Wednesday, April 23, 2025
Homecyber securityHackers Claiming Access to Qatar National Bank Database

Hackers Claiming Access to Qatar National Bank Database

Published on

SIEM as a Service

Follow Us on Google News

A group of hackers has claimed to have accessed the database of Qatar National Bank (QNB), one of the largest financial institutions in the Middle East.

The announcement was made via a post on Twitter by the account MonThreat.

https://twitter.com/MonThreat/status/1793207645395976483

ANYRUN malware sandbox’s 8th Birthday Special Offer: Grab 6 Months of Free Service

- Advertisement - Google News

Details of the Breach

According to the post, the hackers allege they have obtained sensitive information, including customer data, financial records, and internal communications.

The exact scope of the breach remains unclear, but the hackers have threatened to release the data if their demands are unmet.

The post has since garnered significant attention, raising concerns about the security measures at QNB.

Qatar National Bank has yet to issue an official statement regarding the alleged breach.

However, sources within the bank indicate that an internal investigation is underway to assess the validity of the claims and the potential impact on customers.

Cybersecurity experts have been called in to assist with the investigation and to bolster the bank’s defenses against further attacks.

The potential breach has left many QNB customers worried about their personal and financial information safety.

Experts advise customers to monitor their accounts for any unusual activity and to change their passwords as a precautionary measure.

This incident is a stark reminder of the growing threat of cyberattacks on financial institutions and the importance of robust cybersecurity practices.

As the situation develops, customers and stakeholders will closely watch for updates from Qatar National Bank and cybersecurity authorities.

Free Webinar on Live API Attack Simulation: Book Your Seat | Start protecting your APIs from hackers

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network...

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted...

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into...

Cybercriminals Exploit Network Edge Devices to Infiltrate SMBs

Small and midsized businesses (SMBs) continue to be prime targets for cybercriminals, with network...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network...

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted...

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into...