967,000
On February 14, 2026, fintech firm Figure Technology Solutions, Inc. confirmed a significant data breach resulting from a targeted social engineering attack on an employee. The threat actor group ShinyHunters claimed responsibility, subsequently leaking a 2.5GB data trove on the dark web after the company reportedly refused to pay a ransom. The leaked data contains the personally identifiable information (PII) of approximately 967,000 customers, including full names, dates of birth, email addresses, physical addresses, and phone numbers. The incident highlights the effectiveness of social engineering as an initial access vector and underscores the severe consequences of a single credential compromise, particularly in organizations handling sensitive financial data.
The attack began with a sophisticated social engineering campaign, likely voice phishing (vishing), targeting a Figure employee. The attackers successfully manipulated the employee into divulging their credentials, granting them unauthorized access to Figure's internal systems. This access was then used to navigate the network and exfiltrate sensitive customer data.
ShinyHunters, a well-known data extortion group, followed its typical modus operandi: exfiltrate data, demand a ransom, and leak the data if the demand is not met. By publishing the data on their leak site, they aim to maximize reputational damage to the victim and pressure future victims into paying. The leaked information is highly valuable for other malicious actors, who can use it to conduct identity theft, targeted phishing campaigns, and other fraudulent activities. Some researchers suggest this attack may be part of a wider campaign targeting users of the single sign-on provider Okta, although this connection is still under investigation.
The attack chain follows a common pattern seen in modern data breaches, leveraging human vulnerability before exploiting technical systems.
T1566 - Phishing. Given the context, this was likely a vishing attack (T1566.004) combined with smishing or email phishing to direct the employee to a malicious site.T1078 - Valid Accounts. This single point of failure allowed attackers to bypass perimeter defenses.T1087 - Account Discovery and T1082 - System Information Discovery.T1048 - Exfiltration Over Alternative Protocol or T1567 - Exfiltration Over Web Service. The 2.5GB size suggests a compressed archive was exfiltrated over a common protocol like HTTPS to avoid detection.This incident is a stark reminder that even with advanced blockchain technology, the human element remains the weakest link. The focus on "frictionless speed" mentioned by investigators often correlates with relaxed internal security controls that attackers are quick to exploit.
The business impact on Figure Technologies is multifaceted and severe. It includes immediate financial costs for incident response, legal fees, and providing credit monitoring services. The long-term impact involves significant reputational damage, loss of customer trust, and potential regulatory fines for failing to protect PII. The investigation by law firm Woods Lonergan PLLC indicates the potential for class-action lawsuits.
For the 967,000 affected customers, the impact is direct and personal. They face an elevated and long-term risk of:
Security teams can hunt for similar activity by monitoring for:
| Type | Value | Description |
|---|---|---|
log_source |
VPN & SSO Logs | Monitor for logins from unusual geolocations, multiple failed logins followed by a success, or logins outside of normal business hours. Correlate with MFA push notifications. |
network_traffic_pattern |
Large data egress | Alert on unusually large data transfers from internal servers to external, non-business-related IP addresses or cloud storage services. |
event_id |
Windows Event ID 4625 | Look for spikes in failed logon attempts (Event ID 4625) on internal systems, which could indicate attempts to use compromised credentials. |
process_name |
rclone.exe, megasync.exe |
Monitor for the execution of common data transfer tools on endpoints and servers where they are not expected. |
command_line_pattern |
7z.exe a -p... |
Hunt for command-line activity related to compressing large directories into password-protected archives, a common precursor to exfiltration. |
Detection Strategies:
Response Actions:
Immediate Actions:
Strategic Improvements:
Breach confirmed by Have I Been Pwned, affecting 967,000 customers. Incident occurred during company's secondary stock offering.
The Figure Technology Solutions data breach, involving the leak of nearly one million customer records by ShinyHunters, has been independently confirmed by the data breach notification service 'Have I Been Pwned'. The service added 967,000 unique email addresses to its database, validating the scope of the incident. Additionally, new reports indicate the breach occurred while Figure was managing a secondary stock offering, adding a layer of financial sensitivity to the timing of the attack. Figure's security team reportedly blocked compromised access quickly and engaged an external digital forensics firm for investigation.
Public data leak confirmed on Feb 21, 2026; initial access vector for the breach is now reported as undisclosed.
New reports confirm the public data leak by ShinyHunters occurred on February 21, 2026, affecting approximately 967,000 customers of Figure Technology Solutions. While previous reports detailed a social engineering attack as the initial access vector, recent information indicates the specific method of initial compromise has not been officially disclosed, leading to conflicting accounts regarding the breach's origin.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats