Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Clint Hocking, Creative Director of the next Assassin’s Creed, leaves Ubisoft following restructure

    Amazon Game Studios ends publishing agreement with Maverick Games

    Styx: Blades of Greed publisher Nacon files for insolvency

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      What the polls say about how Americans are using AI

      February 27, 2026

      Tensions between the Pentagon and AI giant Anthropic reach a boiling point

      February 21, 2026

      Read the extended transcript: President Donald Trump interviewed by ‘NBC Nightly News’ anchor Tom Llamas

      February 6, 2026

      Stocks and bitcoin sink as investors dump software company shares

      February 4, 2026

      AI, crypto and Trump super PACs stash millions to spend on the midterms

      February 2, 2026
    • Business

      These ultra-budget laptops “include” 1.2TB storage, but most of it is OneDrive trial space

      March 1, 2026

      FCC approves the merger of cable giants Cox and Charter

      February 28, 2026

      Finding value with AI and Industry 5.0 transformation

      February 28, 2026

      How Smarsh built an AI front door for regulated industries — and drove 59% self-service adoption

      February 24, 2026

      Where MENA CIOs draw the line on AI sovereignty

      February 24, 2026
    • Crypto

      Bitcoin Bear Market Could Get Worse Despite the Latest Relief Rally

      March 1, 2026

      Crypto Scammers Have Been Quiet in February, Hacks Fall by 90%

      March 1, 2026

      Vitalik Buterin Signals Major Ethereum Wallet Overhaul

      March 1, 2026

      Why is Hyperliquid Price Rallying Amid the US-Iran War

      March 1, 2026

      Arbitrum Price Under Pressure: 60 Million ARB Whale Sale Sparks ATL Fear

      March 1, 2026
    • Technology

      What if the real risk of AI isn’t deepfakes — but daily whispers?

      March 1, 2026

      Anthropic’s Claude grabs top spot in App Store after Trump’s ban

      March 1, 2026

      AWS Middle East Central Down, apparently struck in war

      March 1, 2026

      A new account made over $515,000 betting on the U.S. strike against Iran

      March 1, 2026

      January in Servo: preloads, better forms, details styling, and more

      March 1, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»The biggest cybersecurity and cyberattack stories of 2025
    Technology

    The biggest cybersecurity and cyberattack stories of 2025

    TechAiVerseBy TechAiVerseJanuary 2, 2026No Comments16 Mins Read4 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    The biggest cybersecurity and cyberattack stories of 2025
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    The biggest cybersecurity and cyberattack stories of 2025

    2025 was a big year for cybersecurity, with major cyberattacks, data breaches, threat groups reaching new notoriety levels, and, of course, zero-day vulnerabilities exploited in incidents.

    Some stories, though, were more impactful or popular with our readers than others.

    Below are fifteen of what BleepingComputer believes are the most impactful cybersecurity topics of 2025, with a summary of each. These stories are in no particular order.

    15. The PornHub Data Breach

    The ShinyHunters extortion gang is extorting PornHub after stealing the company’s Premium member activity data from third-party analytics provider Mixpanel.

    The attackers claim to have stolen roughly 94 GB of data containing over 200 million records of subscribers’ viewing, search, and download activity. They are threatening to release it unless an extortion demand is paid.

    While the breach does not involve financial credentials, the potential public release of detailed adult-content activity could have significant personal and reputational ramifications for affected users.

    Similar disclosures in past incidents involving sensitive relationship data, such as the Ashley Madison breach, were linked to real-world harm.

    14. ClickFix Social Engineering Attacks

    In 2025, ClickFix attacks became widely adopted by numerous threat actors, including state-sponsored hacking groups and ransomware gangs. What started as a Windows malware campaign, quickly expanded to macOS and Linux, with attacks that installed infostealers, RATs, and other malware.

    ClickFix social engineering attacks are webpages designed to display an error or issue and then offer “fixes” to resolve it. These errors could be fake error messages, security warnings, CAPTCHA challenges, or update notices that instruct visitors to run PowerShell or shell commands to resolve the issue.

    Victims end up infecting their own machines by running malicious PowerShell or shell commands provided in the attacker’s instructions.

    ClickFix campaigns use a wide range of lures, including fake Windows Update screens, fake software activation videos on TikTok, and fake CAPTCHA challenges with video instructions that instruct victims to copy and paste commands that download and execute malware.

    ClickFix attack showing a fake Windows Update screen

    Researchers observed ClickFix variants targeting macOS that tricked victims into running malicious shell commands in Terminal that installed infostealers. Linux users were not spared either, with an APT36 phishing campaign specifically targeting them.

