All News

Insight Partners Confirms Ransomware Data Breach

Insight Partners disclosed a ransomware-related breach that accessed its human resources systems and exfiltrated data from mid‑October 2024, with systems encrypted in January 2025. More than 12,600 people, including limited partners and employees, were notified. The firm has not disclosed whether attackers demanded ransom or what exact personal data was taken.

Published September 17, 2025 at 11:12 AM EDT in Cybersecurity

Insight Partners breach exposes thousands and raises urgent VC cybersecurity questions

Venture capital giant Insight Partners has confirmed a data breach tied to a social engineering intrusion that gave attackers access to the firm's human resources systems. The company says hackers first broke in around mid‑October 2024 and later exfiltrated data from its servers before beginning to encrypt systems on January 16, 2025 — behavior consistent with a ransomware campaign.

Official notifications filed with state attorneys general indicate the incident affects more than 12,600 people, including current and former employees and limited partners (LPs). Insight has previously acknowledged that stolen assets included information about certain funds, management companies, portfolio companies, and banking and tax records.

The firm has offered few details about whether the attackers issued an extortion demand or whether any payment was made. That silence leaves LPs and portfolio companies with unanswered questions about exposure, the scope of exfiltrated data, and the potential for secondary misuse of financial or tax records.

This is not the first time a VC firm has faced such an incident. Sequoia and Advanced Technology Ventures experienced breaches in 2021 that exposed LP information, demonstrating a recurring threat vector for the venture ecosystem: attackers target the sensitive investor and deal data that firms hold.

Why VCs and LPs are high‑value targets

Venture firms hold concentrated, high‑value data: limited partner identities, fund structures, banking details, tax forms, and portfolio company agreements. Attackers can monetize this information directly, leverage it for follow‑on fraud, or use it to pressure firms with reputational or regulatory threats.

Immediate actions for firms and affected stakeholders

  • Containment and preservation of forensic evidence
  • Engage independent incident response and forensic teams to determine scope and prevent further exfiltration
  • Notify regulators and affected parties promptly with clear, factual updates and remediation steps
  • Rotate credentials, enforce multi‑factor authentication, and isolate impacted systems

Longer term controls to reduce future risk

  • Segment HR and finance systems from investor-facing environments and apply least privilege access
  • Implement zero trust principles, immutable backups, and robust encryption for sensitive records
  • Run phishing simulations, tabletop incident exercises, and specific LP notification rehearsals

For LPs and portfolio companies, this incident is a reminder to validate the security posture of funds where you park capital. Ask about segmentation, logging and detection capabilities, breach insurance, and incident response playbooks — and demand timely, transparent communication when things go wrong.

Insight Partners manages more than $90 billion in assets and backs major tech and cybersecurity companies. That stature heightens the reputational and regulatory stakes of this breach and makes the incident a bellwether for the industry: if leading firms are targeted successfully, smaller firms may be more vulnerable.

What should executives do now? Prioritize tamper‑proof evidence collection, communicate clearly with stakeholders, and treat this as both a legal and operational emergency. Preparing for the next incident — through architecture changes, rigorous third‑party due diligence, and active tabletop exercises — is the pragmatic response.

QuarkyByte helps organizations in these exact scenarios by mapping risk across funds and business lines, simulating attacker pathways, and prioritizing high‑impact fixes. For venture firms and their LPs, we translate technical exposure into operational and regulatory steps that reduce window of exposure and speed recovery.

This story is developing. Insight Partners has not disclosed whether ransom demands were made or paid, and stakeholders should expect additional updates as forensic investigations conclude and regulatory filings are updated.

Keep Reading

View All
The Future of Business is AI

AI Tools Built for Agencies That Move Fast.

QuarkyByte can rapidly map which funds, LPs, and systems are exposed and prioritize containment, notifications, and forensic review. We work with VCs and portfolio companies to harden HR and finance systems, run tabletop ransomware drills, and model regulatory and reputational impact to reduce future risk.