US-based Flagstar Bank disclosed a data breach that impacted roughly 1.5 million individuals, but the company did not share details about the attack. The security breach took place in early December 2021, and the investigation that was concluded early this month confirmed that actors had access to files containing the personal information of 1.5 million individuals.
According to a data breach notification published by the financial institution, the attackers has access to the social security numbers of some of the impacted individuals. The company is notifying the affected individuals.
At this time, Flagstar Bank is not aware of any misuse of the exposed data, the good news for the impacted individuals is that the company provides them two years of free identity monitoring services.
This is the second time that Flagstar was the victim of a security breach, in March 2021 it was hit by Clop ransomware gang. In March 2021, Clop ransomware operators started switching to a new tactic to force victims into paying the ransom by emailing their customers and asking them to demand a ransom payment to protect their privacy.
The new technique aims at making the double-extortion tactic more efficient, crooks sent emails directly to victims’ customers found in documents stolen during the ransomware attack.
According to BleepingComputer, the first victim threatened with this new tactic was Flagstar Bank followed by the University of Colorado.
The hack resulted from the compromise of a file transfer service from Accellion that took place at the end of 2020. This security breach also impacted nearly 1.5 million customers of Flagstar.
Follow me on Twitter: @securityaffairs and Facebook
| [adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – hacking, Zyxel)
[adrotate banner=”5″]
[adrotate banner=”13″]
Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…
A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…
A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…
Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…
Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…
This website uses cookies.