Everest Ransomware Claims Attacks on Citizens and Frost Banks

Everest Ransomware Gang Targets Two Major US Banks, Threatens Data Leak

HIGH
April 22, 2026
5m read
RansomwareData BreachThreat Actor

Impact Scope

People Affected

250,000 clients (unverified claim for Frost Bank)

Affected Companies

Citizens Financial GroupFrost Bank

Industries Affected

FinanceTechnology

Geographic Impact

United States (national)

Related Entities

Threat Actors

Everest

Other

Citizens Financial GroupFrost BankUnited States

Full Report

Executive Summary

The Everest ransomware gang has claimed responsibility for cyberattacks against two prominent U.S. banks: Citizens Financial Group and Frost Bank. On April 20, 2026, both financial institutions were listed on the gang's dark web extortion site, with the threat actors setting a six-day deadline for the public release of allegedly stolen data. Citizens Bank has acknowledged a data security incident originating from a third-party vendor, but downplayed the severity, stating most data was for testing purposes. The claims regarding Frost Bank, which involve records for 250,000 clients, have not been officially confirmed but represent a significant threat to the financial sector.

Threat Overview

This incident highlights the persistent threat of ransomware gangs to the financial services industry and their increasing reliance on supply chain attacks. Everest is using a double-extortion tactic, not only encrypting data but also stealing it and threatening public release to pressure victims into paying.

For Citizens Bank, the attack vector was a third-party vendor, demonstrating how vulnerabilities in the supply chain can impact even well-defended organizations. The bank stated that only a "very limited set of customer information was involved."

For Frost Bank, the unverified claim is much larger, with Everest alleging possession of PII and financial data for 250,000 clients, including Social Security numbers (SSNs), income, and investment details. This type of data is highly valuable on the dark web and poses a severe risk of fraud and identity theft to customers.

Technical Analysis

While the specific TTPs for this attack are not detailed, the pattern is consistent with modern ransomware operations:

  1. Initial Access: For Citizens Bank, the vector was a compromised third-party vendor, a classic supply chain attack (T1199 - Trusted Relationship). For Frost Bank, the vector is unknown but could range from phishing to exploiting an unpatched vulnerability.
  2. Data Exfiltration: Before deploying the ransomware, groups like Everest move laterally through the network to identify and exfiltrate valuable data. This involves techniques like T1048 - Exfiltration Over Alternative Protocol and T1567 - Exfiltration Over Web Service.
  3. Impact: The final stage is data encryption (T1486 - Data Encrypted for Impact) and posting the victim's name on their leak site to apply public pressure.

The attack on Citizens Bank via a third-party vendor is a critical reminder that an organization's security is only as strong as its weakest partner. Robust vendor risk management is non-negotiable.

Impact Assessment

  • For Customers: A breach of this nature could lead to widespread financial fraud, identity theft, and targeted phishing attacks. The exposure of SSNs, TINs, and detailed financial records is particularly damaging.
  • For the Banks: The incidents result in significant reputational damage, regulatory fines, and costs associated with incident response, customer notifications, and credit monitoring. An attack on a third party does not absolve the primary organization of responsibility for protecting its customer data.
  • For the Financial Sector: Successful attacks on major banks can erode public trust in the stability and security of the financial system.

IOCs — Directly from Articles

No specific Indicators of Compromise (IOCs) were provided in the source articles.

Cyber Observables — Hunting Hints

To detect ransomware precursor activity, security teams should hunt for:

Type
Network Traffic Pattern
Value
Large, anomalous outbound data flows to unknown destinations.
Description
This is a strong indicator of data exfiltration before ransomware deployment.
Type
Process Activity
Value
Execution of vssadmin.exe delete shadows or wbadmin delete catalog.
Description
Attackers disable volume shadow copies to prevent easy recovery.
Type
Command-Line Pattern
Value
net stop <service_name> for security tools (AV, EDR).
Description
Attackers attempt to disable endpoint security before running the encryptor.
Type
Log Source
Value
Third-party connection logs
Description
Monitor and baseline traffic from third-party vendors, alerting on unusual access patterns or data transfers.

Detection & Response

  • Detection: Deploy EDR solutions with anti-ransomware behavioral modules that can detect and terminate processes attempting to rapidly encrypt files or delete backups. Monitor for the execution of common reconnaissance commands (whoami, net group, etc.) and lateral movement tools. Use canaries or honeyfiles—bait files that trigger an alert if modified or encrypted.
  • Response: Isolate affected systems immediately. Disconnect network access for compromised third-party vendors. Activate the incident response plan, which should include engaging legal counsel and forensic investigators. Do not reboot or delete anything until a forensic image can be taken. Refer to CISA's guidance on ransomware and avoid paying the ransom, as it does not guarantee data recovery and fuels the criminal ecosystem.

Mitigation

  1. Vendor Risk Management: Implement a stringent third-party risk management program. This includes security questionnaires, audits, and contractual requirements for vendors who handle sensitive data. This is a key part of M1016 - Vulnerability Scanning applied to the supply chain.
  2. Offline Backups: Maintain immutable, offline backups of all critical data. This is the most effective defense against data encryption attacks and is a core component of M1053 - Data Backup and Recovery.
  3. Network Segmentation: Segment networks to prevent ransomware from spreading from one part of the organization to another. A flat network is a ransomware operator's playground. See M1030 - Network Segmentation.
  4. Endpoint Security: Deploy and properly configure advanced EDR and anti-malware solutions. Ensure they are set to block, not just alert, on suspicious behaviors.

Timeline of Events

1
April 20, 2026
Citizens Bank and Frost Bank appeared on the Everest ransomware gang's dark web extortion site.
2
April 22, 2026
This article was published

MITRE ATT&CK Mitigations

Maintain regular, tested, and offline backups to ensure recovery from a destructive ransomware attack without paying the ransom.

Segment the network to limit the blast radius of a ransomware infection, preventing it from spreading from workstations to critical servers.

Mapped D3FEND Techniques:

Extend vulnerability management programs to include third-party vendors, ensuring supply chain partners meet security standards.

Use EDR tools to detect and block common ransomware behaviors like shadow copy deletion and mass file encryption.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

The core defense against the 'Impact' phase of a ransomware attack by groups like Everest is a robust and tested restoration capability. Financial institutions like Citizens Bank and Frost Bank must maintain immutable backups, completely isolated from the production network (air-gapped or on write-once media). This ensures that even if the live network is fully encrypted, a known-good copy of data and system configurations exists. The restoration plan must be regularly tested to validate its integrity and to ensure that Recovery Time Objectives (RTOs) can be met. This removes the primary leverage of the attackers—data unavailability—and allows the organization to recover without considering a ransom payment.

To combat the 'double extortion' tactic used by Everest, where data is stolen before encryption, strict outbound traffic filtering is essential. Banks should configure their firewalls and proxies to deny all outbound traffic by default, only allowing connections to known, legitimate destinations on approved ports. For the Citizens Bank scenario involving a third-party vendor, this means restricting the vendor's network access to only the specific systems and ports required for their function. Furthermore, deploying a Data Loss Prevention (DLP) solution to inspect outbound traffic for sensitive data patterns (like SSNs, account numbers) can detect and block exfiltration attempts in real-time. This can prevent the data breach component of the attack, significantly reducing the attacker's leverage and the overall impact of the incident.

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

RansomwareEverestBankingFinanceData BreachThird Party Risk

📢 Share This Article

Help others stay informed about cybersecurity threats