
The Identity Theft Resource Center (ITRC) reports a surge in U.S. data breaches in the first half of 2025, with financial services and healthcare most targeted. Learn how supply chain vulnerabilities, recycled credentials, and opaque breach reporting are shaping the evolving landscape of identity theft.
The Identity Theft Resource Center® (ITRC) released its H1 2025 Data Breach Report, revealing 1,732 U.S. data compromises—putting the year on pace to break records. Cyberattacks remain the leading cause, particularly in financial services and healthcare, while supply chain breaches and recycled credential abuse amplify the risk.
Key insights include:
• 1,348 cyberattack-related breaches, accounting for over 114.5 million victim notices.
• 69% of breaches lacked root-cause disclosure, continuing a concerning 5-year trend.
• Supply chain and physical attacks illustrate how single weak links can impact hundreds of organizations simultaneously.
The report underscores the growing complexity of identity theft, driven by targeted attacks, inadequate transparency, and evolving attacker tactics. Enterprises and individuals must adopt multi-layered defenses and proactive monitoring to mitigate these threats.

ITRC report shows record-breaking data breaches in H1 2025.
Identity theft remains a critical cyber risk, as attackers increasingly exploit data breaches, credential recycling, and supply chain vulnerabilities. In the first half of 2025, the ITRC tracked 1,732 data compromises, signaling an accelerating pace of identity crime in the U.S.
This report highlights three major trends shaping the landscape:
1. Targeted industry-specific attacks – Financial services and healthcare remain prime targets.
2. Credential reuse and recycling – Stolen login information continues to fuel phishing and fraud.
3. Opaque breach reporting – Most notices fail to clarify root causes, leaving organizations and individuals exposed.
These trends demonstrate that identity theft is not just about data loss, but about strategic exploitation of exposed information.

Reused credentials are fueling phishing and fraud campaigns.
What are the key drivers behind the acceleration of identity theft and data breaches in H1 2025, and how can organizations and individuals mitigate exposure to these evolving threats?

Identity theft is accelerating due to cyberattacks and data leaks.
The ITRC H1 2025 Data Breach Report provides a granular view of the first six months of the year:
• Total breaches: 1,732, roughly 5% ahead of the pace set in 2024.
• Victim notices: 165.7 million, reflecting only 12% of mid-year 2024 totals, suggesting large-scale breaches with partial reporting.
• Cyberattack-driven breaches: 1,348, accounting for 114.5 million victim notifications.
• Lack of root-cause transparency: 69% of breaches did not disclose the attack vector, continuing a concerning 5-year trend.
• Financial Services: 387 breaches, slightly down from 2024, but still a major concern due to the value of financial data.
• Healthcare: 283 breaches, increasing from the previous year, emphasizing the sensitivity of protected health information (PHI) and regulatory implications.
• Supply chain attacks: 79 incidents impacting 690 organizations, highlighting the ripple effect of third-party vulnerabilities.
• Physical breaches: 34 reported, surpassing the 33 total in 2024, indicating persistent threats beyond digital channels.
Attackers increasingly leverage recycled credentials from previous breaches to:
• Conduct phishing and spear-phishing campaigns.
• Execute credential stuffing attacks across multiple platforms.
• Launch financial fraud or account takeover attacks using exposed usernames and passwords.
The reuse of stolen credentials significantly amplifies the impact of each breach, as attackers can pivot across systems using previously compromised information.
Supply chain attacks have emerged as a critical threat vector:
• Breaches at vendors or third-party service providers can cascade across multiple organizations, as seen in 690 impacted entities.
• Weak access controls, unpatched systems, and inadequate vendor monitoring increase exposure.
• Effective mitigation requires vendor risk assessment, continuous monitoring, and contractual security requirements.
Cyberattacks dominate breaches in H1 2025, including:
• Phishing and social engineering to gain initial access.
• Malware and ransomware deployment, often targeting high-value records in healthcare and finance.
• Exploitation of unpatched software or misconfigured cloud environments to exfiltrate data.
These sophisticated attack chains demonstrate that modern identity theft is multi-dimensional, combining technical, human, and operational vulnerabilities.
The lack of root-cause disclosure in 69% of breaches raises multiple concerns:
• Organizations struggle to learn from incidents and improve defenses.
• Individuals are left uncertain about their exposure and how to remediate risk.
• Regulators face challenges in enforcing consistent reporting standards, limiting industry-wide visibility.
This underscores the need for standardized, detailed breach reporting to enhance awareness and proactive protection measures.
• Strengthen supply chain risk management through audits and monitoring.
• Implement multi-factor authentication and continuous access controls to mitigate credential-based attacks.
• Adopt data minimization and segmentation strategies to reduce the impact of breaches.
• Enhance incident response and transparency, ensuring root causes are documented and communicated.
• Monitor accounts for unusual activity.
• Avoid reusing passwords across platforms; adopt password managers.
• Stay vigilant against phishing attempts leveraging previously stolen credentials.
• Take advantage of resources from ITRC for guidance on remediation and identity protection.
The H1 2025 ITRC report highlights accelerating identity theft risks, emphasizing that attackers exploit both technical vulnerabilities and human behavior.
• Supply chain weaknesses can propagate breaches across industries.
• Credential recycling makes previously stolen data exponentially dangerous.
• Opaque breach reporting limits organizational learning and proactive defense.
Organizations must adopt holistic cybersecurity strategies, combining technological safeguards, employee awareness, vendor oversight, and transparent reporting.
Identity theft in 2025 is rapidly evolving, driven by cyberattacks, credential reuse, and supply chain vulnerabilities. The ITRC report underscores the urgency for enterprises and individuals to strengthen defenses, implement proactive monitoring, and adopt robust incident response plans.
Staying vigilant, verifying sources, and educating employees and users are essential steps in mitigating identity theft risks.
Protect your data and organization against identity theft. Subscribe to HacFy for in-depth threat intelligence, actionable strategies, and expert insights on defending against evolving data breaches, supply chain attacks, and credential exploitation.
Identity theft, data breaches, ITRC H1 2025, credential recycling, supply chain attacks, cybersecurity trends, financial services, healthcare, breach transparency, cyberattack mitigation
Include author name, title, and professional/social links.
• Identity Theft Resource Center, H1 2025 Data Breach Report
• HacFy Cybersecurity Research, 2025
• Industry reports on supply chain security and credential reuse
Identity theft is accelerating in 2025, fueled by large-scale data breaches and AI-driven synthetic identity fraud. Learn how stolen personal data is exploited, the risks for individuals and organizations, and practical strategies for prevention and protection.
Ransomware attacks are evolving: despite a drop in insurance claims, losses are soaring due to AI-powered phishing, double-extortion, and policy theft. Learn why sophistication, not volume, is the new threat driver—and how organizations can strengthen resilience.
From smart speakers to wearables, everyday IoT devices quietly collect sensitive personal data that cybercriminals can exploit. Learn how AI-powered phishing, default passwords, and cloud vulnerabilities turn your gadgets into gateways for identity theft — and how to protect yourself.