The Week in Breach News: 04/09/25 – 04/15/25

This week: Bad actors spend three years roaming Office of the Comptroller of the Currency (OCC) systems; hackers hit two e-commerce giants; why enhanced user security is essential in a Software-as-a-Service (SaaS)-driven world; and new video lessons in BullPhish ID.
Read this week’s new featured blog: Why Enhanced User Security Is Essential in a Hybrid, SaaS-Driven World

Sensata Technologies
https://www.cybersecuritydive.com/news/sensata-technologies-disrupted-ransomware-attack/745007
Exploit: Ransomware
Industry: Manufacturing


Sensata Technologies, a global supplier of industrial and automotive technology, has confirmed a ransomware attack that disrupted several key operations earlier this week. According to a regulatory filing, the Sunday attack encrypted devices across the company’s network, temporarily impacting shipping, receiving, manufacturing and other support functions. Sensata has implemented interim measures to restore some operations, though a full recovery timeline remains unclear. The Massachusetts company also confirmed that certain files were removed from its network. While Sensata has admitted that the attack has had a serious impact on production, the company maintains that it does not anticipate a material impact on its Q2 financial results. The breach remains under investigation.
How It Could Affect Your Customers’ Business: Strong data protection protocols can help mitigate the impact of data exfiltration during ransomware incidents.
Kaseya to the Rescue: Explore the biggest challenges professionals contended with in 2024 and the impact of AI on cybersecurity in the Kaseya Cybersecurity Survey 2024. GET THE REPORT>>
U.S. Treasury Department Office of the Comptroller of the Currency
Exploit: Hacking
Industry: Government
The U.S. Treasury Department’s Office of the Comptroller of the Currency (OCC) has confirmed a major incident involving a breach of its email system. Discovered on February 12, 2025, the breach affected 103 accounts, including those of executives and staff. Hackers accessed sensitive financial data related to federally regulated financial institutions, with approximately 150,000 emails compromised between May 2023 and February 2025. The breach was initially flagged by Microsoft, and while the OCC found no direct impact on the broader financial sector, the compromised emails contained critical oversight information.
How It Could Affect Your Customers’ Business: Continuous monitoring and threat detection are a must-have within government and financial oversight agencies.
Kaseya to the Rescue: Maximize your security on a lean budget with the insights you’ll find in our infographic 5 Ways to Squeeze More From a Tight Security Budget. DOWNLOAD IT>>
Oregon’s Department of Environmental Quality
https://www.koin.com/news/oregon/cyberattack-shuts-down-oregon-deq-networks-wednesday-04092025
Exploit: Hacking
Industry: Government


