250,000 clients (unverified claim for Frost Bank)
The Everest ransomware gang has claimed responsibility for cyberattacks against two prominent U.S. banks: Citizens Financial Group and Frost Bank. On April 20, 2026, both financial institutions were listed on the gang's dark web extortion site, with the threat actors setting a six-day deadline for the public release of allegedly stolen data. Citizens Bank has acknowledged a data security incident originating from a third-party vendor, but downplayed the severity, stating most data was for testing purposes. The claims regarding Frost Bank, which involve records for 250,000 clients, have not been officially confirmed but represent a significant threat to the financial sector.
This incident highlights the persistent threat of ransomware gangs to the financial services industry and their increasing reliance on supply chain attacks. Everest is using a double-extortion tactic, not only encrypting data but also stealing it and threatening public release to pressure victims into paying.
For Citizens Bank, the attack vector was a third-party vendor, demonstrating how vulnerabilities in the supply chain can impact even well-defended organizations. The bank stated that only a "very limited set of customer information was involved."
For Frost Bank, the unverified claim is much larger, with Everest alleging possession of PII and financial data for 250,000 clients, including Social Security numbers (SSNs), income, and investment details. This type of data is highly valuable on the dark web and poses a severe risk of fraud and identity theft to customers.
While the specific TTPs for this attack are not detailed, the pattern is consistent with modern ransomware operations:
T1199 - Trusted Relationship). For Frost Bank, the vector is unknown but could range from phishing to exploiting an unpatched vulnerability.T1048 - Exfiltration Over Alternative Protocol and T1567 - Exfiltration Over Web Service.T1486 - Data Encrypted for Impact) and posting the victim's name on their leak site to apply public pressure.The attack on Citizens Bank via a third-party vendor is a critical reminder that an organization's security is only as strong as its weakest partner. Robust vendor risk management is non-negotiable.
No specific Indicators of Compromise (IOCs) were provided in the source articles.
To detect ransomware precursor activity, security teams should hunt for:
vssadmin.exe delete shadows or wbadmin delete catalog.net stop <service_name> for security tools (AV, EDR).whoami, net group, etc.) and lateral movement tools. Use canaries or honeyfiles—bait files that trigger an alert if modified or encrypted.M1016 - Vulnerability Scanning applied to the supply chain.M1053 - Data Backup and Recovery.M1030 - Network Segmentation.Maintain regular, tested, and offline backups to ensure recovery from a destructive ransomware attack without paying the ransom.
Segment the network to limit the blast radius of a ransomware infection, preventing it from spreading from workstations to critical servers.
Mapped D3FEND Techniques:
Extend vulnerability management programs to include third-party vendors, ensuring supply chain partners meet security standards.
Use EDR tools to detect and block common ransomware behaviors like shadow copy deletion and mass file encryption.
Mapped D3FEND Techniques:
The core defense against the 'Impact' phase of a ransomware attack by groups like Everest is a robust and tested restoration capability. Financial institutions like Citizens Bank and Frost Bank must maintain immutable backups, completely isolated from the production network (air-gapped or on write-once media). This ensures that even if the live network is fully encrypted, a known-good copy of data and system configurations exists. The restoration plan must be regularly tested to validate its integrity and to ensure that Recovery Time Objectives (RTOs) can be met. This removes the primary leverage of the attackers—data unavailability—and allows the organization to recover without considering a ransom payment.
To combat the 'double extortion' tactic used by Everest, where data is stolen before encryption, strict outbound traffic filtering is essential. Banks should configure their firewalls and proxies to deny all outbound traffic by default, only allowing connections to known, legitimate destinations on approved ports. For the Citizens Bank scenario involving a third-party vendor, this means restricting the vendor's network access to only the specific systems and ports required for their function. Furthermore, deploying a Data Loss Prevention (DLP) solution to inspect outbound traffic for sensitive data patterns (like SSNs, account numbers) can detect and block exfiltration attempts in real-time. This can prevent the data breach component of the attack, significantly reducing the attacker's leverage and the overall impact of the incident.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats