Undisclosed number of bank customers
Bank3, a community bank based in Memphis, Tennessee, has officially disclosed a data breach that compromised the sensitive information of its clients. The bank's notification to the Maine Attorney General on April 15, 2026, confirms that an unauthorized actor had access to its network for several weeks between July and August 2025. This disclosure follows a public claim by the notorious Qilin ransomware group in October 2025, which asserted it had exfiltrated 149 GB of data. The compromised information includes names, Social Security numbers, financial account numbers, and payment card details, placing affected individuals at significant risk of identity theft and financial fraud.
The incident is a classic double-extortion ransomware attack perpetrated by the Qilin group, one of the most active ransomware operators. The attack timeline reveals a significant dwell time, allowing the threat actors to thoroughly explore the network and exfiltrate a large volume of data before being detected.
While Bank3 has not detailed the initial access vector, Qilin is known to leverage common ransomware TTPs:
T1566) or by exploiting vulnerabilities in public-facing infrastructure like VPNs (T1190).T1048): Before deploying the encryptor, the group exfiltrates large volumes of sensitive data to be used as leverage in their extortion demands. The claim of 149 GB of data suggests a successful and prolonged exfiltration phase.T1486): The final stage involves deploying the ransomware payload to encrypt files across the network, causing significant operational disruption.The compromised data is highly sensitive and puts affected customers at severe risk. The stolen information includes:
This data can be used for a wide range of fraudulent activities, including opening new lines of credit, filing fraudulent tax returns, and committing identity theft. Bank3 is offering 12 months of credit monitoring services to affected individuals, but the lifetime risk associated with a stolen SSN is permanent.
No Indicators of Compromise (IOCs) have been publicly released by Bank3.
Detecting groups like Qilin requires a focus on behavioral indicators:
lsass.exe or Kerberoasting attacks (Event ID 4769). (D3-DAM: Domain Account Monitoring).zip, .rar) on servers, which often precedes data exfiltration.Enforcing MFA on VPNs and administrative accounts is a critical defense against attacks leveraging stolen credentials.
Mapped D3FEND Techniques:
Segmenting the network can prevent ransomware from spreading from an initial entry point to critical financial systems and data stores.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats