967,000
On February 14, 2026, fintech firm Figure Technology Solutions, Inc. confirmed a significant data breach resulting from a targeted social engineering attack on an employee. The threat actor group ShinyHunters claimed responsibility, subsequently leaking a 2.5GB data trove on the dark web after the company reportedly refused to pay a ransom. The leaked data contains the personally identifiable information (PII) of approximately 967,000 customers, including full names, dates of birth, email addresses, physical addresses, and phone numbers. The incident highlights the effectiveness of social engineering as an initial access vector and underscores the severe consequences of a single credential compromise, particularly in organizations handling sensitive financial data.
The attack began with a sophisticated social engineering campaign, likely voice phishing (vishing), targeting a Figure employee. The attackers successfully manipulated the employee into divulging their credentials, granting them unauthorized access to Figure's internal systems. This access was then used to navigate the network and exfiltrate sensitive customer data.
ShinyHunters, a well-known data extortion group, followed its typical modus operandi: exfiltrate data, demand a ransom, and leak the data if the demand is not met. By publishing the data on their leak site, they aim to maximize reputational damage to the victim and pressure future victims into paying. The leaked information is highly valuable for other malicious actors, who can use it to conduct identity theft, targeted phishing campaigns, and other fraudulent activities. Some researchers suggest this attack may be part of a wider campaign targeting users of the single sign-on provider Okta, although this connection is still under investigation.
The attack chain follows a common pattern seen in modern data breaches, leveraging human vulnerability before exploiting technical systems.
T1566 - Phishing. Given the context, this was likely a vishing attack (T1566.004) combined with smishing or email phishing to direct the employee to a malicious site.T1078 - Valid Accounts. This single point of failure allowed attackers to bypass perimeter defenses.T1087 - Account Discovery and T1082 - System Information Discovery.T1048 - Exfiltration Over Alternative Protocol or T1567 - Exfiltration Over Web Service. The 2.5GB size suggests a compressed archive was exfiltrated over a common protocol like HTTPS to avoid detection.This incident is a stark reminder that even with advanced blockchain technology, the human element remains the weakest link. The focus on "frictionless speed" mentioned by investigators often correlates with relaxed internal security controls that attackers are quick to exploit.
The business impact on Figure Technologies is multifaceted and severe. It includes immediate financial costs for incident response, legal fees, and providing credit monitoring services. The long-term impact involves significant reputational damage, loss of customer trust, and potential regulatory fines for failing to protect PII. The investigation by law firm Woods Lonergan PLLC indicates the potential for class-action lawsuits.
For the 967,000 affected customers, the impact is direct and personal. They face an elevated and long-term risk of:
Security teams can hunt for similar activity by monitoring for:
| Type | Value | Description |
|---|---|---|
log_source |
VPN & SSO Logs | Monitor for logins from unusual geolocations, multiple failed logins followed by a success, or logins outside of normal business hours. Correlate with MFA push notifications. |
network_traffic_pattern |
Large data egress | Alert on unusually large data transfers from internal servers to external, non-business-related IP addresses or cloud storage services. |
event_id |
Windows Event ID 4625 | Look for spikes in failed logon attempts (Event ID 4625) on internal systems, which could indicate attempts to use compromised credentials. |
process_name |
rclone.exe, megasync.exe |
Monitor for the execution of common data transfer tools on endpoints and servers where they are not expected. |
command_line_pattern |
7z.exe a -p... |
Hunt for command-line activity related to compressing large directories into password-protected archives, a common precursor to exfiltration. |
Detection Strategies:
Response Actions:
Immediate Actions:
Strategic Improvements:
Breach confirmed by Have I Been Pwned, affecting 967,000 customers. Incident occurred during company's secondary stock offering.
Public data leak confirmed on Feb 21, 2026; initial access vector for the breach is now reported as undisclosed.
Train users to recognize and report phishing and social engineering attempts.
Implement phishing-resistant MFA (like FIDO2) to prevent credential abuse.
Implement strict egress filtering to block unauthorized data exfiltration to known malicious or personal cloud storage destinations.
Enforce the principle of least privilege to limit the impact of a compromised account.
Given that this breach stemmed from a credential compromise, implementing robust MFA is the single most effective countermeasure. Organizations should prioritize the rollout of phishing-resistant MFA, such as FIDO2 security keys or device-bound biometrics, for all employees, especially those with access to sensitive systems or data. This moves beyond less secure methods like SMS or push notifications, which are vulnerable to interception and MFA fatigue attacks. For Figure, this would mean requiring a hardware token or biometric verification for any access to internal customer databases or administrative panels, rendering the stolen password useless to the attacker without physical access to the employee's second factor. This directly counters the initial access vector used by ShinyHunters.
To prevent a similar data leak, organizations must control and monitor outbound network traffic. This involves configuring egress filtering rules on perimeter firewalls to deny all traffic by default and only allow connections to known-good, business-required destinations on specific ports. For a company like Figure, this means blocking access to all personal cloud storage (e.g., Mega, Dropbox), file-sharing sites, and anonymous proxies. Furthermore, deep packet inspection (DPI) and Data Loss Prevention (DLP) systems should be deployed to analyze the content of allowed outbound traffic, looking for patterns matching customer PII. An alert should have been triggered when a 2.5GB compressed file containing customer data was uploaded to an external server, allowing security teams to intervene before the breach was complete.
Deploying User Behavior Analysis (UBA) tools can detect when a compromised account behaves anomalously. After ShinyHunters gained access, the account would have performed actions outside its normal baseline, such as accessing a large customer database it doesn't usually touch, running data compression tools, or initiating a large data transfer. A UBA system would flag these deviations—such as 'access from a new geolocation,' 'unusual file access volume,' and 'first time running 7z.exe'—and generate a high-fidelity alert. This allows the security team to investigate and lock the account before significant data exfiltration occurs, acting as a critical internal safety net when perimeter defenses fail.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats