Key lessons from November’s data breaches

How your business can stay safe in December

November continues to be a reminder of how relentless cyber threats have become. From global corporations to local councils, attackers exploited vulnerabilities and caused significant disruption. Here are the key lessons we’ve learned and practical steps that your business can take right now to reduce risk.

What happened in November?

London Councils cyber attack

What happened:

  • On Nov 24–25, 2025, three London borough councils, Kensington & Chelsea, Westminster and Hammersmith & Fulham, were hit by a major cyber attack on their shared IT systems
  • The attack disrupted phone lines, online forms and critical services like housing and social care. Emergency plans were activated and systems were taken offline to prevent further damage
  • Investigations revealed data was accessed and copied, likely historical records. The councils notified the ICO and worked with the NCSC and law enforcement

Key lessons learned:

  • Shared infrastructure = shared risk: interconnected IT systems across councils amplified the impact
  • Legacy systems and underfunded IT teams remain a critical vulnerability in public sector organisations
  • Business continuity planning is essential: manual workarounds and prioritisation of critical services helped maintain support for vulnerable residents
  • Data protection and segmentation: stronger network segmentation and identity/access controls could have limited lateral movement
  • Public communication matters: councils issued regular updates to maintain trust and reduce panic

Ransomware surge

What happened:

  • Throughout November 17th – 23rd 200 ransomware victims globally in one week, which was part of a broader trend:
    • November saw 659 attacks, with manufacturing (+35%) and education (+24%) sectors hit hardest
    • Top ransomware gangs: Qilin (107 claims), Akira (100), Clop (94)
    • Clop exploited an Oracle zero-day, showing attackers’ reliance on vulnerabilities for initial access
  • Data theft dominated: Over 31,200 TB of data allegedly stolen in November alone

Key lessons learned:

  • Double extortion is standard: encryption is no longer the only indicator, silent data exfiltration often precedes detection
  • Patch management is critical: zero-day exploitation remains a top entry point
  • Sector-specific risk: manufacturing and healthcare remain prime targets due to operational sensitivity
  • Incident response maturity matters: organisations with strong backups and tested IR plans recover faster and avoid paying ransom

Under Armour ransomware attack

What happened:

  • Hackers claimed access to millions of personal records, targeting internal corporate systems
  • The breach caused operational disruption and reputational damage, highlighting the trend of data-theft-first ransomware attacks

Key lesson learnt:

  • Attackers now prioritise exfiltration over encryption:
    • Traditional ransomware defences focused on encryption are insufficient
    • Monitoring and anomaly detection (e.g. unusual data transfers, privilege escalation) is critical for early detection

Mixpanel breach impacting OpenAI customers

What happened:

  • Analytics provider Mixpanel suffered unauthorised access, exposing API customer metadata and user IDs
  • This incident shows how third-party risk can compromise even the most advanced tech ecosystems

Key lesson learnt:

  • Third-party risk management is essential:
    • Only use trusted vendors with strong security practices
    • Implement continuous vendor risk assessments and enforce compliance
    • CSG provides third-party vendor management to help businesses mitigate this risk

SitusAMC vendor breach affecting major banks

What happened:

  • A supply-chain attack exposed sensitive mortgage-related data linked to major banks like JPMorgan, Citi and Morgan Stanley
  • The FBI confirmed attackers focused on quiet data theft, not ransomware

Key lesson:

  • Vendor risk management is as critical as internal security:
    • Attackers increasingly exploit trusted partners to bypass strong internal defences
    • Continuous monitoring, contractual security requirements and incident response coordination with vendors are vital

Key lessons for businesses

  1. No one is too small to be targeted
    SMEs are prime targets because they often lack advanced defences
  2. Supply chain risks are real
    Your security is only as strong as your weakest vendor
  3. Human error is still the #1 threat
    Phishing and social engineering remain the easiest way in
  4. Incident response plans save businesses
    Companies with tested plans recover faster and minimise damage

What can you do in December?

CSG’s top 6 cyber security actions to protect your business before 2026:

  1. Enable Multi-Factor Authentication (MFA): add an extra layer of security to prevent credential theft
  2. Patch and update systems immediately: close known vulnerabilities, especially on VPNs and firewalls
  3. Review access controls: limit admin privileges and enforce least privilege principles
  4. Run a cyber awareness session with CSG: our team are happy to come down and educate your staff on phishing, social engineering and holiday-seasons scams. Arrange this today!
  5. Back up critical data securely: ensure backups are encrypted and stored offline or in a secure cloud
  6. Test your Incident Response Plan: run a tabletop exercise to confirm readiness

Looking Ahead: Prepare for 2026

Cyber threats are continuing to grow quickly, with AI-driven attacks, supply-chain exploits and identity-based threats will dominate in 2026. Staying informed and proactive is key.

Book your cyber security consultation with CSG today to assess your risk and strengthen your defences.

And don’t miss our end-of-year cyber security Webinar: “2026 Cyber Security Predictions”
Date: Tuesday 9th December | Time: 10:00 – 10:45am
Share this session with your team and start 2026 with confidence!

Register for the webinar.

Together, we can build a stronger, more resilient business community.

Explore our resources to see how we’ve supported businesses across the UK with disaster recovery.

Speak to an IT Specialist

To find out more or to talk to one of our experts, contact us today.