The week in breach news


If you think only highly sophisticated hacks are breaking into business networks, think again. Last week, years-old leaked credentials and missing multifactor authentication led to a data breach across more than 50 multinational companies. Other recent incidents include a phishing attack on CIRO that exposed data tied to more than 750,000 individuals and a cyberattack on Central Maine Healthcare that compromised information from more than 145,000 patients.

North America

Canadian Investment Regulatory Organization (CIRO)

Industry: Finance Exploit: Phishing

Canada’s national self-regulatory body, the Canadian Investment Regulatory Organization (CIRO), revealed that hackers compromised the personal information of approximately 750,000 individuals in an August 2025 cyberattack.

Following a detailed forensic investigation, CIRO confirmed the full scope of the incident, which it first detected on August 11 and disclosed on August 18 last year. The investment watchdog said the attack, stemming from a phishing campaign, impacted its member firms and their registered employees. Exposed data includes personal information, such as annual income, dates of birth, government-issued ID numbers, phone numbers, investment account numbers, Social Insurance numbers and account statements. CIRO noted that since it does not store passwords, PINs or security questions, none of those were affected.

At this time, CIRO says it has no evidence that the compromised information has been misused or surfaced on the dark web. However, the organization stated it will continue to closely monitor for any signs of abuse or further exposure.

Source

How it could affect your business

Phishing campaigns are becoming more convincing and harder to spot as attackers increasingly use AI to craft realistic messages and impersonate trusted entities. Once a single user is tricked, attackers can compromise the entire network and gain access to sensitive data. To reduce risk, organizations should combine user awareness training with stronger email security, multifactor authentication (MFA) and continuous monitoring for suspicious activity.

North America

Multiple MNCs

Industry: Technology Exploit: Hacking

A cybercriminal compromised more than 50 multinational companies without any advanced exploit, exposing sensitive corporate and customer data across multiple industries.

According to reports, a threat actor known as Zestix (also tracked as Sentap) stole and listed the data from dozens of global enterprises for sale on the dark web. Alarmingly, the breach required no sophisticated exploitation techniques — the attacker relied entirely on valid credentials sourced from infostealer malware logs on the dark web. The affected organizations span multiple sectors and include Iberia Airlines, Burris & Macomber, Maida Health, Intecro Robotics, and Pickett & Associates. Without multifactor authentication in place, the attacker was able to log in directly to corporate file-sharing portals and freely access and exfiltrate data.

The stolen credentials were traced back to several infostealer variants, including RedLine, Lumma and Vidar. In some cases, the credentials had been exposed for years, sitting unnoticed until they were finally weaponized, highlighting how long-forgotten leaks can still lead to serious breaches.

Source

How it could affect your business

Infostealer malware is becoming a growing threat, quietly collecting login credentials that attackers can exploit months or even years later. Once valid credentials are exposed, attackers can access corporate systems without triggering traditional security alerts, especially when multifactor authentication is not in place. Organizations should use dark web monitoring to spot exposed credentials early and enforce multifactor authentication to prevent stolen logins from being abused.

United States

Central Maine Healthcare

Industry: Healthcare Exploit: Hacking

Central Maine Healthcare confirmed that a data breach it experienced last year compromised the personal, treatment and health insurance information of more than 145,000 patients.

The health care provider detected unusual activity within its IT network on June 1, 2025. Further investigation revealed that an unauthorized party had gained access to its environment as early as March 19, 2025. Central Maine Healthcare said the exposed data includes names, dates of birth, Social Security numbers, treatment details, provider names, dates of service and health insurance information, impacting 145,381 patients.

In response, the organization stated that it has enhanced its monitoring and alerting capabilities to help prevent similar incidents. It also advised potentially affected individuals to carefully review statements from healthcare providers and health insurance plans.

Source

How it could affect your business

This incident shows how attackers can remain undetected inside networks for months, quietly collecting sensitive data. These “time-bomb” tactics increase the damage by allowing attackers to study systems and expand access over time. Continuous threat monitoring and timely alerting are critical to spot suspicious activity early and limit the impact before data is exposed.

Europe

AZ Monica

Industry: Healthcare Exploit: Hacking

A Belgian general hospital network, AZ Monica, was forced to shut down all servers, cancel scheduled procedures and transfer critical patients after a cyberattack disrupted its operations.

On January 13, the hospital network experienced a serious IT outage and proactively shut down all servers across its campuses in Deurne and Antwerp. AZ Monica confirmed it launched an investigation and notified police and prosecutors, though it has not shared other details about the intrusion.

While some reports mentioned possible ransom demands, hospital officials and authorities have not yet confirmed whether ransomware was involved.

Source

How it could affect your business

Cyberattacks on healthcare organizations are rising, driven by the value of patient data and the pressure attackers can create by disrupting care. This incident shows that breaches in healthcare do not just compromise sensitive information but also affect patient safety by forcing hospitals to cancel procedures and divert critical patients. To reduce this risk, healthcare providers need rapid threat detection and continuous monitoring to spot intrusions early and respond before disruptions spread across clinical systems.

Asia & Pacific

Kyowon

Industry: Education Exploit: Ransomware & Malware

South Korean conglomerate Kyowon confirmed a ransomware attack that disrupted its operations and may have exposed customer data.

Kyowon Group, which operates across education, publishing, media and technology, detected abnormal activity in its network on January 10, 2025. The company immediately activated its incident response plan and isolated affected servers to stop the attack from spreading. Kyowon said there are signs that data may have leaked, though the full impact on customer information is still under investigation.

According to reports, the attackers gained access through an externally exposed server connected to the internet. From there, they moved into Kyowon’s internal systems, allowing ransomware to spread across multiple subsidiaries.

Source

How it could affect your business

Defending against ransomware is a race against time. Once attackers gain access, they can move quickly, encrypt systems and bring operations to a halt before teams even realize what’s happening. Proactive monitoring is critical for detecting suspicious activity early and stopping an attack before it spreads. Just as important are encrypted, ransomware-resilient backups, which allow businesses to restore data and resume operations without paying a ransom or relying on attackers to keep their promises.

Like what you're reading?

Subscribe now to get security news and information in your inbox every week

Upcoming webinars & events

Join our upcoming events and webinars for expert insights, practical strategies and the latest trends shaping cybersecurity.

Unveiling RocketCyber 2.0: The next evolution of MDR

January 27, 2026 2:00 PM EST

Security threats are growing more complex, and your managed detection and response (MDR) must evolve to keep pace. Join us for an exclusive first look at RocketCyber 2.0, Kaseya’s next-generation MDR platform designed for faster innovation, deeper integrations and more advanced threat detection and response.

Register Now

Start 2026 with Security You Can Prove

January 28, 2026 12:00 PM EST

IT leaders want proof, not assumptions. In this webinar, see how IT teams use vPenTest to uncover real security gaps, validate exposed credentials and clearly demonstrate how far attackers can move inside the network.

Register Now