    ClickFix attacks continued to evolve throughout the year, with researchers and threat actors creating new variants of the social engineering attack.

    A recently seen variant called ConsentFix hijacks Microsoft accounts by abusing the Azure CLI OAuth flow, tricking victims into completing an OAuth consent process that yields access tokens. Another variant called FileFix uses the Windows File Explorer address bar to trick people into executing malicious PowerShell commands.

    This month, ClickFix attacks were further commercialized with a new paid-for ‘ErrTraffic’ platform that automates the delivery of ClickFix-powered malware attacks.

    13. The $1.5 billion ByBit crypto heist

    In one of the largest cryptocurrency thefts ever recorded, attackers stole approximately $1.5 billion in Ethereum from ByBit’s cold wallet in February.

    An investigation linked the theft to North Korea’s Lazarus hacking group, and the FBI later confirmed the group was responsible for the attack. Researchers determined that the breach was conducted via a compromised developer machine belonging to a Safe{Wallet} developer, which was used in Bybit’s wallet operations.

    Attackers used their access to the developer device to manipulate transaction approvals, which allowed them to drain the cold wallet.

    In addition to Bybit, other crypto thefts targeting exchanges and wallets included an $85 million theft from Phemex, a $223 million heist from Cetus Protocol, a $27 million breach at BigONE, and a $7 million attack impacting thousands of Trust Wallet users.

    In another high-profile incident, pro-Israel hackers breached Iran’s Nobitex exchange and burned roughly $90 million in cryptocurrency.

    12. Oracle data theft attacks

    Oracle was targeted in a widespread data theft campaign after the Clop extortion group exploited multiple zero-day vulnerabilities in Oracle E-Business Suite (EBS).

    Clop exploited an unpatched zero-day flaw in Oracle E-Business Suite, tracked as CVE-2025-61882, to breach servers and steal data. According to CrowdStrike and Mandiant, exploitation began as early as July, with data theft culminating in August.

    In October, the Clop extortion gang began emailing impacted businesses, warning them that the data would be leaked if a ransom was not paid.

    Clop extortion email sent to Oracle E-Business Suite customers

    A second Oracle zero-day vulnerability tracked as CVE-2025-61884 was disclosed after the ShinyHunters extortion group leaked a PoC exploit on Telegram. Oracle silently fixed this flaw, but it remains unclear whether ShinyHunters successfully used it to steal data.

    Organizations that disclosed Clop-linked Oracle attacks include Harvard University, Dartmouth College, the University of Pennsylvania, the University of Phoenix, Logitech, GlobalLogic, Korean Air, and Envoy.

    11. DDoS attacks increase in strength

    2025 saw record-breaking distributed denial-of-service (DDoS) attacks targeting organizations worldwide.

    Multiple incidents mitigated by Cloudflare demonstrated the increasing firepower of DDoS platforms, with attacks peaking at 5.6 Tbps, 7.3 Tbps, 11.5 Tbps, and later 22.2 Tbps.

    Much of this growth was attributed to the Aisuru botnet, which emerged as a significant force behind some of the largest DDoS attacks ever recorded.

    Microsoft reported that Aisuru leveraged more than 500,000 IP addresses in a 15 Tbps attack targeting Azure, with Cloudflare later reporting that the botnet was responsible for an even larger 29.7 Tbps DDoS attack.

    Graph from the record-breaking Aisuru attack
    Source: Cloudflare

    Over the past couple of years, DDoS operations have become a target of global law enforcement agencies. In 2025, the authorities conducted coordinated takedowns of multiple DDoS-for-hire services, arresting administrators who operated the platforms.

    Europol also announced the disruption of the pro-Russian NoName057(16) hacktivist group, which had been linked to DDoS campaigns in the past.

    10. Rise in Developer Supply Chain Attacks

    Cybercriminals are increasingly targeting developers by abusing open-source package and extension repositories, turning them into malware distribution sites.

    On npm, attackers repeatedly showed how the platform could be abused to promote malicious packages.

    The IndonesianFoods campaign flooded npm with hundreds of thousands of spam and malicious packages. More targeted supply-chain attacks hijacked legitimate packages with millions of weekly downloads.

    One of the most damaging efforts was the Shai-Hulud malware campaign, which infected hundreds of npm packages and was used to steal developer secrets and API keys.

    GitHub repositories with secrets stolen in the new Shai-Hulud campaign

    Attackers also repeatedly targeted IDE extension marketplaces, such as Microsoft’s VSCode Marketplace and OpenVSX.

    One campaign called Glassworm resurfaced multiple times, using VSCode extensions to deliver malware, steal cryptocurrency, install cryptominers, and download additional payloads, including early-stage ransomware.

    The Python Package Index (PyPi) was also targeted, with malicious PyPi packages and phishing campaigns stealing cloud credentials or backdooring developer systems. This caused PyPI to introduce new controls to limit malicious updates.

    9. North Korean IT Workers

    In 2025, North Korean IT workers infiltrating Western companies became a massive identity threat facing organizations.

    The US government says that these workers funnel their earnings to the DPRK regime to fund its weapons program and other initiatives.

    Rather than exploiting software vulnerabilities, North Korean actors increasingly used fake identities, intermediaries, and legitimate employment to gain access to Western companies, often remaining undetected for long periods.

    US authorities uncovered “laptop farm” operations across at least 16 states, where local helpers received company-issued laptops on behalf of North Korean actors and enabled remote access to corporate environments from North Korea.

    Investigators also revealed campaigns that recruited engineers to rent or sell their identities, allowing operatives to pass background checks, secure jobs, and access internal systems under false identities. Five individuals later pleaded guilty to helping facilitate these schemes.

    The US Treasury issued multiple sanctions in 2025 targeting North Korean individuals, front companies, and bankers involved in the IT worker schemes.

    While not directly related to the North Korean IT worker scheme, 2025 also saw increased “Contagious Interview” campaigns that abused hiring and interview processes as a malware delivery mechanism.

    In one campaign, North Korean hackers used deepfake Zoom calls impersonating company executives to trick targets into installing macOS malware. In another, attackers abused fake technical interviews to distribute malware through malicious npm packages installed by developers as part of “assessments.

    8. The Continued Salt Typhoon Telco Attacks

    First disclosed in 2024, the Salt Typhoon attacks continued through 2025, becoming one of the most damaging cyber-espionage campaigns targeting global telecommunications infrastructure.

    The attacks are linked to Chinese state-aligned actors known as Salt Typhoon, who focused on long-term, persistent access to telecommunication networks.

    Throughout the year, additional intrusions were attributed to the campaign across multiple major providers in the United States, Canada, and beyond.

    The threat actors exploited unpatched Cisco network devices, abused privileged access, and deployed custom malware designed for telecom environments to collect network configurations, monitor traffic, and potentially intercept communications.

    The threat actors were even linked to breaches of military networks, including the U.S. National Guard, which were used to steal network details, configuration files, and administrator credentials. This information could potentially have been used to breach other sensitive networks.

    Governments and security agencies publicly attributed these Salt Typhoon breaches to three China-based technology firms.

    The Federal Communications Commission issued warnings and guidance for carriers to harden networks and monitor for intrusions. Despite the state-hacking risks, the FCC later rolled back proposed cybersecurity rules.

    7. AI Prompt-injection Attacks

    As AI systems have become embedded in almost all productivity tools, browsers, and developer environments in 2025, researchers have identified a new class of vulnerabilities known as prompt injection attacks.

    Unlike traditional software flaws, prompt injection exploits how AI models interpret instructions, allowing attackers to manipulate an AI’s behavior by feeding it specially crafted or hidden inputs that override or bypass its original guidance and safeguards.

    Prompt injection attacks trick AI systems into treating untrusted content as instructions, causing models to leak sensitive data, generate malicious output, or perform unintended actions without exploiting flaws in the code itself.

    Several high-profile incidents demonstrated these new attacks:

    • Researchers uncovered zero-click data leakage in Microsoft 365 Copilot, where specially crafted emails with hidden prompt injection exposed sensitive information without user interaction.
    • Google Gemini was found to be vulnerable to prompt injection via email summaries and calendar invites, enabling phishing and data exfiltration.
    • AI coding assistants and IDE tools were manipulated through injected prompts to execute or suggest harmful code.
    • A “CometJacking” attack abused prompt injection in Perplexity’s Comet AI browser to trick the system into accessing sensitive data from linked services such as email and calendars.

    Other prompt injection attacks used hidden instructions embedded in downscaled images that humans can’t see but AI systems could.

    6. Targeting help desks in social engineering attacks

    In 2025, threat actors focused heavily on social engineering campaigns to target business process outsourcing (BPO) providers and IT help desks to breach corporate networks.

    Rather than relying on software bugs or malware, attackers tricked help desks into bypassing security controls and granting employees access to their accounts.

    Hackers associated with Scattered Spider reportedly posed as an employee and fooled a Cognizant help desk into granting them access to the account. This social engineering attack became the focus of a $380 million lawsuit against Cognizant.

    Transcript of call between hacker and service desk
    Source: Clorox complaint against Cognizant

    Other threat actors also utilized these types of attacks, with a group known as “Luna Moth,” aka Silent Ransom Group, impersonating IT support to breach multiple U.S. companies.

    Google reported that Scattered Spider targeted U.S. insurance companies by abusing outsourced support desks to obtain access to internal systems.

    Retail companies also acknowledged that social engineering attacks against help desks directly enabled major ransomware and data theft breaches.

    Marks & Spencer (M&S) confirmed that attackers used social engineering to breach its networks and conduct a ransomware attack. Co-op also disclosed data theft following a ransomware incident that abused support personnel.

    In response to the attacks on M&S and Co-op retail companies, the U.K. government issued guidance on social engineering attacks against help desks and BPOs.

    5. Insider Threats

    Insider threats had a massive impact in 2025, with multiple high-profile incidents showing how employees or consultants with trusted access, whether intentionally abused or not revoked after termination, led to large-scale damage.

    Coinbase disclosed a data breach affecting 69,461 customers, which later led to the arrest of a former Coinbase support agent who allegedly helped hackers access their systems.

    CrowdStrike disclosed that it detected an insider feeding information to hackers, including screenshots of internal systems. The insider was reportedly paid $25,000 by a group calling itself the “Scattered Lapsus$ Hunters,” a name referring to overlapping threat actors associated with Scattered Spider, Lapsus$, and ShinyHunters.

    BleepingComputer was told the activity was detected before the insider could provide access to CrowdStrike’s network.

    Insider activity also impacted financial organizations, with FinWise Bank disclosing an insider-related breach affecting roughly 689,000 American First Finance customers. In another incident, a bank employee reportedly sold their credentials for just $920, which were later used in a $140 million bank heist at Brazil’s Central Bank.

    Several incidents also demonstrated the danger posed by disgruntled or former employees.

    A developer received a four-year prison sentence for creating a “kill switch” designed to sabotage systems at a former employer. Another breach at Coupang was traced to an ex-employee who retained system access after leaving the company.

    Finally, a ransomware gang attempted to recruit a BBC journalist to help compromise the media organization.

    4. Massive IT Outages

    In 2025, a series of massive IT outages disrupted services and platforms worldwide, demonstrating how dependent global commerce has become on cloud infrastructure.

    While none of these incidents were caused by cybersecurity breaches, their impact was so significant that they warrant a mention in this year’s top stories.

    BleepingComputer was impacted by the Cloudflare outage as well

    Some of the most significant outages of 2025 were:

    • A global Heroku outage knocked hundreds of web applications offline, affecting both sites and internal tools.
    • A Microsoft DNS outage disrupted Microsoft 365, Azure services, and applications for many organizations.
    • Google attributed one of the largest cloud platform disruptions of the year to an API management problem, which caused wide-ranging failures across services that rely on its cloud infrastructure.
    • An AWS outage took down Amazon Prime Video, Fortnite, Perplexity, and many other services that depend on Amazon’s cloud.
    • Cloudflare experienced multiple incidents, including one traced to an emergency patch rollout for the actively exploited React2Shell flaw, which temporarily disrupted its global network services.

    3. The Salesforce Data-theft Attacks

    In 2025, Salesforce became a frequent target of large-scale data theft and extortion campaigns, as threat actors increasingly targeted the platform and its growing third-party services.

    While Salesforce itself was not breached, attackers repeatedly gained access to customer data through compromised accounts, OAuth tokens, and third-party services, resulting in a steady stream of high-profile breaches.

    These attacks were mainly linked to the ShinyHunters extortion group and impacted companies across a wide variety of industries, including technology, aviation, cybersecurity, insurance, retail, and luxury goods.

    Companies impacted by the Salesforce data theft attacks include Google, Cisco, Chanel, Pandora, Allianz Life, Farmers Insurance, Workday, and others.

    The ShinyHunters extortion gang eventually set up a data-leak site to extort companies affected by these attacks.

    ShinyHunters Salesforce leaks site

    A significant component of these attacks involved breaching third-party SaaS platforms that interface directly with Salesforce.

    Attackers breached services such as Salesloft Drift, stealing OAuth tokens and credentials that granted access to connected Salesforce instances.

    These supply-chain attacks impacted many different companies, including Google, Cloudflare, Zscaler, Tenable, CyberArk, Elastic, BeyondTrust, Proofpoint, JFrog, Nutanix, Qualys, Rubrik, Cato Networks, Palo Alto Networks, and many more.

    Salesforce also investigated customer data theft linked to a Gainsight breach, which used OAuth tokens stolen in the Salesloft Drift attacks.

    2. Zero-days Attacks

    In 2025, zero-day vulnerabilities remained a widely used method to gain access to corporate networks for data theft, cyber espionage, and ransomware attacks.

    Network edge devices and internet-exposed services were primary targets for exploitation because they sit between the internet and an internal network.

    Zero-day flaws in Cisco (ASA firewalls, IOS, AsyncOS, ISE), Fortinet (FortiWeb, FortiVoice), Citrix NetScaler, Ivanti Connect Secure, SonicWall, FreePBX, and CrushFTP were actively exploited in the wild.

    Microsoft SharePoint was one of the year’s biggest zero-day targets, with the ToolShell flaw linked to Chinese threat actors, and later, ransomware gangs. These flaws were used to deploy web shells, steal sensitive data, and maintain persistence inside corporate networks.

    Windows vulnerabilities were also repeatedly abused, including flaws in shortcut handling and logging services.

    Consumer and enterprise software also played a role, with 7-Zip and WinRAR zero-day flaws exploited in phishing campaigns to bypass security protections and install malware.

    Sample phishing email exploiting 7-zip zero-day
    Source: Trend Micro

    Several incidents involved commercial spyware and law enforcement using undisclosed flaws to unlock mobile devices.

    1. AI-Powered Attacks

    AI became a helpful tool for attackers this year, as they relied on large language models (LLMs) during intrusions, and to write and deploy malware.

    Security researchers and vendors reported a growing number of attacks that used AI for faster exploitation, adaptive malware, and higher volumes of attacks.

    Google warned of new AI-powered malware families observed in the wild, some of which dynamically adapt their behavior to the victim environment.

    The S1ngularity attack, which impacted thousands of GitHub accounts, highlighted how AI tools could be abused to automate reconnaissance and credential theft.

    Proof-of-concept malware, such as PromptLock ransomware, used AI LLMs to aid in encryption, data theft, and attacks.

    In addition to malware, AI is now being used to speed up exploitation attempts. Tools like HexStrike are used to analyze and exploit known vulnerabilities rapidly, reducing the time and skill required to exploit N-day flaws.

    Threat actors also released LLMs, such as WormGPT 4 and KawaiiGPT, which allow cybercriminals to create AI-powered malware without the restrictions or safeguards.

    By the end of the year, AI was no longer experimental for attackers and had become another tool for speeding up development, automating attacks, and lowering the barrier to conducting them.


    Secrets Security Cheat Sheet: From Sprawl to Control

    Whether you’re cleaning up old keys or setting guardrails for AI-generated code, this guide helps your team build securely from the start.

    Get the cheat sheet and take the guesswork out of secrets management.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleNew GlassWorm malware wave targets Macs with trojanized crypto wallets
    Next Article OpenAI is offering $20 ChatGPT Plus for free to some users
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    What if the real risk of AI isn’t deepfakes — but daily whispers?

    March 1, 2026

    Anthropic’s Claude grabs top spot in App Store after Trump’s ban

    March 1, 2026

    AWS Middle East Central Down, apparently struck in war

    March 1, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025699 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025284 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025162 Views

    6 Best MagSafe Phone Grips (2025), Tested and Reviewed

    April 6, 2025124 Views
    Don't Miss
    Gaming March 2, 2026

    Clint Hocking, Creative Director of the next Assassin’s Creed, leaves Ubisoft following restructure

    Clint Hocking, Creative Director of the next Assassin’s Creed, leaves Ubisoft following restructure Industry veteran…

    Amazon Game Studios ends publishing agreement with Maverick Games

    Styx: Blades of Greed publisher Nacon files for insolvency

    Organiser of Reboot Develop issued with bankruptcy order, underlining fears over event’s future

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Clint Hocking, Creative Director of the next Assassin’s Creed, leaves Ubisoft following restructure

    March 2, 20261 Views

    Amazon Game Studios ends publishing agreement with Maverick Games

    March 2, 20262 Views

    Styx: Blades of Greed publisher Nacon files for insolvency

    March 2, 20261 Views
    Most Popular

    7 Best Kids Bikes (2025): Mountain, Balance, Pedal, Coaster

    March 13, 20250 Views

    VTOMAN FlashSpeed 1500: Plenty Of Power For All Your Gear

    March 13, 20250 Views

    Best TV Antenna of 2025

    March 13, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.