ShinyHunters group hacked a major foreign bank

Tomcat

Professional
Messages
2,656
Reputation
10
Reaction score
647
Points
113
30 million customers have said goodbye to their card details forever.

A group of hackers ShinyHunters announced the hacking of Santander Bank, one of the world leaders in the financial sector. As a result of the attack, the personal data of more than 30 million customers was stolen, which is now offered for sale for $2 million.

os7mwj5aj6zup0ehj02vwtjv5p9r7fdi.png


Santander Bank, which is headquartered in Spain and has a huge network of 8,518 branches around the world, confirmed the data leak. First of all, it affected customers in Spain, Chile and Uruguay, as well as some employees of the bank. The company said in a statement that the leak occurred through a third-party contractor.

ShinyHunters, known for its large-scale cyber attacks, recently also claimed responsibility for hacking the US company Ticketmaster, where 560 million user records were stolen, including partial payment card data.

ShinyHunters is currently the owner and administrator of BreachForums, a well-known cybercrime platform. Despite recent efforts by the FBI to shut down the forum, the group quickly rebuilt its infrastructure. In addition, cybercriminals already have an alternative in the face of Geach Nation, launched by a hacker under the pseudonym USDoD.

Regarding the hacking of Santander Bank, representatives of ShinyHunters offer for sale an array of data, including:
  • 30 million customer records;
  • 28 million full credit card numbers with verification data and expiration dates (no CVV);
  • 6 million account numbers and balances;
  • Lists of HR employees;
  • Other sensitive data.

The availability of such a large volume of sensitive financial information raises serious concerns about the possibility of identity theft, fraud and other illegal activities. This incident highlights the ongoing threats faced by financial institutions and their customers.

Santander Bank has already taken measures to eliminate the consequences of the leak, but customers are advised to carefully monitor their accounts for suspicious activity. It is also recommended to use two-factor authentication and regularly update passwords to reduce the risk of further data use by cybercriminals.
 
Top