Monday, March 4, 2024

JP Morgan Chase Affected with Internal “glitch” and Customers Bank Account shows others Account Information

Multiple customers of JP Morgan Chase reported unusual activities in bank account login due to internal glitch and it shows another persons account information when the user logged in their own account.

JPMorgan Chase & Co. is a leading global financial services firm and one of the largest banking institutions in the United States and worldwide operation, with US$2.5 trillion in assets under management and US$28 trillion in assets under custody and administration.

This Unusual incident happened Wednesday evening and a limited number of the customer were affected and account activities have occurred around  6:30 pm and 9 pm ET, during the time while Customers logged in to chase.com could see someone else’s account details.

Chase has acknowledged this incident and still the investigation is undergoing regards the account changes.

Also Read:  Zero Day Attack Prevention: A Fundamental Pillar of Security

Chase confirms that it was caused by an internal “glitch” and did not involve any kind of hacking attempt or cyber attack.

JP Morgan Chase director of communications Trish Wexler said,“We know for sure the glitch was on our end, not from a malicious actor,” noting that Chase is still trying to determine how many customers may have been affected. and he confirms that, this unusual incident 100 percent not the result of anything malicious.

A customer of Chase,  Fly & Dine, revealed the account mix-up was documented, Fly & Dine included screenshots of one of their writer’s spouses logged into the account of a fellow Chase customer with an Amazon and Chase card and a balance of more than $16,000.

Chase confirms that,  incident affecting both mobile device and Web browser users. and they are through Tweets from customers and making sure that if anyone is calling us with issues we’re working one on one with customers. If you see the suspicious activity you should give us a call.” Chase official said.

Website

Latest articles

US Court Orders NSO Group to Handover Code for Spyware, Pegasus to WhatsApp

Meta, the company that owns WhatsApp, filed a lawsuit against NSO Group in 2019....

New SSO-Based Phishing Attack Trick Users into Sharing Login Credentials  

Threat actors employ phishing scams to trick individuals into giving away important details like...

U.S. Charged Iranian Hacker, Rewards up to $10 Million

The United States Department of Justice (DoJ) has charged an Iranian national, Alireza Shafie...

Huge Surge in Ransomware-as-a-Service Attacks targeting Middle East & Africa

The Middle East and Africa (MEA) region has witnessed a surge in ransomware-as-a-service (RaaS)...

New Silver SAML Attack Let Attackers Forge Any SAML Response To Entra ID

SolarWinds cyberattack was one of the largest attacks of the century in which attackers...

AI Worm Developed by Researchers Spreads Automatically Between AI Agents

Researchers have developed what they claim to be one of the first generative AI...

20 Million+ Cutout.Pro User Records Leaked On Hacking Forums

CutOut.Pro, an AI-powered photo and video editing platform, has reportedly suffered a data breach,...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Live Account Takeover Attack Simulation

Live Account Take Over Attack

Live Webinar on How do hackers bypass 2FA ,Detecting ATO attacks, A demo of credential stuffing, brute force and session jacking-based ATO attacks, Identifying attacks with behaviour-based analysis and Building custom protection for applications and APIs.

Related Articles