Super funds exposed in cyber crime raids
Some AustralianSuper customers have lost $500,000 and others are seeing a zero balance on their super savings after hackers hit some of the nation’s biggest funds.
Business
Don't miss out on the headlines from Business. Followed categories will be added to My News.
Cyber criminals have carried out a co-ordinated hit on some of the country’s biggest super funds including AustralianSuper, Australian Retirement Trust, Hostplus and Rest, and thousands of members are understood to be affected.
AustralianSuper
AusSuper chief member officer Rose Kerlin said cyber criminals may have used stolen passwords to log into the accounts belonging to 600 of its members “in attempts to commit fraud”.
Four AustralianSuper customers have lost $500,000 in the cyber raids, although the fund moved to assure customers who were seeing a “$0 balance” on their profiles that they had secure accounts.
Rest Super
Rest Super chief executive Vicki Doyle said 8000 member accounts were affected.
It’s understood criminals attempted to use stolen passwords gathered from other hacks – and possibly shared on the dark web – to break into the accounts.
“Over the weekend of March 29-30, 2025, Rest became aware of some unauthorised activity on our online Member Access portal,” she said.
“No member funds were transferred out of impacted members’ accounts due to these unauthorised access attempts.”
Hundreds of Australian Retirement Trust members first had their accounts breached by cyber criminals about a month ago.
Australian Retirement Trust
Despite a spike of suspicious login attempts on March 8 affecting a few hundred Australian Retirement Trust customers, news about the attack – a co-ordinated hack carried out by cyber criminals on multiple funds – only emerged on Friday.
A spokesman for the fund, which manages more than $300bn in superannuation savings, told The Australian the customers were notified at the time.
He said regulatory agencies were notified soon after, and he denied the company kept news about the widespread cyber attack silent.
About another hundred customers were affected by the continued cyber attacks in the same way to that reported by AustralianSuper and Rest – referred to as “credential stuffing”. No ART account money was stolen.
Credential stuffing uses stolen passwords to gain unauthorised access to data.
Insignia Financial
Insignia Financial said it detected suspicious activity on 100 Expand Wrap Platform customers’ accounts early on Monday.
“At this stage there has been no financial impact to customers,” MLC Expand CEO Liz McCarthy said.
“Our cyber security team are actively working to apply additional monitoring and mitigations to protect customer accounts. As a precaution we have taken steps to restrict some activities on the Expand Platform.
“Some customers will receive communications prompting them to reset their passwords when they next log in to their accounts.”
Hostplus
Hostplus chief executive David Elia said the fund was investigating how its members were affected, but said “we can confirm that no Hostplus member losses have occurred”.
“We had seen various attempts to hack into members accounts but none have succeeded to date,” he said.
“We are of course continuing to monitor the situation and are remaining vigilant.”
Political response
Prime Minister Anthony Albanese sought to downplay the major cyber attack, saying they occur every six minutes.
Opposition home affairs spokesman James Paterson accused Mr Albanese of failing to take the superannuation account breaches seriously.
“The Prime Minister clearly doesn’t understand how serious this is when he described it as just ‘a regular issue’,” Senator Paterson said.
National cyber security
National Cyber Security Co-ordinator Lieutenant General Michelle McGuinness said she was aware “cyber criminals are targeting individual account holders of a number of superannuation funds”.
“I am co-ordinating engagement across the Australian government, including with the financial system regulators, and with industry stakeholders to provide cyber security advice,” she said.
“If you have been impacted or are concerned you may have been impacted, follow the advice provided by your super fund.”
A task force has this week been examining the breach, Home Affairs’ National Cyber Security chief is co-ordinating involvement of government agencies, including the Australian Securities and Investments Commission and Australian Prudential Regulation Authority, plus major super funds.
The agencies are sharing information to investigate the incident.
CyberCX chief strategy officer Alastair MacGibbon said there was a “very low chance” of catching the culprits behind the cyber raids.
He said the raids on superannuation accounts appeared to be fraud rather than a cyber intrusion, and should be a wake-up call for financial institutions to implement robust multi-factor authentication.
He said it looked like a case of “credential stuffing”, which involves using stolen usernames and passwords that are already circulating on the dark web.
“While it looks big, it’s not a cyber incident, per se. It’s fraud,” Mr MacGibbon said.
“No one has hacked anything. It’s putting usernames and passwords in, which is different from compromising some common thread between all of the superannuation companies.”
He said superannuation companies, like other financial institutions, needed to secure customers’ accounts with third-party multi-factor authentication systems.
Many super funds, including AustralianSuper and Australian Retirement Trust, have opt-in multi-factor authentication systems in place.
Mr MacGibbon said systems that used SMS messages were not sufficient, because phone SIM numbers could be transferred by fraudsters.
Association of Superannuation Funds of Australia said in a statement it was “aware that last weekend hackers attempted to get through the cyber defences of a number of superannuation funds”.
“While the majority of the attempts were repelled, unfortunately a number of members were affected. Funds are contacting all affected members to let them know and are helping any whose data has been compromised,” the statement says.
More Coverage
Originally published as Super funds exposed in cyber crime raids