Workday Breach Joins a Growing Wave: Why the Second Half of 2025 is a Hacker’s Playground

Aug 25, 2025

blue polygon icon

The Workday breach is yet another reminder: the breach curve is rising, and the stakes are accelerating. Here's how to stay ahead.

Link to Linkedin
Sarah W. Frazier
This webinar will cover:
In this webinar:
See More
See more
Fill out the form and watch webinar
Oops! Something went wrong while submitting the form.
Register now and save your seat!
Registration successful!
Webinar link will be sent to your email soon
Oops! Something went wrong while submitting the form.
In this webinar:
See More
See more

It’s been a brutal summer for SaaS companies.

The Workday breach is just the latest headline. Before that, it was Google, then Cisco, Allianz Life, and Qantas. And summer isn't even over yet.

This latest wave of breaches usually starts with a phone call. A voice that sounds like IT, HR, or a trusted vendor. By the end of the day, customer data is quietly walking out the door. No zero-days. No sophisticated malware. No brute-force network exploit. Just people, trust, and SaaS.

The second half of 2025 is proving to be the most dangerous stretch of the year for exactly this reason.  Five different companies in five different industries, but the story is starting to sound eerily familiar: attackers aren’t breaching hardened infrastructure; they’re bypassing it entirely by exploiting human trust and SaaS connectivity.

The Second-Half Breach Surge

It’s not just anecdotal; there are measurable signals that attack activity climbs as the year winds down.  In Q3 2024, organizations saw a 75% year-over-year increase in cyberattack volume, averaging 1,876 attacks per week, making the closing months feel like constant combat. Similarly, in Australia, data breach reports jumped 25 % in the second half of 2024 compared to the first half, with more than 50% of incidents recorded in that window alone. There’s a familiar rhythm that makes the end of the year the most dangerous stretch.

The Pattern Caught in Motion

By midyear, researchers were already flagging the cyber attack trends. Unit 42 reported that social engineering now plays a role in over a third of major intrusions. In the second half, pressure mounts inside organizations: annual targets, budget deadlines, performance cycles. Security controls get easier to sidestep when everyone’s in a hurry or stressed, and attackers know it. That’s when the phishing emails spike, the vishing calls come harder, and malicious OAuth requests slip by more easily.  

Take Allianz Life. Attackers impersonated IT support and convinced staff to install what looked like a routine Salesforce Data Loader update. It wasn’t. Within hours, CRM data was quietly siphoned off. Qantas saw something similar: a third-party contact center was compromised through spoofed calls and SIM-swapping tactics, ultimately exposing records for 5.7 million travelers. Google wasn’t immune either. ShinyHunters, the same group suspected in multiple Salesforce-related incidents, used malicious OAuth apps to compromise a corporate CRM instance and exfiltrate business contact data before anyone noticed.

And now there’s Workday. Attackers targeted employees with a blend of voice phishing and SMS-based lures, tricking them into onboarding malicious OAuth apps or approving large-scale data exports. The breach didn’t touch customer tenants directly, but it’s part of the same campaign and a coordinated wave focused on SaaS applications and the people who use them.

Different companies. Different defenses. Same outcome. SaaS became the breach path.

quote about SaaS attacks in 2025

What's Under Attack

What ties these incidents together isn’t just the attackers’ persistence but their precision. They’ve learned where modern trust lives: in the invisible connections between SaaS tools, access, and identities. OAuth tokens and app-to-app integrations aren’t vulnerabilities in the traditional sense. They’re productivity hacks and staff conveniences, and attackers are weaponizing them.

Hackers are exploiting gaps in visibility.  

Many organizations can’t produce a complete inventory of SaaS apps in use, let alone track which ones have access to sensitive data. Unmanaged SaaS, rogue tenants, and overlooked integrations create blind spots — and attackers thrive in the dark.

Identity plays a role here, too.  

While none of these breaches have been tied to missing MFA controls, the pattern highlights why every SaaS app connected to your ecosystem should have MFA enabled and enforced. Employees must understand the risks of bypassing it, whether intentionally or not. Attackers know that’s where human behavior and technology diverge, and they exploit that friction relentlessly.

SaaS widens the blast radius.  

Attackers gain access through social engineering tactics, then move laterally through unmanaged SaaS and connected apps. Your SaaS perimeter isn’t defined by your own network anymore; it extends across every integrated app, tenant, and authorized connection your employees use daily.

SaaS is the route to compromise and trust is the lever.

From the Google, Cisco, Allianz Life, Qantas, and now Workday breaches, one thing about the second half of 2025 is painfully clear: SaaS has become the quickest route to compromise — and trust is the lever attackers are pulling hardest. Defending against this wave isn’t about more dashboards or noisy alerts; it’s about deep visibility into your SaaS ecosystem and responding instantly when user or app behaviors fall outside the norm. Knowing which SaaS apps are connected, what permissions they’ve been granted, and when something starts behaving unexpectedly has become critical. Real-time visibility into OAuth consent activity and the ability to surface rogue integrations before data moves can make all the difference. Equipping employees with the context to pause — even briefly — when “IT” or “HR” calls with an urgent request is increasingly part of the defense.

The Workday breach isn’t an isolated event; it’s another warning shot in a broader campaign aimed squarely at SaaS ecosystems. The question isn’t whether attackers will probe your perimeter — they already are. The real challenge is spotting and shutting them down before access turns into compromise.  

ITDR guide download

Thwarting the Breach Curve

Thwarting the breach curve takes more than knowing what’s out there; it requires the ability to act on what you see. That starts with uncovering every SaaS app — managed or unmanaged — and understanding who has access, what permissions they’ve granted, and access behaviors over time. The difference comes from being able to respond immediately when something deviates from the norm, before it becomes a data loss event.

That’s exactly where Grip Security comes in. Grip gives security teams continuous, unified visibility across all SaaS apps, identities, and connections — including shadow tenants and unmanaged apps hiding outside SSO. By mapping the full SaaS ecosystem and monitoring OAuth behaviors in real time, Grip empowers defenders to:

  • Detect unauthorized SaaS usage before attackers exploit it
  • Flag risky OAuth consents the moment they’re granted
  • Correlate abnormal user and app behaviors to stop breaches early
  • Contain incidents quickly with automated, policy-driven response

The second half of the year is always noisy. Deadlines stack up. Alerts multiply. Attackers know it and they thrive in the chaos. Grip helps teams cut through that noise by showing where SaaS risks live, which behaviors are suspicious, and when to act.  

The Workday breach is yet another reminder: the breach curve is rising, and the stakes are accelerating. The challenge is staying ahead of it. Grip makes it possible, revealing every SaaS connection, exposing identity risks, and enabling action before compromise happens. Book time with our team to see how Grip can help you thwart the breach curve.

Additional Resources

10 SaaS Security Risks Most Organizations Miss

Free Guide: Getting Started with Identity Threat Detection & Response (ITDR)

ITDR guide

The complete SaaS identity risk management solution.​

Uncover and secure shadow SaaS and rogue cloud accounts.
Prioritize SaaS risks for SSO integration.
Address SaaS identity risks promptly with 
policy-driven automation.
Consolidate redundant apps and unused licenses to lower SaaS costs.
Leverage your existing tools to include shadow SaaS.​

See Grip, the leading SaaS security platform, live:​