Skip to content

Weekly Cybersecurity Breach Report June 24-30, 2025

The final week of June 2025 marked one of the most devastating periods in cybersecurity history, with unprecedented credential theft affecting 16 billion login credentials and a surge in sophisticated nation-state attacks targeting critical infrastructure and major corporations. This period witnessed the emergence of advanced AI-powered attack techniques, including deepfake Zoom meetings by North Korean APT groups, the arrest of notorious hacker IntelBroker, and Iranian cyber threats escalating amid geopolitical tensions.

The week was dominated by the largest credential leak in history, affecting platforms including Apple, Google, Facebook, and government services, while Scattered Spider expanded operations to target the aviation industry with attacks on WestJet and Hawaiian Airlines. Critical infrastructure vulnerabilities emerged with Mitsubishi Electric HVAC systems affected by CVE-2025-3699, and ongoing industrial control system threats documented by CISA.

The convergence of AI-enhanced social engineering, supply chain attacks, and nation-state espionage underscores the rapidly evolving threat landscape where traditional security measures are increasingly insufficient against sophisticated adversaries employing cutting-edge tactics.

>>Outpace Attackers With AI-Based Automated Penetration Testing

Incident Analysis Feed

1. Record-Breaking 16 Billion Credential Leak

Date of Incident: June 18, 2025
Discovery Date: June 18-23, 2025
Threat Actor: Unknown (Infostealer malware campaign)
Impact: Massive credential exposure enabling global cyber exploitation

Overview

Security researchers uncovered the largest credential breach in history on June 18, 2025, exposing approximately 16 billion login credentials across 30 separate databases. The massive compilation included fresh, weaponizable credentials from major platforms including Apple, Google, Facebook, GitHub, Telegram, and government services, marking this as a “blueprint for mass exploitation”according to cybersecurity experts.

Explanation

The credentials originated from infostealer malware campaigns that silently harvested login data from infected devices and uploaded them to unsecured storage locations including Elasticsearch instances and cloud storage buckets. Unlike recycled breach data, investigators confirmed the credentials were recent and highly organized, making them particularly dangerous for credential stuffing, account takeovers, and targeted phishing campaigns.

MITRE ATT&CK Mapping:

  • Initial Access: T1566.001 (Spearphishing Attachment), T1189 (Drive-by Compromise)
  • Collection: T1005 (Data from Local System), T1113 (Screen Capture)
  • Credential Access: T1003 (OS Credential Dumping), T1555 (Credentials from Password Stores)
  • Exfiltration: T1041 (Exfiltration Over C2 Channel)
  • Impact: T1565 (Data Manipulation)

Impact

The breach created unprecedented global cybersecurity risks:

  • 16 billion credentials potentially affecting billions of users worldwide
  • Fresh, weaponizable intelligence for cybercriminal operations
  • Major platforms compromised including social media, email, and government services
  • Identity theft and phishing campaign enablement at massive scale
  • Account takeover risks across multiple services due to password reuse

Details

Technical Indicators:

  • 30 separate datasets containing 10 million to 3.5 billion records each
  • URLs, usernames, passwords plus tokens, cookies, and metadata
  • Unsecured storage in Elasticsearch and cloud buckets
  • Recent compilation from multiple infostealer campaigns

Attack Infrastructure:

  • Distributed infostealer malware deployment
  • Automated credential harvesting systems
  • Cloud-based data aggregation platforms
  • Dark web credential monetization markets

Remediation Actions:

  • Immediate password reset campaigns across affected platforms
  • Enhanced monitoring for credential stuffing attacks
  • Multi-factor authentication enforcement
  • User education on password security practices

Takeaway for CISO

This unprecedented breach emphasizes the critical need for zero-trust authentication and proactive credential monitoring:

  1. Mandatory multi-factor authentication across all systems and applications
  2. Password manager deployment with unique credential enforcement
  3. Continuous credential monitoring against breach databases
  4. Transition to passwordless authentication where technically feasible
  5. Employee education on infostealer malware and credential hygiene

