New regulatory disclosures have confirmed that a cyberattack on financial services vendor Marquis exposed sensitive personal and financial information belonging to more than 400,000 bank and credit union customers across the United States.
According to filings submitted to state authorities, attackers accessed Marquis systems by exploiting a known but unpatched firewall vulnerability, allowing unauthorized access to data used by hundreds of financial institutions. Texas accounts for the largest confirmed share of affected individuals, with additional disclosures filed in states including Maine, Massachusetts, Iowa, and New Hampshire.

The intrusion dates back to August, when attackers gained access to Marquis’ internal network through a vulnerable SonicWall firewall appliance. Firewalls sit at the perimeter of enterprise networks and are typically treated as trusted infrastructure, making them high-impact targets when left unpatched.
Once inside, attackers were able to access centralized customer data maintained by Marquis on behalf of its banking and credit union clients. The company later confirmed the incident involved ransomware, though it has not publicly named the attackers. The campaign has been widely linked to the Akira, which has previously targeted organizations running exposed SonicWall devices.
State disclosures indicate that the compromised data included a broad range of highly sensitive information, such as:
This combination of data represents complete identity profiles, significantly increasing the risk of long-term fraud and misuse.
Marquis provides marketing and compliance services to more than 700 financial institutions nationwide. That role requires access to large volumes of customer information across multiple banks and credit unions, concentrating sensitive data in a single vendor environment.
As a result, a single breach at the vendor level propagated outward, affecting customers across many institutions and jurisdictions simultaneously. This structure has become an increasingly common focal point for ransomware groups seeking maximum downstream impact from a single point of compromise.
Security experts note that breaches involving immutable identity data differ from typical credential incidents. While passwords and access tokens can be reset, core identity attributes cannot be changed. Once exposed, this information may be reused repeatedly for account takeovers, new account fraud, and highly targeted scams that reference accurate personal and banking details.
Because of this, the consequences of the Marquis breach may continue to surface long after
The post Marquis Data Breach Exposes Hundreds of Thousands of Bank Customers appeared first on Centraleyes.
*** This is a Security Bloggers Network syndicated blog from Centraleyes authored by Rebecca Kappel. Read the original post at: https://www.centraleyes.com/marquis-data-breach-exposes-hundreds-of-thousands-of-bank-customers/