The Week in Breach News: 04/23/25 – 04/29/25

This week: WK Kellogg falls victim to the Cleo exploit; APT29 purportedly hits a “banned” German non-profit again; three new pretexting video lessons and protecting users from malware.
We’re at Kaseya Connect 2025 this week, and we’ve made some amazing announcements about Kaseya’s latest evolution and next-level innovations, including Kaseya 365 Ops. LEARN MORE>>

The Seigel Group
Exploit: Hacking
Industry: Real Estate
The Siegel Group, a Las Vegas-based real estate firm, recently revealed a data breach that compromised sensitive personal and protected health information. The breach occurred between January 28 and February 2, 2025, when an unauthorized third party accessed files on the company’s network. The impacted data may include names, Social Security numbers, birth dates, passport numbers, state IDs, direct deposit details, signatures and medical information. Following an investigation, Siegel Group identified the affected individuals and began notifying them on March 31, 2025. Compensation may be offered to those whose information was compromised.
How It Could Affect Your Customers’ Business: Organizations must continuously monitor their networks and act swiftly upon identifying suspicious activity.
Kaseya to the Rescue: Explore the biggest challenges professionals contended with in 2024 and the impact of AI on cybersecurity in the Kaseya Cybersecurity Survey 2024. GET THE REPORT>>
WK Kellogg Co.
https://www.cybersecuritydive.com/news/wk-kellogg-employee-data-breach-cleo/744739/
Exploit: Hacking
Industry: Food & Agriculture

Cereal maker WK Kellogg Co. confirmed it fell victim to a cyberattack by cybercrime group Cl0p. The group has been exploiting vulnerabilities in Cleo file-transfer software, which over 4,000 organizations worldwide use. The Michigan-based cereal company said the Cleo servers, used to transfer employee files, were hacked on December 7, 2024, but the breach wasn’t discovered until February 27, 2025. The filing with the Maine Attorney General noted that the exposed data included the name and Social Security number of a Maine-based employee. Still, it remains unclear whether additional employees were affected.
How It Could Affect Your Customers’ Business: It is critical for businesses to monitor third-party software for vulnerabilities and act swiftly when flaws are discovered.
Kaseya to the Rescue: Maximize your security on a lean budget with the insights you’ll find in our infographic 5 Ways to Squeeze More From a Tight Security Budget. DOWNLOAD IT>>
Fall River Public Schools, MA
https://www.govtech.com/education/k-12/fall-river-public-schools-mass-hit-by-cyber-attack
Exploit: Hacking
Industry: Education
Fall River Public Schools is investigating a cybersecurity breach after an unauthorized party accessed parts of the district’s internal network, the district announced Monday, April 7, 2025. The district’s chief information officer discovered the suspicious activity earlier that day. IT staff acted quickly to contain the incident and are now working with third-party cybersecurity experts and law enforcement to investigate the breach. In a press release, the district stated there is currently no evidence that any personal data belonging to students or staff was accessed or misused.
How It Could Affect Your Customers’ Business: Early detection tools and a rapid response plan are critical for mitigating the impact of cyber trouble.
Kaseya to the Rescue: Get tips to strengthen a company’s defenses and bolster its cyber resilience with our Building a Cyber-Resilient Business checklist. GET THE CHECKLIST>>
Twilio
https://hackread.com/hacker-twilio-sendgrid-data-breach-customer-data/
Exploit: Hacking
Industry: Technology

A hacker known as “Satanic” is claiming responsibility for a data breach involving SendGrid, a cloud-based email platform owned by Twilio. The hacker posted on Breach Forums on April 3, 2025, offering the stolen data for $2,000. The database, which allegedly contains information for 848,960 entities, includes detailed customer and company data such as emails, phone numbers, physical addresses, social media profiles, company revenue, employee counts and financial metrics. The data also reveals company tech stacks, including CMS platforms, payment solutions and CRM tools. High-profile companies like Bank of America, Bazaarvoice and the BBC are reportedly among the exposed entities. The data is highly structured, containing not just contact info but also insights into web analytics, internal emails, geolocation and backend technologies, suggesting this breach could be more than a typical leak.
How it Could Affect Your Customers’ Business: There is a critical need for robust security measures around customer and company data, especially in cloud-based platforms.
Kaseya to the Rescue: Our 10 Tips for Successful Employee Security Awareness Training infographic can help you maximize the effectiveness of your security awareness training efforts. DOWNLOAD IT>>
ALN Medical Management
Exploit: Hacking
Industry: Healthcare
ALN, a Nebraska-based healthcare services provider recently acquired by Health Prime International, has disclosed a data breach involving sensitive personal information. Founded in 2000, ALN provides operational support and revenue cycle management to more than 800 clients and 6,000 physicians nationwide. The company reported that in March 2024, it detected suspicious activity on certain systems hosted by a third-party service provider. An investigation revealed that between March 18 and March 24, 2024, an unauthorized party may have accessed sensitive personal data stored in the affected environment. The potentially compromised information includes names, Social Security numbers, driver’s license and government-issued ID numbers, financial details, medical information, and health insurance data. ALN has not publicly disclosed how many individuals were impacted but it has taken steps to notify affected parties and enhance security protocols in coordination with Health Prime.
How it Could Affect Your Customers’ Business: No matter how secure your internal systems are, vendors and partners with access to sensitive data can become a weak link.
Kaseya to the Rescue: Identify the must-have features in a user protection solution and explore how to build a robust user protection strategy in our Modern User Protection Buyer’s Guide. GET IT>>