2. Scattered Spider Aviation Sector Campaign

Date of Incident: June 12-30, 2025
Threat Actor: Scattered Spider
Impact: Aviation industry disruption and data theft

Overview

The notorious Scattered Spider cybercriminal group expanded their operations to target the aviation industry throughout June 2025, successfully breaching Hawaiian Airlines and WestJet using sophisticated social engineering tactics and MFA bypass techniques. This represents a concerning evolution in the group’s targeting strategy following previous attacks on insurance companies.

Explanation

Scattered Spider employed their signature social engineering playbook, impersonating employees and manipulating help-desk staff to bypass multi-factor authentication systems. The attacks leveraged MFA fatigue techniques and behavioral manipulation to gain unauthorized access to aviation networks, demonstrating the group’s ability to adapt tactics across industry verticals.

MITRE ATT&CK Mapping:

  • Initial Access: T1566.002 (Spearphishing Link)
  • Execution: T1204.002 (Malicious File)
  • Persistence: T1078.004 (Cloud Accounts)
  • Privilege Escalation: T1078 (Valid Accounts)
  • Defense Evasion: T1550.001 (Application Access Token)
  • Credential Access: T1621 (Multi-Factor Authentication Request Generation)
  • Collection: T1005 (Data from Local System)
  • Impact: T1565 (Data Manipulation)

Impact

The aviation sector attacks resulted in significant operational disruption:

  • WestJet operations affected with ongoing investigation into data compromise
  • Hawaiian Airlines confirmed technology system impact affecting 150 daily flights
  • No flight safety concerns but continued operational monitoring required
  • Industry-wide security alert for enhanced MFA monitoring

Details

Attack Methodology:

  • Employee impersonation targeting help desk and IT support staff
  • MFA fatigue attacks overwhelming users with authentication requests
  • Behavioral detection evasion through sophisticated social engineering
  • Third-party vendor targeting within aviation ecosystem

Technical Indicators:

  • Suspicious MFA activity patterns from distributed IP addresses
  • Help desk verification procedure bypasses
  • Unauthorized access token generation
  • Anomalous administrative account creation

Remediation Actions:

  • Enhanced help desk verification protocols implementation
  • MFA behavioral analytics deployment
  • Third-party vendor access policy hardening
  • Employee social engineering training intensification

Takeaway for CISO

This campaign highlights the persistent threat of social engineering against multi-factor authentication systems:

  1. Risk-based adaptive authentication implementation beyond traditional MFA
  2. Help desk verification protocol strengthening with multi-channel validation
  3. Behavioral analytics deployment for MFA anomaly detection
  4. Regular social engineering simulation exercises for all staff
  5. Third-party access governance with continuous monitoring

3. IntelBroker Hacker Arrest and Extradition

Date of Incident: February-June 2025
Date of Disclosure: June 26, 2025
Threat Actor: Kai West (alias “IntelBroker”)
Impact: Major cybercriminal operation disruption

Overview

On June 26, 2025, U.S. federal prosecutors unsealed charges against 25-year-old British national Kai West, known by the alias “IntelBroker”, for leading a global cybercrime operation that stole sensitive data from dozens of companies resulting in over $25 million in damages. West was arrested in France in February 2025 and faces extradition to the United States.

Explanation

West operated under multiple aliases including “IntelBroker” and “Kyle Northern”, leading a hacking collective called “CyberN” (formerly “The Boys”). The operation involved systematic corporate network infiltration to steal customer databases, marketing plans, and sensitive internal data7, subsequently monetizing the information through BreachForums and other dark web marketplaces.

