American Patelco Credit Union suffered a ransomware attack
2024-7-3 17:43:39 Author: securityaffairs.com(查看原文) 阅读量:8 收藏

American Patelco Credit Union suffered a ransomware attack

The American credit union Patelco Credit Union shut down several of its banking systems to contain a ransomware attack.

Patelco Credit Union is a member-owned, not-for-profit credit union that serves Northern California, particularly the San Francisco Bay Area. Founded in 1936, it is one of the oldest and largest credit unions in the country. With more than $9 billion in assets, it is the 22nd largest credit union in the country.

In a service update provided by the company, Patelco disclosed it had suffered a ransomware attack on June 29, 2024.

“On June 29, 2024, Patelco Credit Union experienced a ransomware attack.” reads the update.

The company is working with leading third-party cybersecurity experts to investigate and contain the attack, it also reported the incident to regulators and law enforcement.

According to the “Services Updates” page the following services are still unavailable:

AvailableLimited FunctionalityUnavailable
Check and Cash DepositsPatelco BranchesOnline Banking
ATM WithdrawalsCall CenterMobile App
External ACH1Live ChatOutgoing Wire Transfers
ACH for Bills2Debit Card TransactionsMonthly Statements
In-Branch Loan PaymentsCredit Card TransactionsZelle
Direct DepositBalance Inquiries
Online Bill Pay

Customers can perform cash withdrawals and deposits using Patelco ATMs and over 30,000 shared branch ATMs in the U.S.

The company did not reveal the family of ransomware that infected its systems and at the time of this writing, no ransomware groups have claimed responsibility for the security breach.

It’s unclear if threat actors have stolen data from the impacted systems.

Pierluigi Paganini

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

(SecurityAffairs – hacking, Patelco Credit Union)




文章来源: https://securityaffairs.com/165152/hacking/patelco-credit-union-ransomware-attack.html
如有侵权请联系:admin#unsafe.sh