Workday Data Breach Exposes Contact Information on August 19, 2025

Photo of author

By Anza Malik

On August 19, 2025 Workday, a human capital and enterprise software company, revealed it had been the victim of a social engineering cyberattack. The attackers tricked workers by posing as HR and IT officials by calling and sending text messages, eventually gaining access to data kept in a third-party customer relationship management (CRM) platform.

workday data breach

Workday said that the leaked information was restricted to publicly available business contact information, including names, phone numbers, and email addresses. While no sensitive HR tenant data was breached, experts point out that even partial information is vulnerable to being used in phishing attacks and subsequent social engineering scams.

Workday said that it has moved rapidly to disable unauthorized access and has enhanced internal security measures.

What Happened during the Workday Breach

The Workday cyber attack originated from a sophisticated social engineering effort. Attackers impersonated HR or IT personnel and went after employees directly, securing some to surrender access credentials. With that access, attackers accessed Workday’s third-party CRM platform.

The compromised data was limited to business contact information. While not highly sensitive, it remains valuable to cybercriminals for further phishing attacks.

The event also made headlines following a report by TechCrunch which uncovered that Workday’s initial breach announcement blog had included a “noindex” tag that made the notification less likely to be visible in search engines. Although Workday removed the tag and subsequently notified customers and partners officially, the action elicited doubts regarding corporate breach disclosure transparency.

Quick Link: Verizon Outage in Keene, NH on Aug 13, 2025 Disrupts Service

Cybersecurity Risks and Lessons from the Workday Data Breach

The Workday August 2025 data breach showcases how social engineering continues to be the most perilous and effective means of cyberattacks. As opposed to technical exploits, these assaults take advantage of human trust and can, therefore, skirt even robust IT protections.

The main cybersecurity takeaways from this breach include:

  • Employee Awareness Training: Ongoing training to identify phishing, impersonation, and attempts at suspicious communications.
  • Multi-Factor Authentication (MFA): Introducing MFA on multiple platforms to render stolen credentials less potent.
  • Transparent Communication: Open, immediate disclosure fosters trust and enables customers to take protective measures.
  • Third-Party Risk Management: Assessing and securing external platforms and services tied to company systems.

Since companies rely more and more on cloud-based HR and CRM platforms, hardening defenses against human-directed attacks is as important as securing internal systems.

To explore more insights like this, visit our Cybersecurity page.

If you’re passionate about tech, networks, and digital infrastructure, Write for Us and share your voice with our audience.

FAQs

Was sensitive HR data exposed in the Workday breach?

Workday has validated that no customer tenant information was accessed. Only business contact information, including names, emails, and phone numbers, was compromised.

Why is social engineering a significant cybersecurity threat?

Because it takes advantage of human nature. Despite having robust technical controls, bad actors can social engineer employees into giving access away, and it’s one of the most difficult threats to mitigate.