Threat Intelligence
Cyberattacks
Ransomware
Data Breach
Threat Intelligence
Incident Response
Change Healthcare
Snowflake
MOVEit
Deepfake

Major Cyberattacks of 2024–2025: Timeline, Impact & Lessons Learned

SCR Security Research Team
June 15, 2025
22 min read

Introduction


2024 and early 2025 have witnessed some of the most devastating cyberattacks in history. Total global cybercrime costs are projected to reach **$10.5 trillion annually by 2025** (Cybersecurity Ventures). This deep-dive analyzes the major incidents, their root causes, and actionable lessons for defenders.


---


Attack Timeline & Key Statistics


2024–2025 By The Numbers

  • **$4.88M** — Average data breach cost (up 10% from 2023)
  • **277 days** — Average time to identify and contain a breach
  • **2,365** — Reported cyberattacks in 2024 (up 72% from 2021)
  • **$75M** — Largest ransomware payment ever (Dark Angels, 2024)
  • **560M** — Records compromised in the Snowflake incident alone

  • ---


    Major Incidents


    1. Change Healthcare Ransomware (Feb 2024)

    **Attack Type:** Ransomware (ALPHV/BlackCat)

    **Impact:** $872 million in damages; 100M+ patient records compromised

    **Attack Vector:** Stolen credentials for a Citrix remote access portal without MFA


    **What Happened:**

  • Attackers used stolen credentials to access Change Healthcare's Citrix portal
  • **No multi-factor authentication** was enabled on the portal
  • ALPHV ransomware was deployed, encrypting critical healthcare systems
  • UnitedHealth Group paid a **$22 million ransom**
  • Attackers still leaked data; an affiliate demanded a second ransom

  • **Key Lessons:**

  • MFA is non-negotiable for all remote access
  • Network segmentation could have limited the blast radius
  • Healthcare organizations must prioritize cybersecurity investment
  • Paying ransoms doesn't guarantee data safety

  • ---


    2. Snowflake Customer Data Theft (May–June 2024)

    **Attack Type:** Credential stuffing / Data exfiltration

    **Impact:** 560M+ records across 165+ companies (Ticketmaster, AT&T, Santander)

    **Attack Vector:** Compromised credentials without MFA, stolen via infostealer malware


    **What Happened:**

  • Threat group UNC5537 used credentials stolen by infostealers (Vidar, RedLine)
  • Targeted Snowflake customer accounts that lacked MFA
  • Exfiltrated massive datasets from Ticketmaster (560M records), AT&T, Santander, and 160+ other companies
  • Attempted to sell data on dark web; demanded extortion payments

  • **Key Lessons:**

  • Enforce MFA on all SaaS platforms
  • Monitor for infostealer infections on corporate devices
  • Implement IP allowlisting for data platform access
  • Use network tokens and session management

  • ---


    3. MOVEit Transfer Aftermath & Cl0p Campaigns (2023–2024)

    **Attack Type:** Zero-day exploitation (SQL injection CVE-2023-34362)

    **Ongoing Impact:** 2,700+ organizations; 95M+ individuals affected

    **Cost:** Estimated $12 billion in total damages


    **What Happened:**

  • Cl0p ransomware group exploited a zero-day SQL injection in MOVEit Transfer
  • Mass exploitation affected government agencies, banks, universities, airlines
  • Throughout 2024, stolen data continued to surface on dark web
  • Copycat attacks against other file transfer solutions (GoAnywhere, Accellion)

  • **Key Lessons:**

  • File transfer solutions are high-value targets — audit them regularly
  • Zero-day vulnerabilities require defense-in-depth strategies
  • Segment file transfer systems from core networks
  • Monitor for anomalous data exfiltration patterns

  • ---


    4. Microsoft Executive Email Compromise (Jan 2024)

    **Attack Type:** Password spraying + OAuth token theft (Midnight Blizzard / APT29)

    **Impact:** Email accounts of senior leadership and cybersecurity teams accessed

    **Attack Vector:** Password spray on legacy test tenant → OAuth app abuse


    **What Happened:**

  • Russian state-sponsored group (Midnight Blizzard) password-sprayed a legacy test tenant
  • Gained access to an OAuth application with elevated permissions
  • Pivoted to read email of C-suite and security team members
  • Microsoft disclosed the breach publicly in January 2024

