Cybercriminal gang Sp1d3r is making quite a name for itself as it is now selling sensitive data on thousands of Truist bank employees.
Truist is a major US commercial bank formed in late 2019 after SunTrust Banks and BB&T merged, and now has $535 billion in assets under management. It offers different banking services, from consumer and small business banking, commercial banking, corporate and investment banking, to insurance, wealth management and payments.
Sp1d3r says they stole information from 65,000 employees, including bank transactions with names, account numbers, balances and IVR fund transfer source code. The current price is 1 million dollars.
No connection to Snowflake
The breach apparently occurred in October 2023, but was not confirmed by Truist until now, once the data became available for sale.
“In October 2023, we experienced a cybersecurity incident that was quickly contained,” a Truist Bank spokesperson said. beepcomputer. “In partnership with third-party security consultants, we conducted a thorough investigation, took additional steps to protect our systems, and notified a small number of customers last fall.
For those unfamiliar with the name Sp1d3r, this is a threat actor that recently sold sensitive data on 358,000 employees of major American automaker Advance Auto Parts, as well as 380 million customer profiles and much other information. The current price was $1.5 million.
Sp1d3r was also seen selling 34 million emails and other personally identifiable information (PII) belonging to customers, employees and partners of cybersecurity giant Cylance, for $750,000.
Since Sp1d3r's breach of Advance Auto Parts occurred through data storage provider Snowflake, media speculated that the same could be the case here. However, Truist's spokesperson confirmed that this had nothing to do with Snowflake.
“To be clear, we have found no evidence of a Snowflake incident at our company.”