Oregon’s Department of Environmental Quality (DEQ) shut down its networks and vehicle inspection stations on Wednesday, April 2, in response to a cyberattack, the agency announced. The closure is expected to last for several days as investigators work to contain and eliminate the threat. According to a statement released Wednesday morning, the state’s Enterprise Information Services is leading the investigation, while Oregon DEQ isolates its servers and network to prevent further damage. A DEQ spokesperson told KOIN 6 News that all vehicle inspection stations statewide are affected by the shutdown. However, the agency’s public portal, MyDEQOnline, remains operational, as it is hosted on a separate server.
How It Could Affect Your Customers’ Business: This attack illustrates the importance of having network segmentation and business continuity plans in place.
Kaseya to the Rescue: Get tips to strengthen a company’s defenses and bolster its cyber resilience with our Building a Cyber-Resilient Business checklist. GET THE CHECKLIST>>
WooCommerce
https://hackread.com/hacker-claims-woocommerce-data-breach-selling-records/
Exploit: Third-Party Breach
Industry: Retail
A hacker known as “Satanic” claims responsibility for multiple data breaches this week, including a data breach involving WooCommerce, affecting over 4.4 million records from major organizations, including NVIDIA, Texas.gov and NIST. The breach, allegedly occurring on April 6, 2025, did not target WooCommerce’s core infrastructure directly but instead exploited third-party integrations like CRM and marketing tools tied to websites using the platform. The compromised data includes customer and company information, such as emails, phone numbers, physical addresses and business data like sales revenue, employee counts and platform usage. The breach also involves metadata on corporate websites, including details about technology stacks, payment solutions and hosting providers. The hacker shared a sample showing data from high-profile entities, with many entries referencing WordPress CMS, WooCommerce and integrations with platforms like Salesforce and PayPal. WooCommerce has clarified that the breach was not a result of a direct attack on its platform but likely stems from exposed APIs or vulnerable third-party systems.
How it Could Affect Your Customers’ Business: This breach underscores the risks associated with third-party integrations and APIs.
Kaseya to the Rescue: Our 10 Tips for Successful Employee Security Awareness Training infographic can help you maximize the effectiveness of your security awareness training efforts. DOWNLOAD IT>>
Magento
https://hackread.com/hackers-magento-breach-3rd-party-crm-data-leak/
Exploit: Third-Party Breach
Industry: Retail
A hacker known as “Satanic ” has also claimed responsibility for a data breach involving Magento, which occurred on April 9, 2025. The breach, reportedly triggered via a third-party integration, resulted in the theft of 745,000 records containing detailed business and personal information. The leaked dataset, which has surfaced on Breach Forums, includes 430,000 unique email addresses, 261,000 phone numbers and data from organizations like BBC and Chicago Tribune. The exposed data appears to come from a CRM system linked to Magento deployments, containing names, job titles, corporate emails, company domains and social media links. Additionally, the breach includes technical metadata revealing companies’ tech stacks, marketing platforms and payment processors, possibly extracted from integrated CRM enrichment tools. Adobe, Magento’s parent company, has not yet verified the incident.
How it Could Affect Your Customers’ Business: The sample files show CRM-style data rather than raw credentials or payment information, but the nature of the leak still poses a serious risk.
Kaseya to the Rescue: Identify the must-have features in a user protection solution and explore how to build a robust user protection strategy in our Modern User Protection Buyer’s Guide. GET IT>>


Get to know the players, commodities and places that are shaping today’s dark web. DOWNLOAD EBOOK>>


South Korea – SK Group
https://cybernews.com/news/sk-group-ransomware-attack-qilin-gang-claims-stolen-data
Exploit: Ransomware
Industry: Finance


The Qilin ransomware group has claimed responsibility for a cyberattack on SK Group, one of South Korea’s largest multinational conglomerates. The group posted SK on its dark web leak site early Thursday morning, alleging that it had exfiltrated over 1TB of data from the company’s servers. The cybercriminals initially issued a 48-hour ultimatum, threatening to release the stolen files unless SK Group contacts them. As of now, no details about the contents of the stolen data have been confirmed or disclosed. SK Group is a global leader in energy, telecommunications, semiconductors and advanced materials, operating in more than 175 companies worldwide. It is South Korea’s second-largest chaebol (family-run conglomerate) after Samsung.
How it Could Affect Your Customers’ Business: This incident underscores the ongoing threat posed by ransomware groups targeting critical industrial and tech infrastructure.
Kaseya to the Rescue: Discover how Kaseya 365 User delivers comprehensive protection beyond the endpoint without breaking the bank. GET THE EBOOK>>
Singapore – DBS Group
Exploit: Third-Party Breach
Industry: Finance
A ransomware attack on third-party vendor Toppan Next Tech (TNT) has potentially compromised customer data belonging to DBS Group and the Bank of China’s Singapore branch, the banks confirmed this week. According to DBS, around 8,200 customer statements may have been exposed, though the bank emphasized that its own systems were not breached and that customer deposits and funds remain secure. The data at risk includes names, addresses, and in some cases, loan account numbers, primarily tied to DBS Vickers trading accounts and Cashline loan accounts. Bank of China (Singapore) also reported that approximately 3,000 customers who received printed paper letters through TNT may have had their information compromised. The affected communications were largely sent between December 2024 and February 2025. Both banks were alerted to the breach on April 5, and investigations are ongoing. The Monetary Authority of Singapore (MAS) stated that it is in “close engagement” with the impacted institutions to assess the incident and ensure adequate mitigation efforts are in place.
How it Could Affect Your Customers’ Business: This incident highlights the growing cybersecurity risks tied to third-party service providers, particularly in the financial sector.
Kaseya to the Rescue: Discover how Kaseya 365 User delivers comprehensive protection beyond the endpoint without breaking the bank. GET THE EBOOK>>


Take a deep dive into why an AI-powered anti-phishing solution is a smart financial choice. GET EBOOK>>


Read this week’s featured blog: Why Enhanced User Security Is Essential in a Hybrid, SaaS-Driven World
The rise of hybrid work and SaaS apps has transformed the way we work, but it’s also expanded the attack surface, making users the new frontline of cybersecurity. Discover why traditional security measures are no longer enough and why proactive protection is essential to safeguard your business. READ MORE>>


Learn how to identify and mitigate malicious and accidental insider threats before there’s trouble! GET EBOOK>>


5 New security awareness training courses have landed
Just in time to plan your spring training campaigns, five new training courses are now available in the BullPhish ID Training portal:
- GDPR Rights of Data Subjects Stored Processed Destroyed – Learn about the rights of data subjects under General Data Protection Regulations (GDPR) and how to remain compliant with the rules that govern the way data is stored, processed and destroyed.
- EU GDPR: Important Definitions – Important GDPR definitions are examined.
- What is PHI/ePHI? – Learn what PHI entails and how the transition to electronic PHI, or ePHI, impacts you.
- Introduction to Mobile Security – Learn about mobile device security and how to apply safe practices.
- Mobile Security: Mobile Storage – The importance of secure mobile device storage and the different methods available are explored.
Learn more in the BullPhish ID Release Notes.


Learn how to spot today’s most dangerous cyberattack & get defensive tips in Phishing 101 GET EBOOK>>


New infographic: 7 Key Stats From the 2025 MSP Benchmark Survey
Get key insights about what is shaping the managed service provider industry in Kaseya’s 2025 Global MSP Benchmark Report. This infographic reveals 7 must-know statistics to help you stay competitive and boost profitability. Download the infographic now!


Get expert advice for protecting your organization’s most vulnerable gateway in this infographic. DOWNLOAD IT>>


April 15: VSA Q2 Product Innovation Update REGISTER NOW>>
April 15: Maximera Effektiviteten: Transformera och Utveckla Ditt Företag med RMM, IT Glue och PSA REGISTER NOW>>
April 17: From Tech to GTM: Selling IT Solutions to Your End Customers REGISTER NOW>>
April 22: Proactively Eliminating Security Gaps: A Pentesting GTM Strategy for MSP Growth REGISTER NOW>>
April 24: Microsoft 365 & Google Workspace User Health Check REGISTER NOW>>
April 24: Technical Thursday – Die neuesten Produktupdates und Feature-Releases REGISTER NOW>>
May 14: Kaseya + Datto Connect Local: Cape Town REGISTER NOW>>
May 15: Kaseya+Datto Connect Local: Sydney REGISTER NOW>>
May 20: Kaseya + Datto Connect Local: Chicago Symposium REGISTER NOW>>
May 22: Kaseya+Datto Connect Local: Detroit REGISTER NOW>>
May 22: Kaseya+Datto Connect Local: Melbourne REGISTER NOW>>
June 3: Kaseya+Datto Connect Local: New York City Symposium REGISTER NOW>>
June 17 – 19: Kaseya DattoCon Europe REGISTER NOW>>
October 6 – 8: Kaseya DattoCon REGISTER NOW>>
October 28 – 30: Kaseya DattoCon Asia-Pacific REGISTER NOW>>


Do you have comments? Requests? News tips? Complaints (or compliments)? We love to hear from our readers! Send a message to the editor.
Partners: Feel free to reuse this content. When you get a chance, email [email protected] to let us know how our content works for you!


Read our case studies and see how MSPs and businesses have benefited from using our solutions. READ NOW>