The week in breach news

This week: Ransomware shuts down a U.S. school district, Cisco firewalls face a state-backed attack and a major breach leaks sensitive military data.

North America

South Lyon Community School District

Industry: Education Exploit: Ransomware & Malware

Cybercriminals continue to target educational institutions in the U.S. at an alarming pace. The latest victim, South Lyon Community School District, was forced to shut down schools following a ransomware attack.

Discovered on September 14, the attack was confirmed to be the result of a ransomware infection carried out by a well-known group, although officials have not released the name yet. While there is no evidence that student or faculty data was compromised, the attack crippled phone systems and several ancillary sub-systems, including those relied on during emergencies, such as active shooter responses.

This attack is one of many disrupting schools nationwide. Alarmingly, according to the nonprofit Center for Internet Security (CIS), 82% of K-12 schools experienced a cyber incident between July 2023 and December 2024.

Source

How it could affect your business

Ransomware attacks on educational institutions have become all too common, and the cost of prevention is far less than the cost of an actual incident. A reliable data backup and recovery strategy can help schools secure sensitive data and maintain normal operations even during major disruptions such as this.

United Kingdom

Harrods

Industry: Retail Exploit: Third-Party Data Breach

Luxury London department store Harrods disclosed that 430,000 customers’ personal data has been compromised in a data breach. In an email sent to customers on September 26, the company warned that personal data may have been stolen after one of its third-party provider systems was compromised.

Harrods said the impact was “limited” to basic information, including names, contact details and marketing preferences. The company emphasized that account passwords and payment details were not affected. While the attackers attempted to contact the company, Harrods refused to engage or negotiate with the hacker group.

The company added that this was an “isolated incident” and not connected to a separate incident in May, when it restricted internet access across its sites following an attempt to gain unauthorized access. Still, this marks yet another attack in a wave of cyber incidents that have recently targeted high-profile British businesses.

How it could affect your business

Attackers looking to harvest customer data are increasingly targeting retail chains. Protecting personal information should be a top priority, as even limited data exposure can damage customer trust and brand reputation.

North America

An unnamed FCEB agency

Industry: Government & Public Sector Exploit: Zero-day vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) disclosed last week that threat actors breached an unnamed federal civilian executive branch (FCEB) agency last year by exploiting a critical vulnerability in its open-source GeoServer mapping server.

While the attack occurred on one of the agency’s servers on July 9, 2024, the agency’s endpoint detection and response (EDR) tool did not alert its security operations center (SOC) until three weeks later. During that time, threat actors used brute force techniques to steal passwords, escalate privileges and move laterally to compromise two additional servers.

The critical vulnerability, which allows remote code execution (RCE), was disclosed on June 30, 2024, with a CVSS score of 9.8. This attack happened within just two weeks of that disclosure. In the wake of the breach, CISA urged security operations teams across organizations to closely monitor EDR alerts for suspicious activity and to strengthen incident response plans to contain breaches faster.

Source

How it could affect your business

This incident shows how quickly attackers can exploit new vulnerabilities to compromise a network and move laterally across it without being detected. Having a robust SOC in place is essential to spot threats early and contain them before they spread.

North America

Cisco

Industry: Technology Exploit: Nation-State

Cybersecurity agencies worldwide, including CISA and the U.K. National Cybersecurity Center (NCSC), warned of an “advanced threat actor” actively targeting devices running Cisco’s Adaptive Security Appliances (ASA) firewall software.

According to the agencies, the “widespread” campaign exploits zero-day vulnerabilities in Cisco devices, allowing attackers to run malicious code and deploy malware. Impacted equipment includes certain Cisco ASA 5500-X Series devices, which act as firewalls protecting corporate networks from intrusions.

In a statement, Cisco analysts said they have “high confidence” the campaign is tied to ArcaneDoor — a state-sponsored threat actor the vendor first identified in 2024. In an emergency directive issued last Thursday, CISA ordered government cyber teams to locate all affected devices within just over one day, scan them for malicious activity and apply the security updates designed to patch the vulnerabilities.

Source

How it could affect your business

Zero-day exploits against critical network devices like firewalls can give attackers a direct path into corporate systems. Businesses must treat these vulnerabilities as urgent, ensuring rapid patching, constant monitoring and layered defenses to reduce the risk of espionage and data theft.

North America

Volvo North America

Industry: Transportation & Logistics Exploit: Third-Party Data Breach

Volvo North America has disclosed a data breach involving the personal information of its employees after a ransomware attack hit its third-party supplier, Miljödata.

The ransomware attack, which occurred on August 20, impacted at least 25 organizations, including Volvo North America, Scandinavian airline SAS and more than 200 Swedish municipalities. The attack targeted systems used for medical certificates, rehabilitation records and workplace injury management. Exposed data included employee names, Social Security numbers, email addresses, physical addresses, phone numbers, government IDs, dates of birth and gender.

A ransomware group called DataCarry has claimed responsibility for the Miljödata attack and has already allegedly published the stolen data on its Tor leak site.

Source

How it could affect your business

Ransomware attacks on third-party suppliers can quickly ripple across multiple organizations, exposing sensitive data well beyond the initial target. Businesses must evaluate supply chain risks, enforce strict vendor security standards and ensure data shared with partners is adequately protected.

South America

Maida.health

Industry: Healthcare Exploit: Third-Party Data Breach

In yet another third-party data breach, Brazilian health technology company Maida.health reportedly exposed more than 2TB of sensitive data tied to the nation’s military police.

The company, which manages billing, insurance claims and teleconsultation software for healthcare providers, including the Brazilian military police, is said to have suffered a breach compromising 2.3TB of data. The exposed information reportedly includes medical diagnostics, ID numbers and personal details of military police personnel, raising major concerns about the security of the country’s defense-related information. Even more alarming, the stolen data has been advertised for sale on an underground forum.

Source

How it could affect your business

Healthcare remains a top target for cybercriminals because of the sensitive personal and medical data it holds. Breaches of this kind can lead to identity theft, fraud and long-term harm for both individuals and organizations.

Like what you're reading?

Subscribe now to get security news and information in your inbox every week

Upcoming webinars & events

Join our upcoming webinars and events to see how you can use SaaS visibility to win more clients and learn from top experts on security and compliance.

How MSPs uncover SaaS security gaps and win clients

October 14, 2025 2:00 PM EDT

Find out how SaaS Cybersecurity Assessment helps MSPs reveal unseen threats in Microsoft 365 and Google Workspace and accelerate client acquisition.

Register Now

Security & Compliance :: Philadelphia

November 13, 2025 8:00 AM EDT

Join Kaseya experts and top industry leaders at the W Hotel Philadelphia for a full-day event exploring how security and compliance are reshaping IT and what it means for MSPs and SMBs aiming to stay ahead.

Register Now