Hello and welcome back to The Breach Report!

October kept the pressure on. From airlines to delivery platforms, universities to retail chains — attackers again homed in on weak vendor links, credential misuse, and third-party system exposure.

The recurring themes? Social-engineered vendor access, SaaS/data-platform misuse, and unsecured backend systems.

Follow along and subscribe to stay ahead of the latest cyber threat and data breach developments.

🚨 Top 7 Data Breaches of October 2025

1. Qantas Airways / Third-Party Contact Centre (Canada/Australia/Global)

  • What happened: A third-party customer-service platform used by Qantas suffered a compromise; data of roughly 5 million customers was leaked.

  • Impact: Names, email addresses, frequent flyer numbers, phone numbers and dates of birth exposed. No payment or passport data disclosed.

  • Lesson: Even well-known airline brands can be derailed via vendor platforms — your customer-service or contact-centre provider is a high-risk vector.

  • Source: Read More

2. DoorDash (USA / Canada)

  • What happened: On October 25, DoorDash discovered a social-engineering attack on an employee that resulted in exposure of user, merchant and “Dasher” contact information.

  • Impact: Names, addresses, email addresses and phone numbers were accessed. No SSNs, payment card numbers or government IDs confirmed.

  • Lesson: Social engineering remains a potent tactic — even when core systems haven’t been breached, perimeter access via staff remains a critical weakness.

  • Source: Read More

3. Toys "R" Us Canada Retail Data Exposure (Canada)

  • What happened: Attackers published customer records from the retailer’s backend database. The incident dates to late July but was confirmed in October.

  • Impact: Names, email addresses, physical addresses and phone numbers leaked. No payment card or password data reported.

  • Lesson: Retail chains with large customer bases remain lucrative targets — even seemingly “low-risk” PII without payment data can fuel phishing and identity fraud.

  • Source: Read More

4. Municipal / Local Government Cyber Disruptions (USA)

  • What happened: Multiple U.S. counties (e.g., in Texas, Tennessee, Indiana) suffered cyber incidents in October that disabled service portals, login systems and network access.

  • Impact: While confirmed data theft is minimal, critical citizen services were disrupted (payments, courts, tax portals).

  • Lesson: The public-sector threat is increasingly about availability and disruption, not only exfiltration — consider service resilience as part of your breach preparedness.

  • Source: Read More

5. Western Sydney University (Australia/Global)

  • What happened: A breach in the student-management system (cloud-hosted) via third-party upstream provider resulted in extensive data theft.

  • Impact: Names, dates of birth, passport and visa details, disability/health records, bank account numbers — extremely sensitive data extracted.

  • Lesson: Universities (and by extension academic institutions in North America) remain high-risk — complex vendor chains increase attack surface.

  • Source: Read More

6. Developer Supply-Chain Attack – “GlassWorm” in VS Code Extensions

  • What happened: Malicious extensions for Visual Studio Code were deployed and downloaded 35,000+ times, enabling credential theft and remote-access propagation.

  • Impact: Developer toolchains compromised, source credentials and CI/CD access risked — broad implications for organizations relying on open-source ecosystems.

  • Lesson: Your “internal” dev tools may be an external risk vector — supply-chain attacks transcend SaaS access and include developer workflows.

  • Source: Read More

7. Credential / Infostealer Leak – 183 Million Email Accounts (Global, including U.S.)

  • What happened: A large cache of email accounts (including Gmail users) and passwords identified via an infostealer malware campaign that operated quietly for months.

  • Impact: Credentials harvested enable phishing, account take-over, lateral movement; the underpinning threat to enterprise identity posture is significant.

  • Lesson: Credential hygiene, MFA enforcement and monitoring of exposed logins remain foundational. A breach of identity is a breach of access.

  • Source: Read More

🖥️ Industry Highlights: What’s in the Hot Seat

  • Vendor / third-party intrusion remains one of the most leveraged vectors (Qantas, Toys “R” Us, municipal governments).

  • Credential & social-engineering attacks continue to drive breaches even when technical perimeter defences are intact (DoorDash, email infostealer).

  • Developer & toolchain supply-chain attacks are ascending — GlassWorm is a cautionary tale for DevSecOps.

  • Availability/disruption in public sector is as serious as data theft — local governments impacted functionality, not only data.

🛡️ Pro Tips & Tools

  • Enforce vendor access review — treat every third-party link as a potential attacker path.

  • Mandate MFA + passkey implementations + identity-threat monitoring — credentials are still a primary target.

  • Segment development environments and restrict extension installs; apply inventory and version controls to dev-tool chains.

  • Build service-resilience playbooks for non-data breaches — offline payment alternatives, immutable backups, alternate login channels.

  • Monitor dark-web and infostealer feeds for credential exposures linked to your domains — early detection can head off lateral infiltration.

⚠️ Emerging Threats to Watch

  • Toolchain compromise — both developer and operational tools are being weaponised.

  • Credential-leak commoditisation — large volumes of exposed logins feed phishing and account-takeover campaigns.

  • Vendor ecosystem cascade failures — one compromised supplier can ripple through multiple industries.

  • Public-sector disruption incidents — not just data theft, but service denial is on the rise.

💡 Final Thoughts

October reinforced a truth: It’s not only what you protect internally, but who you grant access, and how you manage identity and toolchain trust.

From major airlines to delivery apps, retail chains to dev-environments, the path of least resistance is rarely the firewall — it’s the person, the token, or the vendor system. Defending your perimeter is no longer sufficient — you must lock down every integration, every identity channel, and every critical service link.

Stay vigilant, stay proactive, and we’ll bring you the November report next month.



Keep Reading

No posts found