BusinessCybersecurityNewswireTechnology

2025’s Most Devastating Cyberattacks Exposed

Originally published on: December 29, 2025
▼ Summary

– The year was marked by a persistent backdrop of significant data breaches, ransomware attacks, and state-sponsored cyberattacks.
– A group known as Scattered Lapsus$ Hunters breached third-party integrations of Salesforce, compromising data from numerous major companies and exposing millions of individuals’ personal information.
– The ransomware group Clop exploited a vulnerability in Oracle’s E-Business platform to steal data from various organizations, including hospitals, media companies, and universities.
– Several major universities, including the University of Pennsylvania, Harvard, and Princeton, suffered data breaches through phishing attacks targeting alumni and donor information.
– These incidents highlight the widespread impact of cyberattacks through third-party vendors, mass exploitation of software vulnerabilities, and social engineering tactics like phishing.

The digital landscape of the past year has been defined by a relentless surge in sophisticated cyberattacks, with threat actors increasingly targeting third-party integrations and exploiting software vulnerabilities to compromise vast networks. These incidents underscore a critical shift in the cyber threat environment, where supply chain weaknesses and unpatched systems create widespread risk. From major corporations to prestigious universities, no sector remained untouched by the wave of data breaches, ransomware campaigns, and state-sponsored intrusions that have become an unsettling norm.

One of the most far-reaching campaigns involved breaches through integrations with the sales platform Salesforce. Attackers did not hack Salesforce directly but instead compromised third-party contractors like Gainsight and Salesloft. This supply chain attack led to data exposure at a staggering array of major companies, including Cloudflare, Verizon, Cisco, LinkedIn, and Adidas. The credit bureau TransUnion also suffered a related breach, exposing the personal information of 4.4 million individuals. A group calling itself Scattered Lapsus$ Hunters, which appears to blend tools and tactics from several notorious hacking collectives, claimed responsibility. They have operated a data leak site to preview stolen information and pressure victims with extortion demands.

The notorious ransomware operation known as Clop executed another widespread hacking spree by exploiting a vulnerability in Oracle’s E-Business Suite, an internal management platform used by countless organizations. By targeting this single point of failure, Clop accessed sensitive data from hospitals, media companies, and universities. The group stole employee data, including executives’ personal information, which they then used to send threatening communications demanding multimillion-dollar ransoms. Although Oracle released a patch in early October, the attackers had already exfiltrated vast amounts of data, demonstrating the severe consequences of delayed vulnerability management.

Higher education institutions faced significant threats as well. The University of Pennsylvania disclosed a data breach in November resulting from a phishing attack. The compromised data included decades-old personal information of students, alumni, and donors, alongside internal documents and some financial records. The attacker sent emails criticizing the university’s policies, though reports suggest the primary motive was likely financial. Similarly, Harvard University reported that its Alumni Affairs and Development office systems were breached via a phone-based phishing attack, exposing contact details, donation records, and event attendance information of alumni and donors. Princeton University experienced a comparable incident the same month, highlighting a targeted trend against academic institutions.

(Source: Wired)

Topics

cybersecurity incidents 100% data breaches 95% third-party vulnerabilities 90% hacking groups 88% ransomware attacks 85% software vulnerabilities 82% digital extortion 80% university breaches 78% phishing attacks 75% corporate espionage 72%