• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
  • X
  • Facebook
  • YouTube
  • LinkedIn
Support
Screen Connect
Pay Online
SWK logo.

SWK Technologies

Software Solutions & Services

  • Accounting & ERP Software
      • Acumatica Cloud ERP
        • Overview
        • Construction
        • Distribution
        • Field Service
        • Financial Management
        • Manufacturing
        • Professional Services
        • Project Accounting
        • Retail-Commerce
      • Sage Intacct
        • Overview
        • Construction and Real Estate (CRE)
        • Distribution Operations for Sage Intacct
        • Financial Services
        • Healthcare
        • Manufacturing Operations for Sage Intacct
        • Nonprofits
        • Professional Services
        • Sage Intacct Payroll powered by ADP
      • Sage 100
        • Overview
        • Business Intelligence
        • Core Accounting & Financials
        • Distribution
        • Manufacturing
        • Payroll
        • Sage 100 Contractor
      • More Accounting Products
        • QuickBooks
        • Sage 50
        • Sage 300
        • Sage 500
        • Sage BusinessWorks
      • ERP Add-ons
        • ADP Workforce Now
        • Altec
        • Avalara
        • AvidXchange
        • BigCommerce
        • CIMCloud
        • Cloud Hosting
        • DataSelf
        • Fortis
        • FreightPOP
        • Microsoft 365
        • Netstock
        • Ottimate
        • Sage Fixed Assets
        • Sage HRMS
        • Sage Intacct Payroll powered by ADP
        • Savant WMS
        • Scanco
        • ScanForce
        • Solver
        • SPS Commerce
        • Velixo
        • Workforce Go!
      • More ERP Add-ons
        • Bizinsight
        • Concur
        • Crystal Reports
        • Fraxion
        • Fusion RMS
        • FYISoft
        • JobOps
        • KnowledgeSync
        • Lockstep Collect
        • Nectari
        • Pacejet
        • Planning Maestro
        • Sage CRM
        • Sage Intelligence
        • Scissortail HCM
        • Service Pro
        • ShipStation
        • Shopify
        • Starship
        • Sugar CRM
        • Time & Billing Pro
        • Timekeeper
        • True Sky
      • Industries
        • Construction
        • Distribution
        • Financial Services
        • Healthcare
        • Manufacturing
        • Nonprofit
        • Professional Services
        • Retail
  • Managed Cloud Services
      • Managed Services
        • IT Support
        • Cloud Hosting
        • Infrastructure-as-a-Service
        • Managed Cloud Services
        • vCIO
        • Acumatica Infrastructure
      • IT Solutions
        • Backup & Continuity
        • Cybersecurity
        • Email Hosting
        • Microsoft 365 Services
        • Virtualization
  • Consulting & Implementation
    • Business Technology Consulting
    • eCommerce
    • Financing
    • Human Capital Management
    • Managed Cloud & IT Services
    • Partner Program
    • Software Development
    • Software Implementation
  • Resources
    • Help Desk
    • Blog Posts
    • Payments Portal
    • Webinars
    • YouTube Channels
    • Acumatica Resources
    • Sage Intacct Resources
    • Sage 100 Resources
    • IT Resource Pages
  • About
    • About SWK
    • Awards & Recognition
    • Life@SWK
    • Careers
    • Success Stories
    • SWK Gives
  • Contact
    • Contact Us
    • Support
    • Our Locations

February 2025 Cybersecurity News Recap

February 20, 2025 by Hector

Home » Cybersecurity » February 2025 Cybersecurity News Recap

A stylized notebook or planner cover for 2025 in dark gray with beige and coral accents featuring abstract floral elements, with wooden letters spelling "FEBRUARY" arranged diagonally above it on a light gray surface.

As the second month of the year comes to close, cybersecurity news from February 2025 reflects how familiar patterns from 2024 are creating new trends when it comes to infosec (information security). This month’s Recap by SWK Technologies will cover new developments affecting AI security, more crypto scammer hacks, and the potential long-term impact of multiple lawsuits against Elon Musk and his team at the newly created DOGE (Department of Government Efficiency) for accessing the personal data of federal employees.

Hackers Sell Data Supposedly Leaked from ChatGPT & Other AI

Between January and February 2025, multiple user accounts posted on the popular hacker messaging board, BreachForums, offering to sell data they had extracted from different AI platforms – namely ChatGPT and one of its many alternatives, OmniGPT. In the latter case, the threat actor claimed to have chat and credential information from around 30,000 users, but in the former the hacker included over 20,000 million stolen access codes that could be used to log into OpenAI accounts. The good news is that investigations have turned up no evidence that any backdoor components were actually breached, but the bad news is that some researchers suspect that there may be legitimate credentials in the data dump that were obtained via a specific malware vector.

Cybersecurity firm KELA posted an explanation on their website about a particular type of malicious software referred to as “infostealers,” which hackers use to scrape valuable information over time from multiple sources and points of compromise. This malware powers an entire operational ecosystem of cybercrime, where the application developers sell access to hackers who then leverage it to infiltrate various systems and exfiltrate certain files they could exploit. Infostealer attacks have been around for a while, but there has been a clear pattern of growing proliferation in recent years, and this latest attack against ChatGPT indicates that it is not slowing down.

New Hacking Technique for Gemini from Google Found

A security researcher announced that he had discovered a potential exploit hackers could leverage against the Gemini AI chatbot by Google, and demonstrated its usage as proof of concept. This technique involves using a potential gap in the functionality of Large Language Models (LLMs) where they typically read all text entered into the chatbox as a “prompt,” which is essentially as a command by the user. This particular method, called a “delayed tool invocation,” can leverage this and the Google Workspace Extension to trick the artificial intelligence tool into extracting data from a user’s Google Drive file storage.

Similar potential exploits have been brought to Alphabet’s attention in the past, and they have implemented restrictions to the memory capabilities of Gemini to address these over time, but this current threat was dismissed in a statement as being “low probability” and “not a scalable, specific vector of abuse.” However, given the recent stories regarding the ChatGPT and OmniGPT hacks, it is clear that AI is increasingly becoming a target of hackers as they grow in popularity and usage. Users should be mindful of integrated systems and databases connecting to their LLM accounts, and enforce strict security controls over who has access to what.

SEC X / Twitter Account Hacked & Used for Fraudulent Bitcoin Post

An Alabama resident pleaded guilty to an identify theft conspiracy that hacked into the SEC’s (Securities and Exchange Commission) X (formerly known as Twitter) account and used it to falsely claim the agency had approved the trading of bitcoin EFTs (exchange-traded funds) in January 2024. Eric Council of Athens, Alabama was part of a group that used a “SIM swap” attack against a mobile device that had access to the SEC’s X profile after impersonating the owner at an AT&T store to receive a replacement SIM card on the same associated phone line. Council was able to generate password reset codes for the X account and passed these along to the co-conspirators who seemingly hired him for this venture and similar attacks, paying him approximately $50,000 for 6 months of SIM swapping.

The overall purpose of the hack is still hard to glean, especially given that the SEC ended up approving cryptocurrency ETF trading legitimately within a few days, but the rise in the price of bitcoin after the fraudulent post seems the most likely reason for lack of a clearer motive. There have been a growing number of various “crypto scams” either aimed at stealing digital currency (with over $90 million in losses reported by February 2025) or hijacking properties across different channels – mainly in social media, though – to promote or sell specific currencies. Various institutions and individuals have become victims of the latter case, such as Dean Norris of Breaking Bad fame, whose X account was similarly hacked to launch a “meme coin” in his name called $DEAN. The token managed to reach a market cap of over $8 million before Norris announced on Instagram that it was fake and he had been locked out of his X profile, all over the course of only a few days.

However, the SEC hack seems particularly brazen not only for who it targeted but also for how short-sighted its goals seemed. The searches found by investigators on Eric Council’s personal computer – which included several high-level queries like “how can I know for sure if I am being investigated by the FBI” – seem to indicate that he was not exactly an experienced cybercriminal, yet he was able to help breach a federal agency’s social media account and cause significant market manipulation with only a fake ID and a phone number. This may be a sign of a lower bar of entry into this type of cyber scam’s ecosystem, which would also mean these types of attacks may become more common and be used against a greater variety of targets.

Elon Musk & DOGE Sued Over Potential Data Breach

Elon Musk’s DOGE team are facing lawsuits from multiple groups, mainly unions representing affected federal employees and nonprofit groups concerned about the newly created department’s access to sensitive information in the course of ostensibly identifying wasteful spending from government agencies. What is critical about these suits is that the plaintiffs are portraying this as a major cyber breach owing to the unmitigated access by DOGE, many of whom have worked previously worked for Musk and reportedly lack any major certification or experience in their new roles. There has also been additional pushback from the judicial level as several state Attorneys General and the courts have blocked further access for DOGE to Treasury systems, which contain confidential data on federal payments and processing.

DOGE’s audits have dove into PII (personally identifiable information) of potentially millions of federal employees across over a dozen institutions, including the Office of Personnel Management (OPM), the Treasury Department, the Department of Labor, the Consumer Financial Protection Bureau (CFPB), the Department of the Navy, the Bureau of Prisons, the U.S. Army Corp of Engineers and the Department of Agriculture. Data accessed includes several sensitive details such as Social Security numbers, Medicare benefits, salaries and more, as well as many examples of classified information without the proper security clearance.

Politics aside, this situation may have unforeseen consequences for federal data security practices going forward, coming off the string of cyber incidents affecting government agencies in recent years. From the infamous SolarWinds hack to the SEC’s social media breach mentioned here, as well as a recent audit finding vulnerabilities in the U.S. Coast Guard’s cybersecurity protocols on top of the controversy with DOGE, the federal government may need to reevaluate inter-agency data access and controls from the top-down to adjust for the modern realities of the digital age.

Learn How to Strengthen Your Cybersecurity Strategy

The cybersecurity news cycle for February 2025 has highlighted how threats continue to evolve using old and new tactics, from sophisticated AI exploits to surprisingly simple social engineering attacks that can breach even federal-level systems. While navigating this complex landscape may seem daunting, SWK Technologies is ready to help you develop and execute an effective security strategy tailored to your needs.

Contact SWK here to learn more about strengthening your security posture and better prepare your business against modern cybersecurity challenges.

Contact SWK Here

Category: Cybersecurity, Blog, News and Events

Sidebar

Recent Posts

  • How a Recreational Play Structure Builder Laid the Groundwork for Their Lasting Growth
  • Why Financial Services Firms Need Phishing Defense
  • Acumatica General Ledger Training – Key Tips & Tricks
  • Sage Intacct vs. Sage 500: Best ERP for CFOs and Financial Leaders
  • What is the Relationship Between Cybersecurity and Cyber Insurance? 
  • Guide for Sage Intacct Credit Card Management
  • Minimize Tariff Impacts on Your Technology Costs in the Cloud

Categories

Ready to take the next step?

Contact SWK today to get in touch with one of our experts. We’ll go over your business challenges and unique needs, and see where you can unlock new value from your technology and make your operations run easier.

Get in touch!

Our Latest Posts

Recreational Play Structure

How a Recreational Play Structure Builder Laid the Groundwork for Their Lasting Growth

Read moreHow a Recreational Play Structure Builder Laid the Groundwork for Their Lasting Growth
Hands holding an open silver padlock over a laptop keyboard, symbolizing cybersecurity vulnerabilities that phishing attacks exploit in financial services firms

Why Financial Services Firms Need Phishing Defense

Read moreWhy Financial Services Firms Need Phishing Defense
Black laptop displaying Acumatica General Ledger journal transactions screen on a desk with coffee mug and notepad, showcasing the financial management interface on a computer in an office setting.

Acumatica General Ledger Training – Key Tips & Tricks

Read moreAcumatica General Ledger Training – Key Tips & Tricks

Awards and Accreditations

Top work places in NJ 2020.
Acumatica the Cloud ERP gold certified partner.
The Gold Microsoft partner logo on a black background.
Sage business partner diamond logo.
Dell Technologies Gold Partner
Sage tech partner logo.

Stay in the know!

Subscribe for exclusive ERP, process automation, IT and cybersecurity news.

Twitter
  • Facebook
  • YouTube
  • LinkedIn

Home
About
Contact

Support
Screen Connect
Pay Online
Downloads

SWK logo.

Headquarters:
120 Eagle Rock Ave, Suite 330
East Hanover, NJ 07936

Contact:
info@swktech.com
(877) 979-5462

Copyright © 2025 · SWK Technologies, Inc. · All Rights Reserved · Terms of Use · Privacy Policy

This site uses cookies to collect information about your browsing activities in order to provide you with more relevant content and promotional materials, and help us understand your interests and enhance the site. By continuing to browse this site you agree to the use of cookies. Visit our privacy policy to learn more.I understand