MITRE ATT&CK Mapping:

  • Initial Access: T1566.001 (Spearphishing Attachment)
  • Execution: T1059.001 (PowerShell)
  • Persistence: T1547.001 (Registry Run Keys)
  • Privilege Escalation: T1068 (Exploitation for Privilege Escalation)
  • Defense Evasion: T1070.004 (File Deletion)
  • Credential Access: T1003 (OS Credential Dumping)
  • Collection: T1005 (Data from Local System)
  • Exfiltration: T1041 (Exfiltration Over C2 Channel)
  • Command and Control: T1102 (Web Service)

Impact

The IntelBroker operation caused extensive damage across multiple sectors:

  • $25+ million in damages across 40+ corporations
  • 158 data sale threads on BreachForums offering stolen information
  • Telecommunications, healthcare, and government data compromised
  • $2.4 million profit target from data monetization
  • Major corporate victims including claimed attacks on AMD, Cisco, and HPE

Details

Investigation Timeline:

  • February 2025: West arrested in France
  • June 26, 2025: U.S. indictment unsealed
  • Ongoing: Extradition proceedings to Southern District of New York

Technical Evidence:

  • FBI undercover purchases of stolen credentials for $250 in Bitcoin
  • Email, cryptocurrency wallet, and YouTube activity linking to West’s identity
  • BreachForums administration and moderation activities
  • Clear and dark web forum operations coordination

Law Enforcement Actions:

  • International cooperation between U.S., French, and British authorities
  • Coordinated takedown of BreachForums infrastructure
  • Related arrests of ShinyHunters group members

Takeaway for CISO

This arrest demonstrates the increasing effectiveness of international cybercrime prosecution and the importance of threat intelligence:

  1. Enhanced threat intelligence sharing with law enforcement agencies
  2. Dark web monitoring for organizational data exposure
  3. Incident response coordination with federal cybercrime units
  4. Proactive threat hunting for advanced persistent access
  5. Legal preparation for potential criminal prosecution support

4. North Korean BlueNoroff Deepfake Zoom Attacks

Date of Incident: June 2025
Threat Actor: BlueNoroff (Lazarus Group)
Impact: Cryptocurrency sector targeting with AI-enhanced social engineering

Overview

The North Korean-affiliated BlueNoroff APT group launched a sophisticated campaign in June 2025 using AI-generated deepfake video feeds to impersonate trusted executives during live Zoom meetings. The attacks targeted cryptocurrency and Web3 sector employees, representing a significant evolution in nation-state social engineering tactics.

Explanation

BlueNoroff operatives initiated contact through Telegram, sending Calendly links that redirected to fake Zoom domains. During group meetings featuring deepfaked company executives, victims experienced fabricated audio issues and were instructed to install malicious “Zoom audio support” extensions. The extensions deployed AppleScript malware targeting macOS systems with keyloggers, cryptocurrency stealers, and remote access tools.

MITRE ATT&CK Mapping:

  • Initial Access: T1566.002 (Spearphishing Link)
  • Execution: T1059.002 (AppleScript)
  • Persistence: T1547.011 (Plist Modification)
  • Defense Evasion: T1564.001 (Hidden Files and Directories)
  • Credential Access: T1555.003 (Credentials from Web Browsers)
  • Collection: T1056.001 (Keylogging)
  • Command and Control: T1071.001 (Web Protocols)
  • Impact: T1565 (Data Manipulation)

Impact

The deepfake campaign posed significant risks to cryptocurrency operations:

  • Web3 foundation employees directly targeted
  • Advanced persistent access to cryptocurrency infrastructure
  • Financial theft capabilities through cryptocurrency wallet access
  • Supply chain implications for blockchain ecosystem security

Details

Attack Infrastructure:

  • Fake Zoom domains with legitimate favicon hosting
  • Calendly integration for meeting scheduling legitimacy
  • Deepfake generation capabilities for executive impersonation
  • Telegram-based initial contact vectors

Technical Payload Analysis:

  • AppleScript malware with system log disabling
  • Rosetta 2 installation for compatibility
  • Keylogger and cryptocurrency stealer deployment
  • Remote access tool installation for persistence

