Tuesday, February 18, 2025
HomeSecurity NewsHackers may have Stolen 90,000 Customers Personal Data from Canadian Banks

Hackers may have Stolen 90,000 Customers Personal Data from Canadian Banks

Published on

SIEM as a Service

Follow Us on Google News

Hackers possibly have stolen 90,000 customers personal Data from two Canadian banks Bank of Montreal (BMO.TO) and Canadian Imperial Bank of Commerce (CM.TO).

The banks warned customers on Monday that they have been targeted by hackers and thousands of records customers personal information has been stolen.

BMO.TO was contacted by hackers on Sunday and they claimed to have personal data of a number of clients. Bank of Montreal spokesman Paul Gammal said “they believe had stolen data on up to 50,000 of the bank’s customers.”

CIBC-owned Simplii Financial warned by hackers claiming to have personal data of 40,000 customers, and after an initial investigation, CIBC was the first one to warn about the incident.

The fraudsters had threatened to make the data public, the spokesman said, adding that the bank was working with the authorities and conducting a thorough investigation. Reuters reported.

Also Read Hackers Empty Target Bank Accounts Using Innovative BackSwap Malware

Simplii not yet confirmed the data breach, the investigation still in progress and it continues to notify affected clients “through all channels” if it is determined they have been compromised.

We feel that it is important to inform clients so that they can also take additional steps to safeguard their information Michael Martin, senior vice-president of Simplii Financial said.

two Canadian banks

We took steps immediately when the incident occurred and we are confident that exposures identified related to customer data have been closed off. We have notified and are working with relevant authorities as we continue to assess the situation,” BMO said in a statement.

two Canadian banks

Other major Canadian banks were not affected by the incident, BMO said the hackers appear to be operating outside of Canada.

“Someone claiming to have the stolen data sent a letter to media outlets across Canada later in the day. The email ended with a sample of the information in question: the names, dates of birth, SIN and account balances of an Ontario man and a woman living in B.C.” reported CBC.

CIBC said, “if any of the clients is a victim of fraud because of this issue, we will return 100 percent of the money lost from the affected bank account.”

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Highly Obfuscated .NET sectopRAT Mimic as Chrome Extension

SectopRAT, also known as Arechclient2, is a sophisticated Remote Access Trojan (RAT) developed using...

Threat Actors Trojanize Popular Games to Evade Security and Infect Systems

A sophisticated malware campaign was launched by cybercriminals, targeting users through trojanized versions of...

New Research Aims to Strengthen MITRE ATT&CK for Evolving Cyber Threats

A recent study by researchers from the National University of Singapore and NCS Cyber...

New LLM Vulnerability Exposes AI Models Like ChatGPT to Exploitation

A significant vulnerability has been identified in large language models (LLMs) such as ChatGPT,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Threat Actors Trojanize Popular Games to Evade Security and Infect Systems

A sophisticated malware campaign was launched by cybercriminals, targeting users through trojanized versions of...

New FUD Malware Targets MacOS, Evading Antivirus and Security Tools

A new strain of Fully Undetectable (FUD) macOS malware, dubbed "Tiny FUD," has emerged,...

Google Blocks 2.28 Million Malicious Apps from Play Store in Security Crackdown

In a continued commitment to enhancing user safety and trust, Google has outlined significant...