PlainsCapital Bank Data Breach Confirmed, 16M Users At Risk


PlainsCapital Bank, one of the largest independent banks in Texas and a subsidiary of Hilltop Holdings Inc, has confirmed a breach linked to the MOVEit data leak. Through this breach, the personal information of over 16 million individuals may be at risk. 

The Bank has released an update on its official website confirming the PlainsCapital Bank data breach, which has been exploited by hacker groups using the MOVEit vulnerability.

PlainsCapital Bank has been in close contact with customers, ensuring they are fully informed about the nature of the PlainsCapital Bank data breach and the proactive measures implemented to prevent unauthorized use of their personal information. 

PlainsCapital Bank data breach linked to MOVEit vulnerability

According to the company’s investigation, the compromised data from the PlainsCapital Bank data breach includes sensitive customer details such as social security and account numbers.

However, thus far indicates no identity theft, fraudulent activity, or unauthorized access to customer accounts has been detected.

“At this time, impacted PlainsCapital data appears to include customer social security and account numbers. Our investigation thus far suggests, however, that no such customer information has been improperly used to commit identity theft or fraud or access customer accounts”, says PlainsCapital Bank. 

As part of its ongoing commitment to customer protection, PlainsCapital Bank is maintaining vigilant monitoring procedures for any potential signs of misuse or unauthorized activity. Additionally, they have also urged its customers to take additional precautions against identity theft and fraud by adhering to security best practices. 

These measures include setting up account alerts to receive immediate notifications of suspicious activity, leveraging PlainsCapital’s debit card controls, monitoring credit reports for any irregularities, reviewing account statements for potentially unauthorized transactions, updating online and mobile banking passwords to enhance security, and blocking electronic access to personal social security numbers to minimize the risk of misuse.

If any fraudulent activity is detected, PlainsCapital Bank strongly advises reporting such incidents to the appropriate law enforcement authorities. By reporting such occurrences, individuals can contribute to a safer and more secure banking environment.

PlainsCapital Bank says that it is fully committed to the well-being of its customers and has devoted significant resources to rectifying the situation and preventing further breaches. 

MOVEIT vulnerability explained: More victims added to list

The notorious Clop ransomware group has actively exploited the Progress Software MOVEit vulnerability.

The threat actor has been stealing data, focusing on personally identifiable information (PII) extracted from the databases of unsuspecting customers.

The PlainsCapital Bank data breach is linked to the MOVEIT vulnerability attacks that was first brought to light in May 2023.

Dubbed CVE-2023-34362, the MOVEIT vulnerability has allegedly been exploited since approximately May 27, triggering a series of data breaches in the last 2 months.

Progress identified the vulnerability and offered a patch toward the end of May. Subsequently, other vulnerabilities were also identified, leading to advisories and updates.

The ransomware group set a deadline of June 14th for impacted companies to reach out to them. However, the mitigation didn’t go as planned, and 13 companies were listed on the group’s leak site.

Since then, several companies have fallen victim to the MOVEIT vulnerability.

Moreover, the group announced that if the ransom amount is not paid by June 21, the Clop ransomware group will add more victims to its leak site. 

The victim list, which continues to expand exponentially, leaves us pondering the extent of the attack’s reach. Some victims have publicly disclosed their involvement in the breach, while others have been brought to light by the Clop ransomware group. 

Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.





Source link