#WeeklyRoundup

Weekly Databreaches Roundup Week 48-2025

December 1, 2025
week48-2025

Weekly Databreaches Roundup Week 48-2025

OpenAI, Asahi, SitusAMC, Harvard University, Dartmouth College, Recent Links, Cox Enterprises, and Iberia.

Asahi

Aashi

Asahi, a major Japanese beer company, said a large cyber-attack in September may have exposed personal information from over 1.5 million customers, along with data from employees, their families, and business contacts. The ransomware attack disrupted factories, caused drink shortages, and forced staff to use pen and paper for orders. While only a small number of employee files are confirmed leaked, much more data may be at risk, though no credit card details were involved. The company is still restoring its systems, delaying financial results, and strengthening security, and says the impact is limited to its Japan operations.

OpenAI

OpenAI

OpenAI announced that some API customers’ personal details, including usernames, emails, user or organisation IDs, and basic browser and location data, were exposed after hackers breached Mixpanel, a third-party analytics service used by OpenAI. The company said its own systems were not hacked, and sensitive data such as passwords, API keys, chat data, payment details, or government IDs were not affected. Only users of the API platform, not regular ChatGPT users, were impacted. OpenAI has stopped using Mixpanel, is notifying affected users, and advises customers to watch out for phishing attempts and to enable multi-factor authentication for extra security.

SitusAMC

SitusAMC, a company that provides back-end mortgage and real-estate financing services for major banks, announced that a data breach earlier this month exposed some client information and possibly data belonging to their customers. The firm, which works with large institutions like Citi, Morgan Stanley, and JPMorgan Chase, said its systems were not hit by ransomware and its operations remain unaffected. The breach was detected on November 12, confirmed on November 15, and clients began receiving notifications soon after. The compromised data may include accounting records, legal agreements, and other corporate information, though the full number of affected customers is still unknown. SitusAMC says it is working with outside experts, updating clients directly, and continuing to investigate the scope of the attack.

Harvard University

Harvard University

Harvard University announced that its Alumni Affairs and Development systems were hacked through a voice-phishing scam, exposing personal information such as emails, phone numbers, addresses, donation details, and other biographical data for students, alumni, donors, parents, and some faculty and staff. The university said no Social Security numbers, passwords, or financial information were involved. Harvard quickly cut off the attacker’s access, notified affected individuals on November 22, and is working with law enforcement and cybersecurity experts to investigate. Officials warn people to watch for fake calls, texts, or emails pretending to be from Harvard. The number of those affected is still unknown, and the incident follows another recent breach involving a ransomware group claiming to have hacked Harvard, as well as similar attacks on Princeton and the University of Pennsylvania.

Dartmouth College

Dartmouth College

Dartmouth College revealed a data breach after the Clop extortion gang published files allegedly stolen from the school’s Oracle E-Business Suite servers. The attackers used a zero-day flaw to steal data between August 9 and 12, 2025, exposing names, Social Security numbers, and financial account information for at least 1,494 people, though the real number is likely higher. Dartmouth discovered the sensitive files on October 30 and has notified affected individuals, while broader details such as the ransom demand remain unknown. This breach is part of a larger Clop campaign targeting many organizations through the same Oracle vulnerability, with other victims including Harvard, The Washington Post, and American Airlines’ Envoy Air. It also follows a wave of separate voice-phishing attacks against several Ivy League schools.

Recent Links

Researchers found that more than 80,000 JSON files containing sensitive information were publicly accessible on the JSONFormatter and CodeBeautify websites because their “Recent Links” feature exposed user uploads with no protection. The leaked data included passwords, private keys, cloud credentials, API tokens, database access, and even sensitive information from government, banking, healthcare, and cybersecurity organizations. Some examples included AWS keys from a major financial exchange, Active Directory credentials from a security provider, and detailed configuration files from tech and government systems. Attackers were already trying to use exposed credentials, as shown by tests with fake keys. Although some organizations fixed their leaks after being warned, many did not, and the exposed pages remain publicly accessible, leaving a large amount of confidential data at risk.

Cox Enterprises

Cox Enterprises

Cox Enterprises is notifying nearly 9,500 people that their personal data was exposed after hackers broke into the company’s network by exploiting a zero-day flaw in Oracle’s E-Business Suite between August 9 and 14, 2025. The breach wasn’t detected until late September, and the Cl0p ransomware group has claimed responsibility, adding Cox to its leak site and publishing stolen data. Cox, a large U.S. company in telecommunications and automotive services, says the flaw was unknown until Oracle released a patch in October and that similar attacks have hit other major organizations. The company is offering affected individuals a year of free identity theft protection and credit monitoring, though it has not specified which types of data were exposed.

Iberia

Iberia, Spain’s largest airline, is warning customers that some of their personal information was exposed after a security breach at one of its suppliers. The leaked data may include names, email addresses, and loyalty card numbers, but no passwords or payment details were affected. Iberia says it activated its security protocols, added extra protections to customer accounts, and is working with authorities and the supplier to investigate. The notice comes shortly after a hacker claimed to be selling 77 GB of alleged Iberia data online, though it’s unclear whether that claim is related. The airline says there is no evidence of fraud so far but urges customers to watch for suspicious messages.

Discover more from Data Breach Insights

Subscribe now to keep reading and get access to the full archive.

Continue reading