
In late September 2025, Avnet, a global leader in electronic component distribution and supply chain solutions, confirmed a significant data breach that has sent ripples through the tech industry. The breach exposed parts of Avnet’s internal sales database and customer contact details specifically related to its EMEA (Europe, Middle East, and Africa) operations. While Avnet claims much of the stolen data is unreadable without proprietary tools, leaked samples on underground forums paint a different picture — raising concerns about exposed personally identifiable information (PII) and the growing risks facing technology supply chains.
What Happened?
On September 26, 2025, Avnet detected unauthorized access to an externally hosted cloud storage environment supporting an internal sales tool used in the EMEA region. The breach involved attackers stealing approximately 1.3 terabytes of compressed data, which could amount to 7 to 12 terabytes once uncompressed. This data included historical sales records, employee emails, customer contact lists, and other operational information.
Avnet responded promptly by rotating all credentials across its Azure and Databricks cloud environments to contain the breach and prevent further unauthorized activity. The company confirmed that its proprietary sales tool interface remained secure and that global operations were not disrupted.
Controversy Over Data Accessibility
Avnet insists that the stolen data is “mostly unreadable” without access to its proprietary sales tool. However, cybersecurity researchers and the threat actor themselves have released plaintext samples of the data on dark web leak sites. These samples include employee emails and customer contact information — details considered personally identifiable information (PII) that could be exploited for phishing, identity theft, or other malicious purposes.
Impact and Industry Implications
Although the breach is limited to a single system in the EMEA region, the implications extend far beyond. Avnet operates in 125 countries and serves a vast network of manufacturers, suppliers, and customers. A leak of this scale threatens supply chain trust and highlights vulnerabilities in cloud security practices, especially regarding misconfigurations and access controls.
The motive appears financially driven, with attackers using ransom threats accompanied by selective data leaks to pressure Avnet into payment. The presence and resale of Avnet’s data in underground marketplaces further complicate containment efforts and multiply the risk exposure.
Lessons for Enterprises
The Avnet breach underscores several critical lessons for organizations handling sensitive data in cloud environments:
- Credential and Access Management: Promptly rotate keys and credentials when a breach is detected, especially in multi-cloud setups.
- Data Encryption: Ensure sensitive data remains encrypted both at rest and in transit; relying solely on proprietary tools for data protection is insufficient.
- Dark Web Monitoring: Continuously scan underground forums for leaked data to enable early detection and response.
- Supply Chain Vigilance: Validate the cybersecurity posture of partners and suppliers, as breaches in third-party environments can cascade downstream.
- Incident Transparency: Clear, accurate communication about the scope and nature of a breach is essential to maintain trust and regulatory compliance.
What’s Next?
Avnet is cooperating with authorities and notifying affected customers and suppliers, though the full extent of impacted individuals remains unclear. This incident adds to the growing trend of cybercriminals favoring data exfiltration and extortion over system encryption. As cybercrime costs continue to rise globally, companies must bolster their defenses and preparedness to reduce the impact of such breaches.
The Avnet case is a stark reminder that no company is immune to cyber threats. Proactive security, rapid response, and continuous monitoring are indispensable in today’s digital landscape to safeguard valuable data and stakeholder trust.



