672,075
Marquis, a Texas-based marketing and compliance solutions provider for the financial sector, has updated its data breach notification, confirming that 672,075 individuals were impacted by a cyberattack discovered in August 2025. This figure, disclosed to the Maine Attorney General's Office, is a revision from earlier, wider estimates. The attackers gained access to Marquis' systems by exploiting a vulnerability in a SonicWall firewall, allowing them to exfiltrate a vast trove of sensitive data belonging to customers of the 700 banks and credit unions Marquis serves. The data includes Social Security numbers and financial account information. The Akira ransomware group is suspected of being responsible, highlighting the severe risks of supply chain attacks in the financial industry.
The incident is a classic supply chain attack where a single vendor compromise led to a widespread data breach affecting hundreds of downstream financial institutions and their customers. The breach was first detected in August 2025 but was not widely reported until December 2025.
T1190 - Exploit Public-Facing Application).T1567 - Exfiltration Over Web Service). The involvement of a ransomware group suggests data was also likely encrypted (T1486 - Data Encrypted for Impact) as part of a double-extortion scheme.The attack follows a common ransomware playbook targeting network edge devices:
The breach has a significant impact on multiple levels:
This incident is a powerful illustration of concentration risk in the supply chain. The compromise of a single, widely-used vendor can have a cascading impact across an entire industry, demonstrating that an organization's security is only as strong as that of its least secure partner.
These are general observables for detecting attacks exploiting firewall vulnerabilities:
| Type | Value | Description |
|---|---|---|
| log_source | Firewall Logs | Monitor for exploit signatures, anomalous login attempts (brute force, credential stuffing), or unexpected configuration changes. |
| network_traffic_pattern | Large Outbound Data Transfers | Unusually large data flows from internal servers to unknown external IP addresses, especially during off-hours. |
| url_pattern | /cgi-bin/viewcert |
Example of a URL path on SonicWall devices that has been associated with past vulnerabilities. Monitor for anomalous requests. |
| process_name | sslvpn_webservice.jar |
A component of SonicWall SSL-VPNs that has been a target of past exploits. |
Maintain a strict patch management schedule for all internet-facing network appliances, especially firewalls.
Mapped D3FEND Techniques:
Segment the network to prevent attackers who compromise a perimeter device from easily accessing sensitive data stores.
Mapped D3FEND Techniques:
Encrypt sensitive data at rest to ensure that even if exfiltrated, it remains unusable to attackers without the decryption keys.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats