ensure their customers, members and other relevant stakeholders receive mandatory, certified training in digital, cyber and AI literacy. Such programs are already established in universities, requiring little effort to be extended across our communities. Our digital existence is incredibly convenient and uplift our quality of life, but we must work together to ensure online safety and security.

Last updated:  04 Apr 2025 3:40pm
Contact information
Contact details are only visible to registered journalists.
Declared conflicts of interest None declared.

Dr Sigi Goode is a Professor of Information Systems from the Research School of Management at the Australian National University

According to one super provider, the attacks used credential stuffing to compromise accounts - that’s where the attacker uses usernames and passwords that they already possess to access accounts.

They get these credentials from prior data breaches, which means every breach exposes account holders to greater and greater risk. With data breaches so common, it’s easy to become complacent, but the old advice still stands: change your passwords often, or use a password manager, because an old version of you could be helping someone to break into your account!

Last updated:  04 Apr 2025 3:38pm
Contact information
Contact details are only visible to registered journalists.
Declared conflicts of interest None

Professor Matthew Warren is the Director of the RMIT University Centre for Cyber Security Research and Innovation at RMIT University

Attackers using usernames and passwords to gain access to AustralianSuper's superannuation fund accounts highlights weak authentication; the attackers bought the information on the darknet, where hacked information is sold as a commodity.

What is needed is stronger authentication, such as multi-factor authentication.

Multi-factor authentication (MFA) significantly enhances cybersecurity by requiring multiple forms of verification to access systems or accounts, such as using a code generator to generate a unique code or entering a texted code. This is then entered when a user enters a password and username to gain access to an account.

The problem has been identified as being an issue for the Australian superannuation industry. In July 2024, the Financial Services Council released a mandatory standard – Standard 29 Fraud and Scam Mitigation Measures for Superannuation Funds to implement MFA to its customers by July 2026.

The same standards also describe other alternatives to multi-factor authentication, such as biometrics and one-time passwords.

The same standard also says 'Superannuation funds have the discretion to allow customers to opt out of multi-factor authentication in cases where, in the superannuation fund’s opinion, the use of multi-factor authentication is unduly onerous'.

What is needed is stronger multi-factor authentication for all customers, no exceptions.

Last updated:  07 Apr 2025 1:49pm
Contact information
Contact details are only visible to registered journalists.
Declared conflicts of interest None declared.

Dr Shaanan Cohney is a Senior Lecturer in the Faculty of Engineering and IT at the University of Melbourne

Australia’s superannuation scheme is the fifth-largest retirement savings scheme in the world. This makes it an attractive and common target for cybercriminals. Today’s attacks are notable for their scale and coordination. While stolen usernames and passwords have long been available online on the cheap, it is rare to see an attack that compromises so many providers in a similar industry at once.

One common way that attackers mount these sorts of campaigns is through 'credential stuffing': using usernames and passwords illicitly obtained from one website, and trying the same passwords on a different site. For example, using a customer’s details from a food-order website to access a financial website. To protect themselves, Australians should ensure they do not reuse passwords (best achieved by using a password manager) and enable multi-factor authentication. These two tools can prevent the vast majority of similar threats.

Last updated:  04 Apr 2025 3:32pm
Contact information
Contact details are only visible to registered journalists.
Declared conflicts of interest None declared.

Associate Professor Shumi Akhtar is an Associate Professor in the Discipline of Finance in the Business School at The University of Sydney

Cyberattacks targeting Australia’s superannuation funds pose a severe risk to a trillion-dollar industry that underpins the financial security of millions of Australians. These funds hold vast amounts of personal data and assets, making them lucrative targets for cybercriminals. Breaches can result in financial theft, identity fraud, and erosion of public trust. The recent coordinated attacks on major funds like AustralianSuper and Rest demonstrate that even the most robust systems are vulnerable, especially when hackers exploit weak or reused passwords.
 
The danger extends beyond individual accounts—it threatens systemic confidence in the retirement savings system. If left unchecked, frequent breaches could destabilise the sector, delay retirements, or reduce life savings.
 
The Australian government must act decisively by mandating stronger cybersecurity protocols, including multi-factor authentication, regular vulnerability testing, and national coordination through a dedicated cyber response taskforce. Regulatory bodies like ASIC and APRA should increase oversight and enforce stringent compliance. Regardless of who wins in the upcoming election, this has to be a priority for the government: more investment is needed in the cybersecurity space, and Australia needs to be self-sufficient in this.
 
Citizens also have a vital role. They must use unique, strong passwords, update them regularly, and enable additional security measures on their accounts. Awareness campaigns should educate the public on cybersecurity hygiene.
 
As digital threats escalate, safeguarding superannuation must become a national security priority—for government, industry, and every Australian.

Last updated:  04 Apr 2025 3:31pm
Contact information
Contact details are only visible to registered journalists.
Declared conflicts of interest None declared.

Professor Ryan Ko is Chair and Director of UQ Cyber Security, an interdisciplinary research centre based at the Faculty of Engineering, Architecture, and Information Technology (EAIT), University of Queensland.

From the initial reports from the impacted super funds’ members, it seems like there is a possibility that the attack could be impacting the systems within the funds’ computing infrastructure. There is an immediate need to ascertain if the affected system(s) is/are from a common contractor or vendor which may have been impacted by the attack. There is also the question about the strength of the login authentication of these users’ accounts. If I were a user of any super fund, I would make sure that I have activated my two-factor authentication feature in my login settings, if not already.

Last updated:  04 Apr 2025 3:30pm
Contact information
Contact details are only visible to registered journalists.
Declared conflicts of interest None declared.

Associate Professor Marina Zhang is from the Australia China Relations Institute at the University of Technology Sydney (UTS)

The cyberattack on Australia’s pension system is not simply a technical breach—it is a profound test of the nation’s financial governance and digital security. In an era where our infrastructure is increasingly digitised, this incident exposes critical vulnerabilities in systems once presumed secure.

The use of third-party services and obfuscation techniques—ranging from proxy networks to cryptocurrency mixers—complicates efforts to trace the origins of such breaches. This not only hampers timely countermeasures but also poses a significant risk in an era of escalating cyber warfare. Any premature attribution of blame, particularly against state actors without irrefutable evidence, risks inflaming geopolitical tensions and undermining the collective effort to fortify national defenses.

In a politically charged environment, where the opposition is poised to leverage these vulnerabilities to paint the government as complacent or even negligent, the stakes are exceptionally high. The incident, by exposing gaps in a system that manages over 4.1 trillion Australian dollars in assets, has transformed cybersecurity into an electoral flashpoint. As both sides grapple with the narratives of digital transformation versus national security, it becomes clear that future strategies must not only aim at immediate damage control but also build a resilient framework that preempts such threats.

At the heart of this crisis lies the challenge of restoring public confidence. The government’s response, therefore, is under intense scrutiny. Despite the introduction of a cybersecurity strategy since 2022, the current breach reveals that key sectors, such as the pension system, have not been fully integrated into this protective framework. This oversight leaves room for political adversaries to question the government’s commitment to safeguarding critical infrastructure—a debate that is bound to intensify as the federal election approaches on May 3.

Last updated:  04 Apr 2025 3:29pm
Contact information
Contact details are only visible to registered journalists.
Declared conflicts of interest None declared.
Journal/
conference:
Organisation/s: Australian Science Media Centre
Funder: None
Media Contact/s
Contact details are only visible to registered journalists.