- Exzec Cyber Newsletter
- Posts
- Hacktivist Surge, Ransom Reality, and Privacy in the Hot Seat
Hacktivist Surge, Ransom Reality, and Privacy in the Hot Seat
ICS sabotage, $4.5M ransomware averages, and why TikTok and OnStar are under fire
In Q2 2025, hacktivist attacks on critical infrastructure rose 150%, with most targeting industrial control systems.
📬 This Week’s Clickables
🚨 Major Breaches & Incidents — Retail cyber arrests, McDonald’s AI lea
🌐 Hacktivism & Ransomware Trends — ICS attacks surge, ransomware hits 72% of CISOs
🕵️ Privacy Watch — GM/OnStar lawsuit, TikTok EU probe, Chat scanning push
🛡️ Emerging Threats & Vulnerabilities — CitrixBleed 2 exploit, critical system gaps
🏢 Government & Corporate Hacks — Louis Vuitton leak, SolarWinds settlement
🧭 Mitigation & Best Practices — Actionable insights by threat type

🚨 Major Breaches & Incidents
Four Arrested in £300M+ Retail Cyber Heist
UK police arrested four suspects (aged 19–20) linked to cyberattacks on M&S, Co‑op, and Harrods. Investigators cite Scattered Spider-style tactics. M&S suffered a 7-week disruption.
👉 Young threat actors, massive impact—expect more hybrid crews.McDonald’s AI Tool Leaked 64M Applications
An AI-driven hiring platform used by McDonald's left 64 million job applications exposed due to default credentials.
👉 Automation without authentication = massive leak risk.
🌐 Hacktivism & Ransomware Trends
Hacktivists Shift from DDoS to ICS Attacks
Z‑Pentest and other groups ramped up industrial attacks—38 ICS intrusions in Q2, a 150% jump.
👉 Expect blurred lines between activists and state-aligned APTs.72% of CISOs Report Ransomware Hits
A major survey reveals ransomware hit nearly 3 in 4 orgs, with an average cost of $4.5M per incident. 51% still pay the ransom.
👉 Paying isn’t strategy—it’s risk deferral.
🕵️ Privacy Watch
GM/OnStar Sued for Selling Driver Data
Nebraska's AG says GM sold precise driving behavior (location, speed, seatbelt use) to insurers, leading to rate hikes.
👉 Consent isn’t optional when it hits your wallet.TikTok Faces Renewed EU Privacy Scrutiny
Ireland’s DPC has reopened GDPR investigations into TikTok over cross-border transfers to China—again.
👉 TikTok’s global trust deficit keeps growing.EU Plans to Scan Encrypted Chats by October
A proposed EU law would require message scanning—including end-to-end encrypted platforms—to fight CSAM.
👉 A privacy vs. safety showdown is coming.
Get access to the most exclusive offers for private market investors
Looking to invest in real estate, private credit, pre-IPO venture or crypto? AIR Insiders get exclusive offers and perks from leading private market investing tools and platforms, like:
Up to $250 free from Percent
50% off tax and retirement planning from Carry
$50 of free stock from Public
A free subscription to Worth Magazine
$1000 off an annual subscription to DealSheet
and offers from CapitalPad, Groundfloor, Fundrise, Mogul, and more.
Just sign up for our 2-week free trial to experience all the benefits of being an AIR Insider.
🛡️ Emerging Risks & Warnings
CitrixBleed 2 Actively Exploited Against U.S. Gov
CISA confirmed active exploitation of a second CitrixBleed flaw—used to compromise multiple federal environments. Patch now.
👉 Assume compromise if unpatched since June.
🏢 Government & Corporate Hacks
Louis Vuitton UK Customer Data Leaked
Personal info (name, email, purchase history) of UK shoppers was leaked. This is the third LVMH breach in three months.
👉 Luxury retail = soft target with high-margin data.SEC–SolarWinds Settlement Paused for Review
SEC tentatively settled its lawsuit with SolarWinds and its CISO over the 2020 breach, halting the case until September.
👉 Legal precedent: CISOs are now legally exposed.
🧭 Mitigation & Best Practices
Retail Attacks: Limit vendor platform access; simulate lateral movement.
AI/HR Platforms: Apply strict identity enforcement; default credentials = red flag.
ICS Threats: Segment OT; monitor for scanning or brute attempts.
Ransomware: Build encrypted, offline backups; stop paying—start planning.
CitrixBleed 2: Patch immediately and verify endpoint integrity.
Luxury Retail: Monitor for fraudulent marketing and phishing.
Privacy Compliance: Reevaluate location and behavioral data flows.
Thanks for reading this week’s edition. Like what you see? Forward it!
Hate everything you see or have other feedback? Reply back to this email!