Santander has confirmed that there was a major data breach that affected its workers and customers in Spain, Uruguay, and Chile.
Concerns have been made about data security and privacy following the breach, which was found to have started with someone breaking into a database hosted by a third-party provider.
As soon as Santander learned about the breach, they took steps to control it.
ANYRUN malware sandbox’s 8th Birthday Special Offer: Grab 6 Months of Free Service
The bank prevented the unauthorized person from accessing the information and added more controls to prevent fraud to protect the affected customers.
A full investigation was started to determine how bad the breach was and to ensure that no one else could get in without permission.
Santander has told its customers that the hacked database did not hold any transactional data or credentials that would allow transactions to occur on accounts.
Among these are login information and passwords for online banking.
Customers can still safely do business with the bank because its processes and systems have not been affected.
The investigation showed that some information about Santander customers in Chile, Spain, and Uruguay, as well as information about all current and some past employees of the group, had been accessed.
On the other hand, all other Santander companies and markets did not lose any customer data in the breach.
Santander is sorry for any worry this incident may have caused and is personally contacting customers and employees who may have been affected.
The bank has also told authorities and law enforcement about the problem and is working closely with them to solve it.
Santander said in a statement that it was committed to data security and privacy: “We apologize for the worry this will understandably cause and are proactively contacting affected customers and employees directly.”
We also told the government and the police and will continue working closely with them.
While the probe goes on, Santander is doing everything it can to improve its security and stop similar problems from happening again.
There is no doubt that the bank is committed to keeping the trust of its workers and customers.
Free Webinar on Live API Attack Simulation: Book Your Seat | Start protecting your APIs from hackers
Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a disguised…
Palo Alto Networks reported the Contagious Interview campaign in November 2023, a financially motivated attack…
The recent discovery of the NjRat 2.3D Professional Edition on GitHub has raised alarms in…
A critical vulnerability, CVE-2024-3393, has been identified in the DNS Security feature of Palo Alto…
Threat Analysts have reported alarming findings about the "Araneida Scanner," a malicious tool allegedly based…
A major dark web operation dedicated to circumventing KYC (Know Your Customer) procedures, which involves…