1st Source Bank, a US-based financial institution, has become a victim of the notorious Cl0p ransomware syndicate, resulting in the potential exposure of sensitive data belonging to up to 450,000 customers.
The attack targeted the bank’s MOVEit Transfer servers, allowing hackers to potentially access Social Security numbers (SSNs), government-issued IDs, names, dates of birth, driver’s license numbers, and other government identification details. In response to the breach, the bank has offered identity monitoring services to affected individuals to mitigate further risks.
The Cl0p ransom group, with alleged links to Russia, has been relentlessly exploiting vulnerabilities in the MOVEit Transfer file system, impacting thousands of companies globally.
Cybersecurity firm Emisoft estimates that approximately 20 million individuals have been affected, with almost 400 companies falling victim to the attacks. The hackers gained unauthorized access to victim databases through a zero-day flaw in the MOVEit system, putting companies, including major brands like American Airlines, Warner Bros Discovery, and AMC Theatres, at risk of data exposure.
As authorities investigate the situation, there is suspicion that some of Cl0p’s affiliates may be operating from Kramatorsk, a city in Ukraine’s troubled east. US officials are actively pursuing the ransomware gang and have placed a $10 million bounty on them.
The incident underscores the growing threat posed by ransomware attacks and the urgent need for businesses to bolster their cybersecurity measures to protect customer data and sensitive information from falling into the wrong hands.