  • **Key Lessons:**

  • Decommission legacy/test accounts and tenants
  • Audit OAuth application permissions regularly
  • Nation-state actors target security teams specifically
  • Even tech giants are vulnerable

  • ---


    5. National Public Data Breach (Aug 2024)

    **Attack Type:** Data breach / unauthorized access

    **Impact:** 2.9 billion records; SSNs, names, addresses exposed

    **Attack Vector:** Unknown initial access; data sold on dark web for $3.5M


    **What Happened:**

  • Background check company National Public Data was breached
  • Hackers claimed to have 2.9 billion records
  • Data included Social Security numbers, full names, addresses dating back 30 years
  • Company faced multiple class-action lawsuits and eventually filed for bankruptcy

  • **Key Lessons:**

  • Data aggregators are critical supply chain risk
  • Minimize data collection and retention
  • Encrypt all PII at rest and in transit
  • Third-party risk management is essential

  • ---


    6. AI-Powered Deepfake Fraud (Feb 2024)

    **Attack Type:** Business Email Compromise via AI deepfake

    **Impact:** $25.6 million stolen from a Hong Kong finance firm

    **Attack Vector:** Deepfake video call impersonating CFO and executives


    **What Happened:**

  • Attackers used AI-generated deepfake video and voice
  • Conducted a video conference call impersonating the company's CFO
  • Employee was convinced to transfer $25.6 million across 15 transactions
  • Entirely AI-driven social engineering — no malware involved

  • **Key Lessons:**

  • AI-powered attacks are now operationally viable
  • Implement multi-person authorization for large transfers
  • Use code words or out-of-band verification
  • Train employees on deepfake awareness

  • ---


    Industry Impact Analysis


    Most Targeted Sectors (2024)

  • **Healthcare** — 32% of all breaches (HIPAA data = high value)
  • **Financial Services** — 21% (direct monetization)
  • **Government** — 16% (state-sponsored espionage)
  • **Technology** — 14% (supply chain attacks)
  • 5. **Education** — 9% (often under-resourced)

    6. **Retail/E-commerce** — 8% (payment card data)


    Breach Cost by Industry (2024)

  • Healthcare: **$9.77M** average breach cost
  • Financial: **$6.08M**
  • Technology: **$5.45M**
  • Energy: **$5.29M**
  • Overall average: **$4.88M**

  • ---


    Defensive Recommendations


    Immediate Actions

  • **Enforce MFA everywhere** — 2024 breaches overwhelmingly exploited missing MFA
  • **Audit third-party access** — SaaS platforms, file transfers, OAuth apps
  • **Patch critical vulnerabilities within 48 hours** — Especially internet-facing systems
  • **Implement EDR** — Detect infostealer malware before credentials are stolen
  • 5. **Test incident response plans** — Tabletop exercises quarterly


    Strategic Investments

  • **Zero Trust Architecture** — Identity-centric security model
  • **AI/ML threat detection** — Counter AI-powered attacks
  • **Supply chain security program** — SBOM, vendor assessments
  • **Continuous security validation** — Breach & attack simulation
  • 5. **Cyber insurance** — Ensure adequate coverage for ransomware scenarios


    ---


    Conclusion


    The attacks of 2024–2025 share common themes: **missing MFA, excessive permissions, unpatched systems, and inadequate monitoring**. Organizations that implement basic security hygiene — particularly MFA, least privilege, and rapid patching — can prevent the vast majority of breaches.


    **Related Resources on SecureCodeReviews:**

  • [Vulnerability Dashboard](/vulnerabilities) — Track vulnerability trends with interactive charts
  • [OWASP Top 10](/owasp/top-10) — Understand the most critical web application risks
  • [Cloud Security Guide](/blog/cloud-security-aws-azure-gcp) — Secure your cloud infrastructure
  • [Free Security Tools](/tools) — Test your security posture today