Cyber crime

Cyberattack hits Australian super funds, exposes control gaps

Catherine Chipeta
2 Min
Cyberattack on Australian super funds exposes control failures

Hackers breached multiple Australian superannuation funds in a coordinated credential-stuffing attack. They targeted retiree accounts and exposed vulnerabilities in internal controls.

At least five major funds were affected, including AustralianSuper, Rest, Hostplus, and the Australian Retirement Trust. AustralianSuper confirmed that 600 accounts were compromised. Four members lost $500,000. Rest reported 8,000 affected accounts, though no money was stolen.

The attackers focused on pension drawdown accounts. These allow lump-sum withdrawals, making them attractive targets when oversight is minimal.

Weak authentication created the opening

The attackers used credentials leaked in previous breaches. By automating login attempts, they accessed accounts with reused passwords and minimal two-factor authentication.

Many funds still rely on SMS verification. Cybersecurity experts warn that this method is outdated and vulnerable to interception or SIM-swapping.

This wasn’t a complex breach. It highlights the need to strengthen basic identity and transaction-level controls.

Financial control is a shared responsibility

Cyber incidents may originate in IT systems, but their impact often extends into finance operations. This breach revealed how gaps in financial processes—like change verification and transaction oversight—can become critical vulnerabilities.

In many cases, unusual login behavior wasn’t surfaced in time. Payment workflows lacked the extra layers needed to escalate or pause suspicious activity before funds were released.

For finance teams, this raises important questions:

  • Who owns the integrity of our payment processes?

  • How do we verify changes to critical data?

  • Are our controls designed to detect issues in real time, or only after the fact?

Manual checks struggle to keep pace with modern threats

Relying on call-backs or staff-led verifications introduces lag and the risk of human error. These methods often can’t scale or adapt to coordinated attacks.

Modern finance operations benefit from stronger control environments: real-time validation of changes, automated risk alerts, and continuous monitoring across the payment lifecycle.

These aren’t just cybersecurity tools. They’re foundational to sound financial governance.

Next steps for finance and risk leaders

Australian authorities are coordinating a national response. Funds are locking accounts, reviewing procedures, and alerting members. But prevention starts inside the business.

Here’s what finance and risk leaders should consider:

  • Audit authentication methods. Move beyond SMS-based MFA to more resilient solutions.

  • Review how your team validates changes to banking or supplier information.

  • Test escalation workflows for high-risk transactions.

  • Ensure real-time oversight, not just periodic reviews.

  • Communicate clearly with internal teams and external partners about updated processes.

The next attack may look different—but it will likely exploit the same types of gaps if left unaddressed.

The bottom line

This breach is a reminder that fraud threats are evolving—but so can your controls. With the right systems and safeguards, finance teams can stay ahead of risk, protect payments, and build trust in every transaction.

Eftsure demo
Strengthen your payment controls now
This breach showed how weak authentication and manual checks leave financial systems exposed. See how real-time verification and automated controls can help prevent the next attack. Book a demo.

Related articles

The new security standard for business payments

End-to-end B2B payment protection software to mitigate the risk of payment error, fraud and cyber-crime.