Prosper Marketplace Data Breach Expands: 17.6 Million Users Impacted in Database Intrusion
嗯,用户让我用中文帮他总结一下这篇文章的内容,控制在100个字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头,直接写描述就行。首先,我需要仔细阅读这篇文章,理解它的主要内容。 文章主要讲的是 Prosper Marketplace 这个点对点借贷平台的数据泄露事件。泄露影响了大约1760万人,暴露了包括社会安全号码、政府颁发的身份证、就业数据和收入细节等敏感信息。攻击者直接访问了 Prosper 的数据库,没有加密系统或勒索信息。Prosper 表示客户资金没有被直接篡改,并提供了免费信用监控服务。事件原因可能是员工凭证被盗,导致攻击者进入内部数据库。 接下来,我需要将这些关键点浓缩到100字以内。要确保涵盖主要信息:数据泄露的规模、受影响人数、暴露的信息类型、攻击方式、Prosper 的应对措施以及可能的原因。 然后,检查是否有冗余的信息可以删除,同时保持语句简洁明了。例如,“点对点借贷平台 Prosper Marketplace 遭遇重大数据泄露事件”已经涵盖了平台名称和事件性质。“约1760万人受影响”简洁明了。“攻击者直接访问数据库提取数据”说明了攻击方式。“暴露信息包括社会安全号码等敏感内容”涵盖了暴露的信息类型。“Prosper 提供免费信用监控服务”说明了应对措施。“事件或因员工凭证被盗引发”指出了可能的原因。 最后,确保整个总结流畅连贯,并且在100字以内。检查是否有任何遗漏的重要信息,并进行调整以确保全面性和准确性。 </think> 点对点借贷平台 Prosper Marketplace 遭遇重大数据泄露事件,约1760万人受影响。攻击者直接访问数据库提取数据,暴露信息包括社会安全号码等敏感内容。Prosper 提供免费信用监控服务应对风险,事件或因员工凭证被盗引发。 2025-10-23 23:46:38 Author: securityboulevard.com(查看原文) 阅读量:5 收藏

In a significant development in one of the year’s largest fintech breaches, new reports released today confirm that Prosper Marketplace, the San Francisco–based peer-to-peer lending platform, suffered a data compromise affecting roughly 17.6 million people. The updated figure, first published by TechRadar and Tom’s Guide, sheds light on the scale of the incident and reveals the breadth of the personal information exposed, including Social Security numbers, government-issued IDs, employment data, and income details.

The new information paints a fuller picture of what began as a quiet internal investigation earlier this month. When Prosper first acknowledged the incident in early October, it described a “cyber intrusion” that had been detected on September 2, 2025, and said that external investigators were working to determine its scope. 

Cruise Con 2025

Today’s disclosures go further. According to breach-tracking platform Have I Been Pwned, the exposed data set contains more than 17 million unique email addresses, 2.8 million of which had never appeared in any prior breach. Combined with the inclusion of sensitive financial identifiers, the Prosper incident now ranks among the most consequential U.S. data leaks of the year.

prosper marketplace breach

A Quiet Database Intrusion

One of the most striking aspects of the Prosper case is what didn’t happen. There was no encryption of systems, no ransom note, and no service outage. Instead, the attackers appear to have accessed Prosper’s databases directly and issued unauthorized queries to extract customer data. This points to the attackers’ goal: It wasn’t to lock Prosper out of its systems but to quietly collect the raw information that powers its lending models.

Prosper maintains that its customer-facing services, including loan processing and investor dashboards, continued operating normally. “There is no evidence of unauthorized access to customer accounts or funds,” the company said in a statement. “Our top priority remains securing customer data and enhancing our monitoring systems.”

For consumers, that assurance means money in accounts hasn’t been directly tampered with. But for anyone whose information was exposed, the risks extend far beyond account theft. This type of data is the backbone of synthetic identity fraud, a form of financial crime where criminals combine real and fake information to open new accounts in a victim’s name.

How Attackers Likely Got In

While Prosper has not publicly disclosed the attack vector, early investigative sources point to the use of compromised credentials. possibly a service account or employee login that provided access to internal databases. That scenario aligns with industry-wide statistics showing that credential theft remains the leading cause of data breaches.

If true, the incident highlights an all-too-common weakness across financial technology firms: reliance on traditional username-and-password authentication rather than phishing-resistant multifactor authentication (MFA) or strong identity governance. Attackers who gain valid credentials can move quietly within systems, issuing queries that look legitimate to monitoring tools unless strict behavior analytics are in place.

The Scale of the Exposure

Today’s reporting confirms that the stolen data spans an unusually broad range of personally identifiable information (PII):

  • Full names and email addresses
  • Dates of birth and physical addresses
  • Social Security numbers and other government-issued IDs
  • Employment status, credit standing, and income level
  • IP addresses and browser user-agent strings

That combination creates a complete identity profile, making it one of the more dangerous forms of PII exposure. Unlike a simple password breach, much of this data is unchangeable. (You can reset a password, but not your birthdate or Social Security number.)

Prosper says it is offering free credit monitoring to all affected individuals and is advising customers to monitor their financial accounts closely. For most victims, the real threat may not appear immediately; fraud stemming from this type of breach can surface months or even years later as data circulates in criminal markets.

The Questions That Still Need Answers

Despite the additional detail now public, several key points remain unresolved. Prosper has not confirmed how many of the 17.6 million records included the most sensitive identifiers such as SSNs. Nor has it disclosed the dwell time, which would indicate how long attackers had to extract data.

The company has also not clarified whether the breached data was encrypted at rest or if the attacker accessed plaintext values via legitimate queries. Encryption is often touted as a best practice, but it provides limited protection if credentials used for decryption are themselves compromised.

Another open question is whether any of the stolen information has surfaced on the dark web. So far, researchers monitoring underground marketplaces have reported no verified listings of Prosper data, but such leaks can take time to appear.

The post Prosper Marketplace Data Breach Expands: 17.6 Million Users Impacted in Database Intrusion appeared first on Centraleyes.

*** This is a Security Bloggers Network syndicated blog from Centraleyes authored by Rebecca Kappel. Read the original post at: https://www.centraleyes.com/prosper-marketplace-data-breach-expands-17-6-million-users-impacted-in-database-intrusion/


文章来源: https://securityboulevard.com/2025/10/prosper-marketplace-data-breach-expands-17-6-million-users-impacted-in-database-intrusion/
如有侵权请联系:admin#unsafe.sh