Skip to main content

Bank hack: JPMorgan Chase says 76 million households hit in cyberattack

” id=”attachment_666828″]chase atm upgrade bank
Another day another massive data breach.

One of the largest banks in the US – JPMorgan Chase – has succumbed to a huge cyberattack, with accounts linked to 76 million households and seven million small businesses compromised.

The attack, which took place around June and July of this year, was originally thought to have affected around a million accounts. However, information included in a regulatory filing published by the bank on Thursday revealed the breach was far more serious than anyone had been expecting.

Information such as customer names, addresses, phone numbers and email addresses were harvested from around 90 of the bank’s servers, with hackers also obtaining information on customer category, such as private bank, mortgage or credit card. Login information for online accounts with the bank is not believed to have been taken in the attack.

Bank officials said that so far it’d seen no evidence of any of the stolen data having been used for criminal purposes, though it’s continuing to monitor the situation. As a precaution, customers have been told to look out for any suspicious account activity, and to alert the bank immediately if they spot something unusual.

Reports suggest it’s still not fully understood how hackers managed to dig so deep into the bank’s computer systems. The FBI is currently investigating the breach.

News of this latest hack follows other recent ones of a similar magnitude – last month Home Depot revealed that data linked to around 56 million customer payment cards had been stolen by cyber criminals over a period of several months from April, while last year Target was hit in a breach involving 40 million payment cards.

In a statement on its website Thursday, JPMorgan Chase told its customers it was “very sorry” for any uncertainty caused by the attack, adding that it didn’t believe it was necessary to change password or account information.

[Source: Bloomberg]

Editors' Recommendations

Trevor Mogg
Contributing Editor
Not so many moons ago, Trevor moved from one tea-loving island nation that drives on the left (Britain) to another (Japan)…
Twitter locks millions of accounts following massive password leak
twitter keyword filter abuse version 1477952559 man holding iphone 6 with on the screen

Following news late Wednesday that login credentials for as many as 32 million Twitter accounts were being traded on the dark web, the company has responded by locking a number of the accounts and sending affected users emails prompting them to reset their password.

Twitter insisted in a blog post the stolen names and passwords had not been taken as a result of a hack on its servers, claiming instead that they "may have been amassed from combining information from other recent breaches, malware on victim machines that are stealing passwords for all sites, or a combination of both."

Read more
Time to change your Twitter password: 32 million accounts may have been hacked
twitter suspends extremist accounts app

Mark Zuckerberg, Katy Perry, Keith Richards, Tame Impala, Drake, Tenacious D, oh, and Twitter founder Evan Williams. What do they have in common? They've all had their Twitter accounts compromised in recent days, that's what.

And late Thursday it emerged the apparent hack could be serious. Like 32-million-accounts serious.

Read more
Trump hotel chain confirms year-long data hack
donald trump

The Trump hotel chain has confirmed a data security breach involving malware that the company says was on its payment systems for just over a year.

First reported last week and confirmed by the business on Monday, the high-end hotel chain owned by the billionaire Republican presidential hopeful and real estate developer Donald Trump said that between May 19, 2014, and June 2, 2015, it believes there "may have been unauthorized malware access to some of the computers that host our front desk terminals and payment card terminals in our restaurants, gift shops and other point-of-sale purchase locations."

Read more