2025 in Review: Simple Errors, Not 0-Days, Caused Biggest Breaches

Year in Review: Cloud Misconfigurations and Supply Chain Failures Drove 2025's Biggest Data Breaches

INFORMATIONAL
December 26, 2025
January 19, 2026
m read
Data BreachSupply Chain AttackCloud Security

Impact Scope

People Affected

Over 90 million records exposed across mentioned incidents

Affected Companies

McDonald'sTalentHookHarrodsTransUnion

Industries Affected

RetailTechnologyFinanceHospitality

Related Entities(initial)

Organizations

Tenable

Products & Tech

AzureSalesforce

Other

HarrodsMcDonald'sTalentHookTransUnion

Full Report(when first published)

Executive Summary

A retrospective analysis of 2025's most significant data breaches, published on December 26, 2025, concludes that a failure to master security fundamentals was far more damaging than the impact of sophisticated zero-day exploits. The two most prevalent root causes for major breaches during the year were cloud security misconfigurations and supply chain attacks originating from compromised third-party vendors. Incidents at major corporations like McDonald's, TalentHook, Harrods, and TransUnion exposed the data of tens of millions of individuals, not because of advanced hacking, but due to preventable errors such as using default passwords and leaving cloud storage publicly accessible.

Analysis of Key Failure Points

Cloud Security Misconfigurations

The report highlights that as organizations migrate to the cloud, they often fail to adapt their security practices, leading to easily avoidable errors. This is a failure of Cloud Security Posture Management (CSPM).

  • Default Credentials: The breach of a recruitment chatbot used by McDonald's exposed nearly 64 million applicant records. The root cause was the use of the default password 123456 on a production system.
  • Publicly Accessible Storage: The company TalentHook exposed 26 million resumes because its Azure Blob storage container was configured for public access, requiring no authentication to read the data. This aligns with research from Tenable in 2025, which found that around 9% of public cloud storage containers still exposed sensitive data.

These incidents underscore a critical misunderstanding of the shared responsibility model in the cloud, where the customer is responsible for securing their own data and configurations.

Third-Party Supply Chain Attacks

Attackers are increasingly targeting smaller, less secure third-party vendors to gain access to their larger, more valuable customers.

  • Harrods: The luxury retailer suffered a breach exposing 430,000 records. The attack did not target Harrods directly but instead compromised a third-party e-commerce service provider that Harrods used.
  • TransUnion: The credit reporting agency's U.S. consumer support operations were breached after attackers targeted its third-party implementation of Salesforce. This demonstrates that even secure platforms can become a risk if their implementation by a third party is not properly managed.

This trend highlights that an organization's security is only as strong as its weakest link, which is often a vendor in its software supply chain.

Impact Assessment

The collective impact of these fundamental failures is massive. Millions of individuals had their personal and sensitive information exposed, leading to risks of identity theft, fraud, and phishing. For the affected companies, the consequences include significant financial costs from regulatory fines (e.g., under GDPR or CCPA), incident response, and litigation. Furthermore, these incidents cause severe, long-lasting reputational damage and erosion of customer trust. The report argues that the focus on exotic threats often distracts from the more probable and damaging risk of failing to implement basic security controls.

Lessons Learned & Guidance

  • Eliminate Default Credentials: Implement strict policies to change all default passwords on any system or application before it is deployed into production. This is a non-negotiable security baseline.
  • Cloud Security Posture Management (CSPM): Continuously scan and monitor cloud environments for misconfigurations like public S3 buckets or Azure blobs, overly permissive IAM roles, and missing encryption. Automate remediation where possible.
  • Vendor Risk Management: Implement a robust third-party risk management program. This must include security assessments as part of the procurement process, contractual security requirements, and ongoing monitoring of vendors' security postures. Assume your vendors will be targeted.
  • Adopt a Zero Trust Mindset: Move away from the outdated concept of a trusted internal network with a hard perimeter. Assume that any user or device could be compromised and require verification for every access request, regardless of its origin.
  • Security by Design: Integrate security into the entire lifecycle of applications and systems, rather than treating it as an afterthought. This includes secure configuration and coding practices.

Timeline of Events

1
December 26, 2025
This article was published

Article Updates

January 19, 2026

Severity increased

Cloud breaches surged 21% in 2025, costing $5.1M per incident, driven by credential compromise, misconfigurations, and insecure APIs.

New reports for 2025-2026 show cloud attacks increased 21% year-over-year, with 81% of organizations experiencing an incident. The average cost of a cloud breach reached $5.1 million. Primary attack vectors include credential compromise (over 50%), cloud misconfigurations (38%), and insecure APIs (31%). This analysis provides MITRE ATT&CK mapping for initial access (T1078, T1190), discovery (T1580), and exfiltration (T1530), reinforcing that basic security hygiene failures, not zero-days, are the main cause of these escalating incidents.

Sources & References(when first published)

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

2025 ReviewCloud SecurityData BreachDefault PasswordMisconfigurationSupply Chain Attack

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading