As banks and credit unions complete their investigations of data breaches caused by a
Ransomware group Cl0p, which many security analysts characterize as an opportunistic threat actor seeking to profit from cybersecurity vulnerabilities, exploited a zero-day vulnerability in Progress Software's file transfer software starting around May 27 to steal information from, according to
At least three banks and credit unions specified that Cl0p stole customer data not because the institution itself used MoveIt but because a third-party vendor used MoveIt.
For example,
Instead, one of the credit union's third-party vendors (the Clearwater spokeswoman did not specify which) notified the credit union that it had been affected by a vulnerability in the file transfer software and, as a result of the incident, discontinued use of the MoveIt service.
"We received the documents acquired by the third party and determined that the documents contained personal information that included your name, Social Security number (last four digits), account number, email address, and phone number," Clearwater told customers in the June 30 letter. "This incident did not involve unauthorized access to any Clearwater systems."
Among the largest victims that threat actor Cl0p identified in the MoveIt breaches was Fidelity National Information Services, also known as FIS.
"FIS was one of many organizations impacted by a cybersecurity incident experienced by Progress Software and their MoveIt Transfer product," a spokesman for FIS said. "While the incident impacted a limited number of our clients, we are communicating with clients whose information was potentially involved. We are in regular contact with Progress Software and monitoring the situation closely. We will continue to take appropriate actions to protect our clients."
The FIS spokesman did not specify the number of clients affected, nor the total number of customers at those institutions who had their data compromised by the breach.
Ransomware gang Cl0p is currently threatening 50 companies with releasing data it stole from them late last month.
Another service provider, CU*Answers,
"Our review indicates that a small number of credit unions were affected by this vulnerability," reads a statement CU*Answers posted to its website. "We have reached out to these credit unions directly. Unless we spoke with your credit union CEO directly, your credit union was unaffected by this vulnerability."
Banks that do not directly use MoveIt also had their customers' data compromised in the attack. For example, a spokesperson for
The PlainsCapital spokeswoman did not name the fintech service provider.
Other confirmed victims
First Commonwealth Bank in Indiana, Pennsylvania, said in
Sunflower Bank, which is headquartered in Denver, said in
1st Source Bank in South Bend, Indiana, told 450,000 customers that their data, including Social Security numbers, were affected in the breach, according to
Sound Community Bank in Seattle, Washington, said in
City National Bank of Florida in Miami notified 36,306 customers that their information, including Social Security numbers, had been compromised, according to
First Merchants Bank in Muncie, Indiana, said in
Rockland Trust Bank told 14,806 customers that information compromised in a breach affecting the bank included financial account numbers or card numbers, according to
Umpqua Bank said in
Union Bank and Trust in Lincoln, Nebraska, told 204,291 customers that information including their Social Security numbers had been compromised in a breach, according to
Franklin Mint Federal Credit Union in Chadds Ford, Pennsylvania, told 140,963 consumers that their Social Security numbers had been compromised in a breach, according to
Quorum Federal Credit Union in Purchase, New York, told 17,054 consumers that their financial account numbers or card numbers had been compromised in a breach, according to
A spokeswoman for Cadence Bank in Tupelo, Mississippi, confirmed that the bank's instance of MoveIt had been compromised but that an investigation into the matter was ongoing. "If we find that any customer information has been impacted, we will notify those customers and disclose all the necessary information," she said.
Delisted and unconfirmed victims
Cl0p claimed to have compromised the data of multiple banks and credit unions that did not respond to requests by American Banker for comment and have not otherwise publicly reported breaches. Others that Cl0p listed as victims do not appear to have actually been compromised.
For example, a spokeswoman for East West Bank said that "no sensitive data had been compromised, nor was there any impact to our systems from the incident," to the bank's knowledge.
"This tool is used to transfer files for a very small number of commercial clients," the East West Bank spokeswoman said. "We immediately launched an investigation, implemented preventative security measures and eliminated the vulnerability."
Cl0p also listed HealthEquity, a fintech that provides health savings accounts, as a victim, but the company said in
Putnam Investments
Nine additional banks and credit unions are listed by Cl0p as victims, as well as one payments provider, but none have publicly acknowledged a breach.
As of Friday, the total number of consumers who had data compromised in a MoveIt breach exceeds 20 million,