Detection and Response:

  • Zoom favicon anomaly detection for fake domains
  • Behavioral analysis of meeting participant authenticity
  • Endpoint detection for unauthorized AppleScript execution

Takeaway for CISO

This represents a paradigm shift in social engineering sophistication requiring enhanced human verification protocols:

  1. AI-powered deepfake detection tools deployment
  2. Multi-channel identity verification for sensitive meetings
  3. Endpoint protection against script-based malware
  4. Employee training on AI-enhanced social engineering threats
  5. Meeting platform security hardening and monitoring

5. APT29 Sophisticated Phishing Campaign

Date of Incident: June 2025
Threat Actor: APT29 (Midnight Blizzard/Cozy Bear)
Impact: Expert targeting with novel authentication bypass

Overview

Russian state-sponsored group APT29 conducted a highly sophisticated phishing campaign in June 2025, successfully bypassing multi-factor authentication through app-specific password (ASP) abuse. The attack targeted Keir Giles, a prominent Russia expert and Chatham House senior consulting fellow, demonstrating refined tactics that avoided traditional red flags.

Explanation

Unlike previous campaigns, this operation featured convincing English, valid-looking domains, strategic timing, and no pressure tactics. The attackers, linked to Russia’s Foreign Intelligence Service (SVR), tricked the target into sharing an app-specific password, enabling Google account access despite MFA protection. This novel technique highlighted evolving threats that bypass modern security tools.

MITRE ATT&CK Mapping:

  • Initial Access: T1566.002 (Spearphishing Link)
  • Execution: T1204.002 (Malicious File)
  • Persistence: T1078.004 (Cloud Accounts)
  • Credential Access: T1621 (Multi-Factor Authentication Request Generation)
  • Collection: T1114 (Email Collection)
  • Command and Control: T1071.001 (Web Protocols)

Impact

The successful bypass demonstrated significant authentication vulnerabilities:

  • High-value target compromise of Russia policy expert
  • MFA bypass technique validation for future operations
  • Intelligence gathering on diplomatic and policy discussions
  • App-specific password exploitation creating new attack vectors

Details

Attack Sophistication:

  • U.S. State Department impersonation with convincing materials
  • Patient reconnaissance and target profiling
  • Technical knowledge of Google authentication mechanisms
  • Behavioral adaptation to avoid detection triggers

Technical Methodology:

  • ASP generation through social engineering
  • Account access maintenance despite MFA protection
  • Email and document collection from compromised accounts

Takeaway for CISO

This attack reveals critical weaknesses in authentication bypass protections:

  1. App-specific password governance with strict controls and monitoring
  2. Advanced phishing simulation incorporating state-actor techniques
  3. High-value target protection with enhanced security measures
  4. Authentication architecture review for bypass vulnerabilities
  5. Threat intelligence integration for nation-state campaign detection

6. Critical Mitsubishi Electric HVAC Vulnerability

Date of Disclosure: June 26, 2025
CVE: CVE-2025-3699
CVSS Score: 9.8
Impact: Critical infrastructure and building automation systems at risk

Overview

CISA released an advisory on June 26, 2025, detailing a critical authentication bypass vulnerability in Mitsubishi Electric air conditioning systems. CVE-2025-3699 affects a wide range of HVAC models with a CVSS score of 9.8, enabling remote attackers to illegally control systems and tamper with firmware without credentials.

Explanation

The vulnerability stems from missing authentication for critical functions in web interfaces, classified under CWE-306. Attackers can bypass authentication and gain unauthorized control over HVAC systems, disclose sensitive information, and manipulate firmware. The flaw is particularly dangerous in externally accessible configurations without VPN protection.

