672,075
Marquis, a Texas-based marketing and compliance solutions provider for the financial sector, has updated its data breach notification, confirming that 672,075 individuals were impacted by a cyberattack discovered in August 2025. This figure, disclosed to the Maine Attorney General's Office, is a revision from earlier, wider estimates. The attackers gained access to Marquis' systems by exploiting a vulnerability in a SonicWall firewall, allowing them to exfiltrate a vast trove of sensitive data belonging to customers of the 700 banks and credit unions Marquis serves. The data includes Social Security numbers and financial account information. The Akira ransomware group is suspected of being responsible, highlighting the severe risks of supply chain attacks in the financial industry.
The incident is a classic supply chain attack where a single vendor compromise led to a widespread data breach affecting hundreds of downstream financial institutions and their customers. The breach was first detected in August 2025 but was not widely reported until December 2025.
T1190 - Exploit Public-Facing Application).T1567 - Exfiltration Over Web Service). The involvement of a ransomware group suggests data was also likely encrypted (T1486 - Data Encrypted for Impact) as part of a double-extortion scheme.The attack follows a common ransomware playbook targeting network edge devices:
The breach has a significant impact on multiple levels:
This incident is a powerful illustration of concentration risk in the supply chain. The compromise of a single, widely-used vendor can have a cascading impact across an entire industry, demonstrating that an organization's security is only as strong as that of its least secure partner.
These are general observables for detecting attacks exploiting firewall vulnerabilities:
/cgi-bin/viewcertsslvpn_webservice.jarMaintain a strict patch management schedule for all internet-facing network appliances, especially firewalls.
Mapped D3FEND Techniques:
Segment the network to prevent attackers who compromise a perimeter device from easily accessing sensitive data stores.
Mapped D3FEND Techniques:
Encrypt sensitive data at rest to ensure that even if exfiltrated, it remains unusable to attackers without the decryption keys.
Mapped D3FEND Techniques:
Marquis discovers a data breach after attackers exploit a SonicWall firewall vulnerability.
The data breach incident at Marquis is first publicly reported.
Marquis discloses to the Maine Attorney General's Office that 672,075 individuals were affected by the breach.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.