Summer of Siege: A Deep Dive into the Breaches, Attacks, and Ransomware of 2025

Summer of Siege: A Deep Dive into the Breaches, Attacks, and Ransomware of 2025
Photo by Andrew Bui / Unsplash

Summer 2025 will be remembered as a pivotal season in cybersecurity—a period when the theoretical threats of tomorrow became today's stark reality. It was a summer defined by unprecedented collaboration between cybercriminal gangs, relentless nation-state espionage campaigns targeting critical infrastructure, and the undeniable arrival of weaponized Artificial Intelligence.

For organizations across the globe, the events of the past three months have redrawn the security perimeter and served as a harsh lesson in the interconnected nature of modern risk. This is the definitive rundown of the breaches, attacks, and ransomware that marked the Summer of Siege.


The Gmail Security Crisis: 2.5 Billion Users at Risk After ShinyHunters Breach
Bottom Line: Google has confirmed that hackers breached its Salesforce database in June 2025, exposing business contact information for 2.5 billion Gmail users. While passwords weren’t stolen, cybercriminals are now using this data to launch sophisticated voice phishing campaigns targeting user accounts. Gmail users must immediately enable two-factor authentication

The Great Supply Chain Breach: The ShinyHunters & Salesforce Campaign

The most widespread and impactful story of the summer was a masterclass in supply chain attacks, orchestrated by the notorious hacking collective ShinyHunters. Instead of targeting companies directly, the group went after a common, trusted link: third-party Software-as-a-Service (SaaS) platforms, primarily Salesforce and the integrated AI chatbot Salesloft Drift.

The attack vector was classic, yet brutally effective: a sophisticated social engineering campaign. Hackers impersonated IT support staff, tricking employees at various companies into granting them access to their corporate Salesforce instances. Once inside, they used a malicious data-loading application to exfiltrate massive volumes of business contact information.

CNIL Imposes Record Fines on Google and Shein for Cookie Consent Violation
Bottom Line Up Front: France’s data protection authority delivered a powerful message on September 3, 2025, with record-breaking fines of €325 million against Google and €150 million against Shein for systematic cookie consent violations. These penalties mark the largest cookie-related sanctions in CNIL history and signal an escalation in European

The Victims: The list of confirmed victims reads like a who's who of the tech and business world, demonstrating the cascading effect of a single supply chain compromise:

  • Tech Giants: Google and Cisco.
  • HR & Staffing: Workday and Manpower.
  • Credit & Finance: TransUnion.
  • Travel & Telecom: Air France-KLM.
  • Cybersecurity Firms: In a deeply ironic twist, security leaders like Proofpoint, SpyCloud, Tanium, Palo Alto Networks, and Zscaler all confirmed their data was accessed via this third-party breach.

The Fallout: While much of the exfiltrated data consisted of business contacts rather than sensitive consumer PII, the breach represents a massive intelligence coup for the attackers. This information is now being actively used to fuel hyper-targeted phishing and espionage campaigns, with the attackers holding a verified map of corporate relationships and contacts.


Major Supply Chain Attack: Palo Alto Networks and Zscaler Hit by Salesloft Drift Breach
Two cybersecurity giants fall victim to sophisticated OAuth token theft campaign targeting hundreds of organizations worldwide September 2, 2025 — In a stunning turn of events that has sent shockwaves through the cybersecurity industry, both Palo Alto Networks and Zscaler have confirmed they were victims of a massive supply chain attack

Nation-State Alert: China's Two-Pronged Cyber Offensive

While financially motivated criminals dominated the headlines, nation-state activity reached a new level of concern. A joint advisory from the U.S. and 12 allied nations exposed two massive, ongoing campaigns attributed to Chinese state-sponsored actors:

  1. "Salt Typhoon": A global espionage campaign focused on intelligence gathering. This group has infiltrated telecommunications, government, and military networks across the world by exploiting known vulnerabilities in routers and other network appliances to maintain quiet, long-term persistence.
  2. "Volt Typhoon": A far more alarming campaign focused on pre-positioning within U.S. critical infrastructure. This group has been observed gaining access to systems controlling power grids, water treatment facilities, and transportation networks. The strategic goal appears to be the ability to disrupt essential services in the event of a geopolitical conflict, turning cyberspace into a tangible battleground.

Salt Typhoon: Chinese Hackers Expand Beyond Telecom to Target Critical US Data Infrastructure
How Chinese state-sponsored hackers penetrated America’s telecommunications backbone and expanded into data centers, exposing the vulnerabilities in our most critical digital infrastructure China’s Cyber Campaigns: A Deep Dive into Salt & Volt Typhoon and Other Threat ActorsIn recent years, cyber espionage has become a significant concern, with nation-state actors employing

Ransomware Roundup: High-Profile Takedowns and AI's Debut

Ransomware remained a constant, disruptive force throughout the summer, with several high-profile incidents and the emergence of game-changing technology.

China’s Cyber Campaigns: A Deep Dive into Salt & Volt Typhoon and Other Threat Actors
In recent years, cyber espionage has become a significant concern, with nation-state actors employing sophisticated techniques to target critical infrastructure and sensitive data. Among these, groups affiliated with the People’s Republic of China (PRC) have been particularly active, utilizing methods like “living off the land” (LOTL) to compromise networks and

Jaguar Land Rover Grinds to a Halt

In August, luxury automaker Jaguar Land Rover suffered a devastating cyberattack that crippled its global manufacturing and retail operations. The attack disrupted production lines and dealer systems, forcing a near-total shutdown. A group calling itself "Scattered Lapsus$ Hunters" claimed responsibility, signaling a chilling collaboration between the highly effective social engineering group Scattered Spider and the data extortion experts ShinyHunters and Lapsus$.

Akira Exploits Suspected SonicWall Zero-Day

The Akira ransomware group was observed successfully breaching numerous organizations by targeting their SonicWall firewall devices. The attacks were notable for bypassing multi-factor authentication (MFA), leading researchers to conclude the group was likely exploiting a zero-day vulnerability in the SSL VPN service.

The First AI-Powered Ransomware: "PromptLock"

Perhaps the most forward-looking development of the summer was the discovery of "PromptLock," the first known proof-of-concept ransomware to be powered by AI. Researchers found that this malware uses large language models (LLMs) to generate malicious encryption and data exfiltration scripts in real-time. This adaptability makes it incredibly difficult for traditional, signature-based security tools to detect and stop. While still in its early stages, PromptLock represents the beginning of a new, more intelligent era of malware.

Warlock Ransomware: The Critical Infrastructure Threat Redefining Global Cybersecurity in 2025
A comprehensive analysis of the ransomware-as-a-service operation that has compromised over 400 organizations worldwide through sophisticated SharePoint exploitation Executive Summary The emergence of Warlock ransomware in mid-2025 has fundamentally reshaped the global cybersecurity landscape, representing a new paradigm in the sophistication and scale of ransomware operations. Operating as a ransomware-as-a-service

Other Notable Ransomware Events:

  • Warlock Ransomware hit European telecom giants Orange SA and Colt Technology Services, exfiltrating and leaking gigabytes of corporate data.
  • DaVita, a major U.S. kidney dialysis provider, confirmed a ransomware attack that exposed the personal and health information of 2.7 million people.
  • The credit reporting agency TransUnion disclosed a breach affecting 4.4 million customers.

Major Breakthrough: Four Arrested in £440M Cyber Attacks on UK Retail Giants
NCA Makes Significant Progress in Investigation into Attacks on M&S, Co-op, and Harrods Bottom Line Up Front: Four young people, including a 17-year-old and three individuals aged 19-20, have been arrested by the UK’s National Crime Agency in connection with devastating cyber attacks that cost major retailers up to

Key Takeaways from a Summer Under Siege

Summer 2025 was not just another season of cyberattacks; it was an inflection point. The key lessons for every organization are clear:

  1. Your Supply Chain is Your Attack Surface: The ShinyHunters campaign proved that your security is only as strong as your most vulnerable SaaS integration. Rigorous third-party risk management is no longer optional.
  2. Social Engineering is King: The most damaging attacks of the summer began not with a sophisticated exploit, but with a simple, convincing phone call or email. The human element remains the most critical line of defense.
  3. AI is Here, and It's Not Friendly: The weaponization of AI is accelerating. Organizations must now plan for threats that are more adaptive, intelligent, and scalable than ever before.
  4. Patching is Non-Negotiable: While advanced threats emerged, many successful attacks—including those by nation-states—still relied on exploiting old, unpatched vulnerabilities in common devices like routers and firewalls.

The events of this summer have set a new, more dangerous baseline for the global threat landscape. The convergence of collaborative cybercrime, nation-state ambitions, and weaponized AI demands a more proactive, intelligent, and resilient approach to cybersecurity.

Global Cybercrime Crackdown 2025: A Mid-Year Assessment of Major Arrests and Takedowns
As we reach the end of August 2025, law enforcement agencies worldwide have achieved unprecedented success in dismantling cybercriminal networks, marking this as potentially the most successful year in the fight against cybercrime to date. Executive Summary The first eight months of 2025 have witnessed an extraordinary surge in international

Read more