Friday, February 14, 2025
HomeCyber Security NewsCash App Data Breach - Over 8.2 Million Customers' Data Exposed

Cash App Data Breach – Over 8.2 Million Customers’ Data Exposed

Published on

SIEM as a Service

Follow Us on Google News

Block Inc, confirmed that they had a data breach which was due to a former employee. Cash App is one of the products developed by Block.

Cash App is a mobile application that can be used to transfer money between users. But this app is limited to the United Kingdom and the United States only. However, one of the former employees of Inc had access to many reports when he was working with Block.

Unfortunately, his access was not revoked by the IT department. This gave the employee a way to access many reports after he left the company. Block said that sensitive information was accessed without permission on December 10.

Block did not reveal the person’s name and his time of leaving the company. Following this, the company filed a report with the United States Security and Exchange Commission on April 4.

The report also stated that “While this employee had regular access to these reports as part of their past job responsibilities, in this instance these reports were accessed without permission after their employment ended”.

The breach consisted of information like the full names of users, brokerage account numbers, brokerage portfolio value, brokerage portfolio holdings, and stock trading activity. A specific count was not provided by Block. But they have contacted nearly 8.2 million people about the incident.

However, it did not contain sensitive or personally identifiable information which includes usernames, passwords, Social Security numbers, payment card information, or addresses.

Block has launched an internal investigation following this incident. Block also stated that “Upon discovery, we took steps to remediate this issue and launched an investigation with the help of a leading forensics firm. We know how these reports were accessed, and we have notified law enforcement. In addition, we continue to review and strengthen administrative and technical safeguards to protect information”.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

New Microsoft Windows GUI 0-Day Vulnerability Actively Exploited in the Wild

A newly discovered vulnerability in Microsoft Windows, identified by ClearSky Cyber Security, is reportedly...

Burp Suite Professional / Community 2025.2 Released With New Built-in AI Integration

PortSwigger has announced the release of Burp Suite Professional and Community Edition 2025.2, introducing...

Arbitrary File Upload Vulnerability in WordPress Plugin Let Attackers Hack 30,000 Website

A subgroup of the Russian state-sponsored hacking group Seashell Blizzard, also known as Sandworm,...

BadPilot Attacking Network Devices to Expand Russian Seashell Blizzard’s Attacks

A newly uncovered cyber campaign, dubbed "BadPilot," has been linked to a subgroup of...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

New Microsoft Windows GUI 0-Day Vulnerability Actively Exploited in the Wild

A newly discovered vulnerability in Microsoft Windows, identified by ClearSky Cyber Security, is reportedly...

Burp Suite Professional / Community 2025.2 Released With New Built-in AI Integration

PortSwigger has announced the release of Burp Suite Professional and Community Edition 2025.2, introducing...

Arbitrary File Upload Vulnerability in WordPress Plugin Let Attackers Hack 30,000 Website

A subgroup of the Russian state-sponsored hacking group Seashell Blizzard, also known as Sandworm,...