Get expert advice for protecting your organization’s most vulnerable gateway in this infographic. DOWNLOAD IT>>

Germany – The German Association for Eastern European Studies
https://therecord.media/germany-links-cyberattack-russian-hackers
Exploit: Hacking
Industry: Non-profit

German authorities suspect Russian state-backed hackers were behind a recent cyberattack on the German Association for Eastern European Studies (DGO), marking the second breach of the Berlin-based research institute in just six months. The late-March 2025 attack, described by the DGO as “highly professional,” specifically targeted its email systems and succeeded in bypassing enhanced cybersecurity defenses implemented after an earlier October 2024 breach. German intelligence officials believe the intrusion may be linked to APT29, also known as Cozy Bear, a group reportedly affiliated with Russia’s Foreign Intelligence Service (SVR). The DGO, which focuses on Eastern European policy and research, was labeled an “extremist organization” and banned in Russia in July 2024. That designation puts Russian citizens who collaborate with the group at legal risk and may have increased its profile as a target.
How it Could Affect Your Customers’ Business: The growing risk of politically motivated cyber warfare has created a need for robust cybersecurity defenses in public sector institutions.
Kaseya to the Rescue: Discover how Kaseya 365 User delivers comprehensive protection beyond the endpoint without breaking the bank. GET THE EBOOK>>

Learn more about growing supply chain risk for businesses and how to mitigate it in a fresh eBook. DOWNLOAD IT>>

Australia – Western Sydney University
Exploit: Hacking
Industry: Education
Morocco’s Caisse Nationale de Sécurité Sociale (CNSS) confirmed a major cyberattack that exposed sensitive personal data on Telegram. Hackers bypassed security to steal internal documents, and early investigations suggest the breach was politically motivated, linked to tensions between Morocco and Algeria. Hackers claimed the attack was retaliation for alleged Moroccan “harassment” of Algeria on social media and warned of further strikes if Algerian platforms are targeted.
How it Could Affect Your Customers’ Business: Educational institutions store large volumes of sensitive data, making them prime targets for bad actors.
Kaseya to the Rescue: Discover how Kaseya 365 User delivers comprehensive protection beyond the endpoint without breaking the bank. GET THE EBOOK>>

Take a deep dive into why an AI-powered anti-phishing solution is a smart financial choice. GET EBOOK>>

Read this week’s featured blog: Follow These Best Practices to Protect Users from Ransomware and Malware Threats
Ransomware and malware attacks are getting more costly and severe, with claim losses surging 68% in 2024. Learn the essential best practices to protect users and reduce cyber-risk. READ IT>>

Learn how to identify and mitigate malicious and accidental insider threats before there’s trouble! GET EBOOK>>

3 newly translated pretexting training videos are here
Pretexting is a social engineering tactic where an attacker creates a fabricated scenario or false identity to manipulate someone into revealing confidential information. Educate employees about the dangers of pretexting with these freshly translated courses.
- Pretexto VO (Portuguese)
- Soutirage D’informations Confidentielles VO (French)
- Pretexting VO (Spanish)
Learn more in the BullPhish ID Release Notes.

Learn how to spot today’s most dangerous cyberattack & get defensive tips in Phishing 101 GET EBOOK>>

Download 7 Key Stats From the 2025 MSP Benchmark Survey
Discover the most critical findings from the Kaseya 2025 Global MSP Benchmark Report to help your MSP stay competitive and grow profitably in a rapidly evolving industry.

Are you feeling overwhelmed by IT tasks? Let us show you how to reduce your security workload! GET TIPS>>

May 8: Maximize Your Time Savings with the Right RMM REGISTER NOW>>
May 14: Kaseya + Datto Connect Local: Cape Town REGISTER NOW>>
May 15: Kaseya + Datto Connect Local: Sydney REGISTER NOW>>
May 20: Kaseya + Datto Connect Local: Chicago Symposium REGISTER NOW>>
May 22: Kaseya + Datto Connect Local: Detroit REGISTER NOW>>
May 22: Kaseya + Datto Connect Local: Melbourne REGISTER NOW>>
June 3: Kaseya+Datto Connect Local: New York City Symposium REGISTER NOW>>
June 17 – 19: Kaseya DattoCon Europe REGISTER NOW>>
October 6 – 8: Kaseya DattoCon REGISTER NOW>>
October 28 – 30: Kaseya DattoCon Asia-Pacific REGISTER NOW>>

Do you have comments? Requests? News tips? Complaints (or compliments)? We love to hear from our readers! Send a message to the editor.
Partners: Feel free to reuse this content. When you get a chance, email [email protected] to let us know how our content works for you!

Read our case studies and see how MSPs and businesses have benefited from using our solutions. READ NOW>