MITRE ATT&CK Mapping:

  • Initial Access: T1190 (Exploit Public-Facing Application)
  • Execution: T1059 (Command and Scripting Interpreter)
  • Persistence: T1546 (Event Triggered Execution)
  • Privilege Escalation: T1068 (Exploitation for Privilege Escalation)
  • Impact: T1565 (Data Manipulation)

Impact

The vulnerability poses significant risks to building automation security:

  • Wide range of Mitsubishi Electric models affected including G-50, AE-200J, and others
  • Commercial and industrial facilities at risk globally
  • Building automation system compromise enabling lateral movement
  • Operational disruption and safety concerns

Details

Affected Products:

  • G-50/GB-50/AE-200J/AE-50A and related models
  • Version ranges including G-50 Ver.3.37 and prior
  • Multiple product lines across Mitsubishi Electric HVAC portfolio

Exploitation Scenarios:

  • System Example 3 (external access without VPN): Vulnerable to remote exploitation
  • Internet-facing systems without proper network segmentation
  • Direct firmware manipulation capabilities

Mitigation Strategies:

  • Network access restrictions from untrusted sources
  • VPN deployment for external access requirements
  • Physical access controls to systems and connected computers
  • Firmware updates when available from vendor

Takeaway for CISO

This vulnerability underscores the critical importance of industrial control system security:

  1. Building automation system inventory and vulnerability assessment
  2. Network segmentation isolating HVAC from corporate networks
  3. Access control enforcement for all industrial control systems
  4. Firmware management with regular update deployment
  5. Physical security measures for building automation infrastructure

7. UNFI Grocery Supply Chain Cyberattack

Date of Incident: June 5, 2025
Recovery: June 27, 2025
Impact: Critical food supply chain disruption

Overview

United Natural Foods Inc. (UNFI), a $30 billion grocery wholesaler and Whole Foods Market’s largest supplier, suffered a devastating cyberattack on June 5, 2025, that crippled operations for over three weeks. The attack forced the company to switch to manual order-processing procedures, disrupting food supplies to over 15,000 retail locations nationwide.

Explanation

The cyberattack targeted UNFI’s electronic ordering and invoicing systems, forcing immediate network shutdown and manual operation implementation. As a critical supply chain node serving supermarkets, cooperatives, and health food stores, the disruption created cascading effects throughout the grocery industry.

Impact

The attack demonstrated the vulnerability of critical food supply infrastructure:

  • Material impact on Q4 2025 financial performance
  • Reduced sales volume and increased operational costs
  • Supply chain pressure affecting thousands of retail locations
  • $10 million estimated impact on quarterly operations

Details

Recovery Timeline:

  • June 5, 2025: Initial attack detection and system shutdown
  • June 27, 2025: Core systems restoration announcement
  • Ongoing: Full operational normalization in progress

Business Continuity Measures:

  • Manual processing implementation during outage
  • Alternative supplier sourcing by affected retailers
  • Cybersecurity insurance coverage for incident costs

Takeaway for CISO

This incident highlights supply chain cybersecurity criticality:

  1. Business continuity planning for extended system outages
  2. Supply chain partner assessment and monitoring
  3. Manual operation procedures for critical business functions
  4. Cybersecurity insurance adequacy for operational disruption
  5. Industry coordination for supply chain resilience

Outpace Attackers With AI-Based Automate Penetration Testing With FireCompass:

FireCompass is a single platform for AI-Powered Continuous Automated Red Teaming (CART), Pen Testing & NextGen Attack Surface Management 

>>FireCompass Free Trial

Author Image

Priyanka Aash

Priyanka Aash Priyanka has 10+ years of experience in Strategy, Community Building & Inbound Marketing and through CISO Platform has earlier worked with marketing teams of IBM, VMware, F5 Networks, Barracuda Network, Checkpoint, and more. Priyanka is passionate about Entrepreneurship and Enterprise Marketing Strategy. Earlier she co-founded CISO Platform- the world’s 1st online platform for collaboration and knowledge sharing among senior information security executives.