Gain critical insights into modern slavery and human rights challenges in global supply chains, and discover strategies to strengthen compliance and mitigate risks for 2025 and beyond. 

Gain critical insights into modern slavery and human rights challenges in global supply chains, and discover strategies to strengthen compliance and mitigate risks for 2025 and beyond. 

Gain critical insights into modern slavery and human rights challenges in global supply chains, and discover strategies to strengthen compliance and mitigate risks for 2025 and beyond. 

Gain critical insights into modern slavery and human rights challenges in global supply chains, and discover strategies to strengthen compliance and mitigate risks for 2025 and beyond. 

Top 10 Third-Party Cyber Breaches of 2025: What They Mean for Your TPRM Strategy

Third-Party cyber incidents defined 2025. Nearly 30% of all reported data breaches involved third parties – double the amount from 2024. As digital ecosystems expand and value chains grow more interconnected, third-party cyber breaches are quickly becoming the norm.

In this post, we break down 10 of the most significant third-party cyber breaches from 2025 and highlight key steps organizations can take to mitigate third-party cyber risk, from onboarding and monitoring to continuous controls and remediation.

Key takeaways
  • Retail has been a highly targeted sector in 2025 for third-party cyber attacks
  • Losses ranged from tens of millions to hundreds of millions in revenue or fines; companies faced regulatory scrutiny, reputational damage, and operational disruption
  • Vendor visibility and oversight are critical: Breaches underscore the importance of strong third-party security audits and monitoring
1. Red Hat Consulting / GitLab Instance – April 2025
Overview

Red Hat Consulting, the consulting division of open-source software leader Red Hat, had its self-managed GitLab instance breached. Attackers gained unauthorized access to repositories storing client configurations, automation scripts, and API keys.

Impact

Around 570 GB of internal data from 28,000+ repositories were stolen. While no core Red Hat products were compromised, sensitive consulting data put clients at potential risk, emphasizing the need for robust third-party security.

 

2. SK Telecom Breach – April 2025

Overview

South Korea’s Telcom provider, serving tens of millions of customers nationwide was compromised. An authorized third party infiltrated SK Telcom’s internal network, deploying remote access trojan (RAT) variant known as BDPFDoor.

Impact

The attackers collected over 27 million data records and the South Korean telecom giant was fined a record $96 million for the incident. As a result of the breach and its impact, the telecom giant has been mitigating their reputational hit through the media with several stories on how they will mitigate future incidents.

 

3. Marks & Spencer – April 2025

Overview

Marks & Spencer, a major British retailer known for its food, clothing, and home goods was breached via a third-party cyber-attack. Marks & Spencer stressed that the breach was via a third party, rather than a direct failure of its own systems. The cybercriminals used phishing and social engineering methods to breach Marks & Spencer’s customer data.

Impact

The disruption caused shelving and stock availability issues, with some stores even experiencing empty shelves. The retail giant estimated the incident could cost around £300 million in lost profits for the year. Since the incident, the retailer has been working closely with experts to mitigate incidents and working diligently in the media to limit reputational damage. 

4. Co-op – May 2025

Overview

The Co-operative Group, a UK-based consumer cooperative operating groceries, insurance, and funeral services, suffered a breach via a third-party IT vendor. Attackers leveraged a misconfigured contractor system to access customer data.

Impact

Customer names, addresses, emails, and loyalty program data were exposed. The breach led to estimated disruption costs of £206 million in revenue, operational reviews and increased scrutiny of third-party contractors to prevent future incidents.

5. Farmers Insurance -May 2025

Overview

Farmers Insurance, a large U.S. multiline insurer offering auto, home, and other policies, was hit when a third-party vendor’s database was breached. An unauthorized actor accessed the vendor’s systems storing Farmers’ customer records.

Impact

Personal data of 1.07 million customers (names, addresses, dates of birth, driver’s license numbers, and last four digits of Social Security numbers) was exposed. Farmers Insurance began notifying affected individuals and offered 24-month free identity monitoring and credit protection services.

6. Cox Enterprises – June 2025

Overview

Cox Enterprises, a U.S. based media and communications company, was affected by a breach stemming from a third-party system. Attackers exploited the vendor to gain access to enterprise data.

Impact

Sensitive business data was exposed, though customer financial information remained safe. The incident highlighted risks in relying on vendors without thoroughly assessing their security posture. Cox has also offered 24 months of free credit monitoring and identity theft protection to affected victims.

 

7. Qantas Airways – July 2025

Overview

Quantas, Australia’s largest airline and flag carrier, operating domestic and international passenger and cargo services was breached earlier in 2025 via a third party. A third-party customer service platform integrated with their systems was breached.

Impact

Cybercriminals used the exploited vendor environment to extract over 6 million customer records, including personal data.

While no sensitive financial data was stolen, the financial toll still spirals due to regulatory and reputation fallout. Under Australia’s Privacy Act, Qantas could face fines of up to A$50 million or 30% of a company’s adjusted turnover during the period of the breach – whichever is greater.

8. Allianz Life Insurance – July 2025

Overview

Allianz Life, a U.S.-based life insurance and annuity provider owned by Allianz SE, experienced a breach via a cloud-based CRM vendor. Hackers exploited social engineering weaknesses to access sensitive customer information.

Impact

Approximately 1.4 million U.S. customers were affected. Although no financial account data was stolen, personal identifiers and policy-related data were exposed, triggering regulatory notifications and identity-theft protection measures.

 

9. TransUnion – August 2025

Overview

TransUnion, one of the largest U.S. credit reporting agencies, suffered a breach when a third-party application used in its U.S. consumer support operations was compromised. However, the breach did not target TransUnion’s core credit database directly.

Impact

Personal information of approximately 4.4 million customers was exposed (names, addresses, dates of birth, driver’s license numbers, and last four digits of Social Security numbers). The company notified affected individuals and is offering 24 months of free credit monitoring and identity theft protection.

 

10. Comcast – November 2025

Overview

Comcast, a U.S.-based telecommunications and media company, experienced a breach through a third-party vendor. The compromise involved unauthorized access to customer service and operational systems.

Impact

Comcast paid a $1.5 million fine and launched an extensive remediation effort, including third-party vendor audits and enhanced monitoring for future breaches.

Conclusion

The biggest lesson from 2025 is that many cyber breaches now start with third parties. Most incidents stemmed from gaps in vendor oversight, weak access controls, limited visibility, or inadequate monitoring. Strengthening vendor assessments, validating security controls, and maintaining real-time visibility across your value chain are now critical to preventing incidents and protecting your operations, customers, and reputation. Knowing who your vendors are, what data they hold, and how they safeguard it can make a major difference in preventing future breaches.

Test your organization’s third-party cyber risk maturity

We’ve built a 2-minute Third-Party Cyber Maturity quiz to help to identify exposure and benchmark your organization against leading industry standards.

👉 Take the quiz now

Sign-up now for the latest industry news, straight to your inbox.
Share via
Copy link
Powered by Social Snap