Friday, June 13, 2025
HomeCyber Security NewsUniCredit Bank Says 3 Million Customers Impacted with the Data Breach

UniCredit Bank Says 3 Million Customers Impacted with the Data Breach

Published on

SIEM as a Service

Follow Us on Google News

Italian bank giant UniCredit disclosed that 3 million Italian clients’ data was exposed in the 2015 data breach. The bank confirms the threat the actors accessed a file containing the customer records.

The bank also confirms that with the compromised details the attacker could not able to gain access to the customer accounts or perform unauthorized transactions.

“The UniCredit cybersecurity team has identified a data incident involving a file generated in 2015 containing a defined set of approximately 3 million records limited to the Italian perimeter,” the bank said in a statement.

- Advertisement - Google News

Exposed customer details include the following details such as names, city, telephone number and email only. It doesn’t include any personal data or banking details.

After the breach, the bank launched an investigation immediately and informed all the authorities including police about the incident.

On the other hand, Italian police also carried out an investigation to see any crimes committed with the details obtained from the UniCredit file.

UniCredit spokesperson said Reuters that no details could be disclosed on how the breach happened. The bank contacting the affected persons.

This is not the first time, UniCredit victim of two cyberattacks earlier, September-October 2016 and June-July 2017, affecting 400,000 Italian customers.

The bank said that they have invested 2.4 billion euros since 2016 to boost cybersecurity.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Also Read

Avast Hacked – Hackers Gained Network Access Via Avast Own VPN With Compromised Credentials

The Student’s Guide to Cyber Security – 9 Top Tips to Prevent Yourself From Hackers

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

TokenBreak Exploit Tricks AI Models Using Minimal Input Changes

HiddenLayer’s security research team has uncovered TokenBreak, a novel attack technique that bypasses AI...

WebDAV Remote Code Execution 0-Day Actively Exploited — PoC Released

A critical zero-day vulnerability in Microsoft’s Web Distributed Authoring and Versioning (WebDAV) protocol, tracked...

Cybercriminals Exploiting Expired Discord Invite Links to Deploy Multi-Stage Malware

Recent investigations by Check Point Research have uncovered a sophisticated malware campaign that leverages...

Threat Actors Exploit DeepSeek-R1 Popularity to Target Windows Device Users

A new, highly sophisticated cyberattack campaign is targeting users seeking to download the popular...

Credential Abuse: 15-Min Attack Simulation

Credential Abuse Unmasked

Credential abuse is #1 attack vector in web and API breaches today (Verizon DBIR 2025). Join our live, 15-min attack simulation with Karthik Krishnamoorthy (CTO - Indusface) and Phani Deepak Akella (VP of Marketing - Indusface) to see hackers move from first probe to full account takeover.

Discussion points


Username & email enumeration – how a stray status-code reveals valid accounts.
Password spraying – low-and-slow guesses that evade basic lockouts.
Credential stuffing – lightning-fast reuse of breach combos at scale.
MFA / session-token bypass – sliding past second factors with stolen cookies.

More like this

TokenBreak Exploit Tricks AI Models Using Minimal Input Changes

HiddenLayer’s security research team has uncovered TokenBreak, a novel attack technique that bypasses AI...

WebDAV Remote Code Execution 0-Day Actively Exploited — PoC Released

A critical zero-day vulnerability in Microsoft’s Web Distributed Authoring and Versioning (WebDAV) protocol, tracked...

Cybercriminals Exploiting Expired Discord Invite Links to Deploy Multi-Stage Malware

Recent investigations by Check Point Research have uncovered a sophisticated malware campaign that leverages...