Token Factory: The 5 Costliest US Breaches of 2025

2025’s priciest breaches weren’t “elite malware.” They were tokens + SaaS + downtime 🪙⏱️🔥 If your revoke MTTR is measured in days, the attackers already won.

Token Factory: The 5 Costliest US Breaches of 2025
The breach wasn’t the bill. Downtime was.

TL;DR

  • Identity-led intrusions into SaaS/cloud and MSPs drove the largest 2025 losses.
  • SEC 8-Ks and regulatory notices show nine-figure direct costs plus systemic ripple effects.
  • Downtime and token revocation delays materially amplified economic impact.
  • Vendor off-ramps, consent governance, and JIT admin separated resilient organizations from the rest.
  • Clear ATT&CK mapping highlights phishing, valid accounts, and data theft as common threads.

AlphaHunt

Stop doomscrolling, start decisioning. We chewed through the muck so your team doesn’t have to. → Subscribe!

Like this? Forward this to a friend!

(Have feedback? Did something resonate with you? Did something annoy you? Just hit reply! :))


Top Incidents Ranked by Estimated Economic Impact (USD)

Rank Organization Incident Window Estimated Impact (Downtime vs. Breach Costs) Primary Sources Corroboration
1 Ingram Micro 2025-07 $350M–$550M (downtime $250M–$400M; breach/IR $100M–$150M) SEC 8-K and press release TechCrunch reporting
2 Conduent (state services) 2025-01 → 2025-11 $150M–$300M (downtime $75M–$150M; breach $75M–$150M) TechCrunch coverage; breach cost disclosure HIPAA Journal estimate and follow-ups
3 Kettering Health 2025-05 $80M–$150M (downtime $50M–$90M; breach $30M–$60M) CNN report of system-wide outage Sector analyses and litigation summaries
4 UnitedHealth/Change Healthcare (2025 continuing costs) 2025-05–07 disclosures $50M–$100M incremental 2025 impacts (2024 breach residuals) NYT, Reuters on 2025 financial/operational effects Legal/industry analyses
5 Additional large US enterprise outages (2025, SEC-reported) 2025 $40M–$80M each (range) SEC 8-K filings Trade press corroboration

Notes: Ranges are derived from disclosed or reported operational outages, service restorations, and publicly stated/estimated breach-related expenses where available. Where precise figures are absent, we present a conservative, source-bounded bracket.