Welcome back to The Breach Report, your monthly digest of critical cybersecurity events and insights. Throughout February, cyber threats continued to escalate across industries, reinforcing the urgency of robust security strategies.

From healthcare breaches to government agency intrusions, this month’s incidents underscore the need for vigilance, proactive defense measures, and heightened awareness.

Top 7 Breaches & Cyberattacks of February 2025

1. Genea Fertility Clinic

  • How: Ransomware attack by Termite group, exposing 940.7GB of patient data.
  • Impact: Sensitive fertility treatment records leaked online.
  • Lessons: Highlights the vulnerability of healthcare data and the importance of advanced cybersecurity measures in medical institutions.
  • Source: Read More

2. Signal Messaging App

  • How: Phishing attack by Russian hackers targeting Signal users.
  • Impact: Attackers intercepted messages by linking compromised accounts to their own devices.
  • Lessons: Reinforces the need for multi-factor authentication and user vigilance against phishing attempts.
  • Source: Read More

3. IoT Data Breach

  • How: Breach exposing 2.7 billion records from IoT devices.
  • Impact: Massive data leak affecting smart home devices and industrial IoT infrastructure.
  • Lessons: Demonstrates the risks of unsecured IoT devices and the need for stronger encryption and firmware security.
  • Source: Read More

4. HCRG Care Group

  • How: Ransomware attack crippling healthcare services.
  • Impact: Disruptions in patient care and data integrity at multiple medical facilities.
  • Lessons: Reinforces the importance of proactive cybersecurity measures in healthcare systems.
  • Source: Read More

5. Pharmaceutical Lynx Ransomware Attack

  • How: The Lynx ransomware group launched a targeted attack against a major pharmaceutical company.
  • Impact: The attack disrupted supply chain operations and encrypted critical research data.
  • Lessons: Highlights the vulnerability of the pharmaceutical industry to cyber threats and the need for strong data protection measures.
  • Source: Read More

6. University of Oklahoma Data Leak

  • How: Suspicious cyber activity led to the exposure of personal information belonging to Oklahoma senators and university employees.
  • Impact: Sensitive personal and financial data were compromised, raising concerns over identity theft.
  • Lessons: Emphasizes the need for enhanced cybersecurity protocols in educational and government institutions.
  • Source: Read More

7. Zhong Stealer Malware Exploiting Zendesk

  • How: Cybercriminals leveraged the Zhong Stealer malware to exploit vulnerabilities in Zendesk, targeting fintech and cryptocurrency industries.
  • Impact: Attackers stole sensitive financial credentials and personal data from affected organizations.
  • Lessons: Reinforces the importance of securing cloud-based customer support platforms against cyber threats.
  • Source: Read More

Industry Spotlight

Healthcare & Pharmaceuticals

The healthcare and pharmaceutical industries continue to face increasing cyber threats, with attackers targeting critical infrastructure and sensitive patient data.

The ransomware attack on a major pharmaceutical company by the Lynx group and the breach at HCRG Care Group highlight the sector’s vulnerability to both data theft and operational disruptions.

These incidents emphasize the urgent need for stronger cybersecurity measures, including advanced threat detection, robust third-party risk management, and employee cybersecurity training to safeguard patient and research data.

Emerging Threats to Watch

  • Deepfake Cyber Attacks: AI-generated deepfakes are being used for sophisticated scams and impersonation attacks.
  • Quantum Computing Threats: The advancement of quantum computing could render current encryption methods obsolete.
  • Credential Stuffing Attacks: Automated tools are increasingly used to exploit weak or reused passwords.

Regulatory Updates

  • FTC Data Protection Mandate: The Federal Trade Commission (FTC) has proposed stricter regulations on organizations handling consumer data.
  • EU AI Act: The European Union is moving forward with legislation addressing AI security risks.

Pro Tips and Tools

Implement Zero Trust Security: Never assume trust; always verify.

Use Hardware Security Keys: Prevent unauthorized access with physical authentication keys.

Conduct Regular Penetration Testing: Identify vulnerabilities before cybercriminals do.

Poll

What is your organization’s biggest cybersecurity challenge?

🔲 Insider Threats

🔲 Ransomware

🔲 Cloud Security

🔲 AI-Powered Cyber Threats

🔲 Other

Submit Your Answer Here.

February’s cyber events are a stark reminder that as technology evolves, so do the tactics of cybercriminals. From deeply personal healthcare data leaks to large-scale IoT breaches, the attacks we’ve seen this month span industries and expose critical vulnerabilities. Staying secure requires more than just awareness—it demands action.

At Everykey, we’re committed to helping you stay ahead with practical insights, tools, and updates in each edition of The Breach Report. Don’t forget to weigh in on this month’s poll, and we’ll see you next month with the latest in cybersecurity news and defense strategies. Until then—stay alert, stay prepared, and stay secure.

About Us

Everykey is on a mission to make cybersecurity easy and convenient.

Everykey delivers a proximity-based, frictionless, and touchless secure access platform. Offering passwordless authorization and multi-factor authentication, it seamlessly integrates with identity platforms to make secure access effortless. Everykey empowers IT leaders to adopt secure and employee-friendly zero-trust strategies.

🔗 Visit Our Website

🔗 Follow Us On LinkedIn

🔗 The Breach Report (Monthly Cyberattack Roundup)

📅 Schedule A Demo with our team

Get Started with Everykey

Looking for help? Get in touch with us

Data Visualization and Analytics Workspace

Share This Story, Choose Your Platform!