Sunday, June 15, 2025
HomeCyber Security NewsBASHE Ransomware Allegedly Leaked ICICI Bank Customers Data

BASHE Ransomware Allegedly Leaked ICICI Bank Customers Data

Published on

SIEM as a Service

Follow Us on Google News

A major cyber threat looms over Indian financial giant ICICI Bank as the notorious BASHE ransomware group, also known as Eraleign (APT73), claims responsibility for a significant data breach.

The group has allegedly obtained sensitive customer information and set a ransom deadline for January 24, 2025.

The Claim

The revelation surfaced during independent research conducted on dark web forums, where BASHE published statements asserting they had breached ICICI Bank’s internal systems.

- Advertisement - Google News

According to the Cyber Security News report, the breach compromised a vast trove of private and financial customer data, potentially including personally identifiable information (PII), account details, and banking records.

ICICI Bank data breach
ICICI Bank data breach

Although the group has not specified the exact volume or nature of the data stolen, the claims have raised concerns about the security of one of India’s most prominent multinational financial institutions.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

ICICI Bank’s Response

As of now, ICICI Bank has not publicly acknowledged the breach or validated these claims. The organization has neither issued an official statement nor disclosed any incidents related to unauthorized access or ransomware attacks.

Without confirmation from the bank, the authenticity of BASHE’s claims remains uncertain.

ICICI Bank customers are advised to monitor their accounts vigilantly for any unauthorized transactions or suspicious activity.

leaked data
leaked data

Those concerned about data security should consider resetting passwords and enabling additional layers of protection, such as two-factor authentication (2FA), if not already implemented.

The BASHE ransomware group, operating under the alias Eraleign (APT73), has been among the most active and sophisticated cyber threat actors in recent years.

Known for targeting critical infrastructure, government institutions, and financial organizations worldwide, the group typically employs ransomware to encrypt sensitive files and demands hefty ransoms in exchange for decryption keys.

In this case, BASHE has reportedly issued a ransom deadline, suggesting that ICICI Bank must comply with their demands by January 24, 2025, to avoid the public release of compromised data.

The alleged breach and its implications are solely based on dark web research and unverified claims made by the BASHE group. Until ICICI Bank confirms or denies the incident, the information should be considered speculative.

This event raises serious questions about cybersecurity readiness in the financial sector, especially with ransomware attacks becoming more frequent and destructive.

Customers and financial institutions alike are reminded of the importance of staying vigilant against evolving cyber threats.

Integrating Application Security into Your CI/CD Workflows Using Jenkins & Jira -> Free Webinar

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Arsen, the cybersecurity startup known for defending organizations against social engineering threats, has announced...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...

Credential Abuse: 15-Min Attack Simulation

Credential Abuse Unmasked

Credential abuse is #1 attack vector in web and API breaches today (Verizon DBIR 2025). Join our live, 15-min attack simulation with Karthik Krishnamoorthy (CTO - Indusface) and Phani Deepak Akella (VP of Marketing - Indusface) to see hackers move from first probe to full account takeover.

Discussion points


Username & email enumeration – how a stray status-code reveals valid accounts.
Password spraying – low-and-slow guesses that evade basic lockouts.
Credential stuffing – lightning-fast reuse of breach combos at scale.
MFA / session-token bypass – sliding past second factors with stolen cookies.

More like this

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...