Columbia Bank, a major bank in the Northwestern United States, has disclosed a significant data breach involving nearly three months of unauthorized access to its internal systems. According to breach notification letters sent to customers, an unauthorized party was inside the bank's network from October 2, 2025, to December 22, 2025. The investigation to determine the scope of the data compromise was only completed on March 6, 2026, more than five months after the intrusion began. This extended dwell time and the subsequent delay in notification have created significant concern among customers and security experts about the potential for misuse of stolen data. Although the specific data types have not been publicly confirmed, the nature of the breach suggests that sensitive personal and financial information is at risk. The incident is now under investigation by class-action attorneys to determine if the bank failed in its duty to protect customer data.
The timeline of this incident highlights a prolonged intrusion and a lengthy investigation process:
The long dwell time of over 80 days suggests a sophisticated and stealthy attacker. The initial access vector is unknown, but common methods for such intrusions include exploiting a public-facing vulnerability (T1190 - Exploit Public-Facing Application), a successful phishing campaign leading to credential theft (T1566 - Phishing), or the use of stolen credentials purchased on the dark web (T1078 - Valid Accounts).
Once inside, the attacker likely focused on defense evasion and maintaining persistence. They would have moved laterally through the network (T1021 - Remote Services) to identify and access valuable data repositories. The fact that they had access to "certain bank applications" suggests they may have compromised application servers or databases containing customer information. The primary goal would have been data exfiltration (T1041 - Exfiltration Over C2 Channel), likely performed slowly over the three-month period to avoid triggering high-volume data transfer alerts.
The primary impact is on the customers of Columbia Bank whose information was potentially exposed. Depending on the data types compromised, they could be at high risk for:
For Columbia Bank, the consequences are severe. The incident will likely result in significant costs associated with the forensic investigation, customer notifications, credit monitoring services, and potential regulatory fines. The possibility of a class-action lawsuit, which is already being explored by firms like ClassAction.org, could lead to substantial financial penalties. Furthermore, the long duration of the breach and the delay in notification have caused significant reputational damage, eroding customer trust.
The lengthy dwell time in this incident highlights potential gaps in detection capabilities.
To prevent and mitigate similar incidents, financial institutions should focus on:
Implement and actively monitor comprehensive logs to detect anomalous activity and reduce attacker dwell time.
Use behavioral analytics (UEBA) to detect deviations from normal user and system activity that might indicate a compromise.
Segment networks to contain breaches and prevent attackers from moving from less secure zones to critical data stores.
Enforce MFA across the enterprise to make it harder for attackers to use stolen credentials.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats