Tens of thousands (at least 42,784 in Maine alone)
A significant supply chain data breach has impacted the U.S. financial sector following a ransomware attack on Marquis Software Solutions, a Texas-based marketing vendor. On November 26, 2025, Marquis began informing its clients—dozens of U.S. banks and credit unions—that a network intrusion first detected on August 14, 2025, resulted in the compromise of sensitive customer data. The exposed information includes names, Social Security numbers (SSNs), financial account information, and other PII. This incident is a classic supply chain attack where the vendor, not the financial institutions themselves, was the point of failure. The breach affects a large number of individuals, with one filing indicating over 42,000 victims in Maine alone. Marquis is working with law enforcement and providing identity theft protection services to those affected.
The attack targeted Marquis Software Solutions, which provides data analytics and marketing services to financial institutions. By compromising this single vendor, the attackers gained access to a treasure trove of aggregated customer data from many different banks. The incident was identified as a ransomware attack, which implies a double-extortion scenario: attackers likely exfiltrated the data before encrypting Marquis' systems. The long delay between the detection in August and the public notification in November is concerning and may have given attackers ample time to misuse the stolen data. The compromised data is of the highest sensitivity, making it extremely valuable on the dark web for identity theft, financial fraud, and targeted phishing campaigns.
The initial vector for the ransomware attack on Marquis is unknown but likely involved common methods such as a phishing email, exploitation of an unpatched vulnerability, or compromised remote access credentials. The attack chain would have followed a standard pattern:
T1213 - Data from Information Repositories).T1048 - Exfiltration Over Alternative Protocol).T1486 - Data Encrypted for Impact).The core of this incident from the banks' perspective is a failure of third-party risk management, falling under T1199 - Trusted Relationship, where the trust placed in Marquis was exploited.
T1199 - Trusted Relationship: The core of the supply chain attack, where banks were impacted via their vendor.T1213 - Data from Information Repositories: Attackers targeted and stole data from Marquis' databases.T1567 - Exfiltration Over Web Service: A likely method for exfiltrating terabytes of customer data.T1486 - Data Encrypted for Impact: The attack was identified as a ransomware incident.The impact on the affected bank customers is severe. The theft of SSNs, financial account information, and other PII puts them at high risk of identity theft, loan fraud, and account takeovers for years to come. For the affected banks and credit unions, such as CoVantage Credit Union, the incident causes significant reputational damage and erodes customer trust, even though their own systems were not breached. They will also face increased operational costs from customer support and fraud monitoring. For Marquis, the financial and legal repercussions will be substantial, including the cost of recovery, potential lawsuits from both clients and individuals, and a devastating loss of business. This event is a powerful illustration of the systemic risk inherent in modern digital supply chains.
For financial institutions to detect potential breaches at their vendors:
| Type | Value | Description |
|---|---|---|
| other | Third-party risk intelligence feeds | Monitor for reports of breaches or security incidents at critical vendors. |
| other | Dark web monitoring | Scan for mentions of the vendor or the institution's data on criminal forums. |
| network_traffic_pattern | Anomalous API access patterns from vendor IP ranges. | A sudden spike in data access from a vendor could indicate a problem on their end. |
Financial institutions often have limited visibility into their vendors' security, making direct detection difficult. The primary 'detection' method is often the breach notification from the vendor itself. However, organizations can be more proactive. Continuous monitoring of third-party risk through specialized services can provide early warnings. Response to a vendor breach involves activating the incident response plan, communicating clearly with customers, providing them with credit monitoring and support, and reviewing the legal and contractual relationship with the compromised vendor. Internally, security teams should monitor for any signs that the breached data is being used to target their own systems or customers (e.g., in sophisticated phishing campaigns).
Co-Vantage Credit Union confirms 160,000 members affected by Marquis breach, with new details on discovery timeline and legal actions.
Co-Vantage Credit Union has confirmed 160,000 members were impacted by the Marquis Software Solutions data breach. The incident, which occurred on August 14, 2025, was discovered by the vendor on October 27, 2025, a delay of over two months. Affected members are being offered 24 months of identity theft protection via Epiq Privacy Solutions. The breach has also prompted investigations by class-action law firms, highlighting increased legal repercussions and a significantly larger confirmed victim count for a single institution.
Akira ransomware gang suspected in Marquis Software breach, impacting over 400,000 customers across 74 banks via SonicWall vulnerabilities.
New details reveal the Akira ransomware gang is suspected behind the Marquis Software Solutions breach. The attack, which now affects over 400,000 customers across 74 financial institutions, reportedly leveraged vulnerabilities in SonicWall firewall devices for initial access. This update significantly expands the scope of victims and provides critical attribution and technical insights into the supply chain attack.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats