OccuNX Privacy Advisory: Threat Dossier — Q4 2025
OccuNX Privacy Advisory Quarterly Threat Intelligence for Professional Services
Threat Dossier
Q4 2025 OCT — DEC 2025
Breach intelligence filtered for law firms, CPA practices & wealth managers occunx.com
739 Financial Services
Breaches
#1 targeted sector in 2025
478 Professional Services
Breaches
#3 targeted sector in 2025
Third-Party
Breach Rate
30% of breaches — double prior year
$60K CPA Firm
NY AG Penalty
For notification delay alone

Q4 2025 closed with professional services firms firmly in the crosshairs. Financial services led all sectors in reported breaches with 739 confirmed incidents, and professional services wasn't far behind at 478. The pattern isn't random — attackers aren't breaking down your front door. They're walking through your vendors'. Third-party vendor compromise was the defining attack vector of the quarter, with the Verizon 2025 Data Breach Investigations Report documenting a rate double that of the prior year. If you don't know which vendors touch your client data, you don't know your actual exposure.

"Attackers aren't breaking down your front door. They're walking through your vendors'."

01
Your Vendor Got Hit. Your Clients Got Exposed.

Third-party vendor attacks were the defining fault line of Q4 2025. The Verizon 2025 Data Breach Investigations Report found that 30% of all breaches involved a third party — double the prior year's figure. The model is consistent: compromise a trusted vendor, then use that relationship as a bridge into the actual target. Your firm never gets touched directly. Your client data walks out through your software vendor's back door.

What this means for your firm

Every compliance tool, document management platform, and e-signature vendor you use is a potential door into your clients' data. Do you know which of your vendors had an incident this quarter? Most firms don't. This is exactly what subprocessor mapping addresses.

02
Wealth Managers Targeted by Name.

The cybercrime group ShinyHunters ran a coordinated campaign against wealth management firms in Q4, hitting Mercer Advisors, Beacon Pointe Advisors, and Pathstone Family Office in rapid succession. Mercer refused to pay ransom on 5.7 million client records — including Social Security numbers and personal identifiers. The group published the stolen data. These are not opportunistic attacks. Threat actors specifically target firms holding HNW client data because those records command premium prices on criminal markets.

What this means for your firm

If your CRM, portfolio management software, or client portal hasn't been audited for subprocessor exposure, you're operating blind. HNW client data is a high-value, high-liquidity asset in criminal markets. Your clients chose you for discretion. A breach changes that relationship permanently.

03
A CPA Firm Paid $60,000 for a Year-and-a-Half Delay.

The New York AG settled with accounting firm Wojeski & Company after the firm took over a year to notify breach victims despite clear legal obligations to act promptly. A phishing email triggered the initial ransomware attack. Client Social Security numbers were stored unencrypted. Victims weren't notified until November 2024 — eighteen months later. The firm paid $60,000 in penalties and was required to overhaul its security practices entirely.

What this means for your firm

The fine isn't the real number. Client notifications, mandatory credit monitoring, reputational fallout, and class action exposure — that's where small firms get buried. Notification delay is its own separate liability event. Your engagement letter and incident response plan need to address this before you have an incident, not after.

04
Financial Data Vendors Are Cascading Risk Everywhere.

In December, 700Credit — a credit data provider used by dealerships, financial institutions, and lending partners — confirmed a breach affecting at least 5.6 million individuals, exposing Social Security numbers and financial account data across every downstream partner connected to its platform. The breach didn't originate at a bank or advisory firm. It originated at a vendor those institutions trusted with access to their data ecosystem.

What this means for your firm

You may not use 700Credit. But you probably use something structurally identical. Aggregator-style vendors sit at the center of massive data flows and most professional services firms have no idea these companies exist in their vendor chain — let alone that they're actively processing client data. This is the subprocessor problem in its purest form.

Regulatory Watch

In October 2025, the New York Department of Financial Services issued an Industry Letter clarifying how covered entities must manage cybersecurity risks from third-party service providers under its Cybersecurity Regulation (23 NYCRR Part 500), with additional amendments taking effect November 1, 2025. If you work with New York-based financial clients — or if you are a vendor to a covered entity — this directly implicates your vendor relationship documentation and security controls.

Bottom line: Your clients' regulators are now asking harder questions about their vendors. That means they will start asking harder questions about you.

The throughline of Q4 2025 isn't sophisticated hacking. It's misconfigured applications, weak third-party controls, and limited visibility into where sensitive data actually lives. None of those require enterprise security budgets to fix. They're systems design problems — and they're addressable at the small firm level with the right audit and remediation process.

If you don't know where your data goes after it leaves your office, this quarter should concern you.

A Business Privacy Audit starts with exactly that question.  ·   occunx.com