Major Wall Street Banks Exposed After Breach at Mortgage Vendor SitusAMC

Mortgage Tech Vendor SitusAMC Discloses Data Breach, Impacting Clients Like JPMorgan Chase and Citi

HIGH
November 22, 2025
5m read
Data BreachSupply Chain AttackIncident Response

Impact Scope

People Affected

Potentially millions of mortgage applicants

Industries Affected

FinanceRetailTechnology

Geographic Impact

United States (national)

Related Entities

Full Report

Executive Summary

SitusAMC, a pivotal vendor in the U.S. real estate finance ecosystem, has suffered a significant data breach. The company, which provides technology and services to hundreds of banks and lenders, announced on November 22, 2025, that it detected a cyberattack on November 12. The attackers gained unauthorized access to internal systems, compromising both corporate data and sensitive information belonging to the customers of its clients. Major Wall Street banks, including JPMorgan Chase, Citigroup, and Morgan Stanley, have been notified of their potential exposure. The FBI is now investigating the incident, which serves as a stark reminder of the profound supply chain risks inherent in the financial services industry.


Threat Overview

On November 12, 2025, SitusAMC became aware of unauthorized access to its network. The investigation, assisted by third-party forensic experts, confirmed that threat actors had compromised and accessed sensitive information. The company stated the incident did not involve ransomware, and its services remain operational. However, the scope of the data compromise is severe.

The breached data includes:

  • Corporate Information: Internal data related to SitusAMC's client relationships, such as accounting records and legal agreements.
  • Client Customer Data: This is the most critical aspect of the breach. As a major processor of mortgage loan applications, SitusAMC holds a vast trove of personally identifiable information (PII), which could include names, addresses, and Social Security numbers.

The incident is a classic example of a supply chain attack, where the compromise of a single, central vendor has a cascading impact on a multitude of its high-profile clients. The attackers targeted the "necessary plumbing" of the mortgage industry to gain access to data from some of the world's largest banks.

Technical Analysis

While specific technical details of the intrusion vector have not been disclosed, the nature of the attack points to a compromise of SitusAMC's internal network, leading to data exfiltration. The threat actors' decision not to deploy ransomware suggests their primary motive was data theft for the purpose of fraud, extortion, or sale on underground markets, rather than operational disruption.

Potential attack vectors could include:

Once inside, the attackers would have performed reconnaissance (T1087 - Account Discovery, T1082 - System Information Discovery) to locate valuable data stores and then exfiltrated the data (T1537 - Transfer Data to Cloud Account or T1041 - Exfiltration Over C2 Channel).

Impact Assessment

The impact of the SitusAMC breach is systemic. As a service provider for a significant portion of the mortgage industry, its compromise affects not only the company itself but also its extensive client base and, ultimately, millions of individual mortgage applicants.

  • Financial Institutions: Major banks like JPMorgan Chase, Citi, and Morgan Stanley now face reputational damage, regulatory scrutiny, and the costs associated with notifying their customers and providing credit monitoring services. While they were not directly hacked, their data was exposed due to their vendor's security failure.
  • SitusAMC: The company faces catastrophic reputational and financial damage, including loss of customer trust, potential lawsuits, and regulatory fines.
  • Individuals: The primary victims are the individuals whose sensitive personal and financial data was stolen. They are now at high risk of identity theft, financial fraud, and targeted phishing attacks.

This incident underscores the concentration risk in relying on a few key vendors for critical industry functions. The FBI's involvement signals the severity of the breach and its potential impact on the U.S. financial system.

IOCs

No specific Indicators of Compromise have been publicly released.

Cyber Observables for Detection

Since the breach occurred at a third-party vendor, direct detection by the affected banks is not possible. Detection relies on SitusAMC's internal security monitoring. For a similar incident, a company would hunt for:

Type Value Description Context Confidence
log_source Database Access Logs Monitor for unusual or large-scale queries against databases containing customer PII. Database Activity Monitoring (DAM) high
network_traffic_pattern Large egress data transfers Detect anomalous large data flows from internal servers to external destinations, especially those not on an allowlist. Network Security Monitoring, DLP high
user_account_pattern Anomalous access patterns A user account accessing data or systems outside of its normal job function or hours. SIEM, UEBA high
command_line_pattern 7z.exe a -p[password] archive.7z [data_folder] Attackers often use archiving tools to compress and encrypt data before exfiltration. EDR, Command-line logging medium

Detection & Response

For the affected financial institutions, the response is primarily driven by third-party risk management protocols.

  1. Communication: Establish a clear line of communication with the compromised vendor (SitusAMC) to understand the scope of the breach and which specific customers are affected.
  2. Impact Analysis: Work with the vendor to obtain a list of impacted individuals to initiate notification procedures as required by state and federal breach notification laws.
  3. Customer Support: Prepare to offer identity theft protection and credit monitoring services to affected customers to mitigate the potential harm.

Internally, this incident should trigger a review of all critical vendors. This is an application of D3-SDA: Session Duration Analysis and D3-UDTA: User Data Transfer Analysis, but applied to vendor connections rather than internal users.

Mitigation

Preventing such incidents requires a robust Third-Party Risk Management (TPRM) program.

  • Enhanced Due Diligence: Organizations must move beyond simple questionnaires. Conduct in-depth security assessments of critical vendors, including penetration tests and reviews of their incident response capabilities.
  • Contractual Obligations: Ensure that vendor contracts include strong security requirements, breach notification SLAs (Service Level Agreements), and the right to audit the vendor's security controls.
  • Data Minimization: Only share the absolute minimum amount of data required for a vendor to perform its function. This falls under the D3-ACH: Application Configuration Hardening principle.
  • Assume a Breach: Develop and test incident response plans that specifically address a breach at a critical third-party vendor. Know who to contact, what the legal obligations are, and how to manage customer communications.

Timeline of Events

1
November 12, 2025
SitusAMC first becomes aware of the cyberattack and unauthorized access to its systems.
2
November 22, 2025
SitusAMC publicly discloses the data breach and begins notifying affected clients.
3
November 22, 2025
This article was published

MITRE ATT&CK Mitigations

Regularly scan third-party vendors for vulnerabilities and security misconfigurations.

Isolate systems that process third-party data to limit the blast radius in case of a vendor compromise.

Mapped D3FEND Techniques:

Audit

M1047enterprise

Mandate that critical vendors provide audit logs and evidence of a robust security monitoring program.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

In the context of a supply chain breach like the one at SitusAMC, Application Configuration Hardening translates to rigorous vendor risk management and data minimization. Financial institutions must enforce a 'trust but verify' model with their vendors. This means contractually mandating that vendors like SitusAMC adhere to strict data handling standards. More importantly, it involves minimizing the data shared. For every vendor integration, organizations should conduct a data flow analysis to ensure only the absolute minimum required data is transmitted and stored by the third party. For example, if a vendor only needs to verify an applicant's name and address, they should not receive the Social Security Number. This principle of data minimization is a form of hardening the application (the business process) itself. By reducing the data footprint at the vendor, the impact of a potential breach is dramatically reduced.

While the affected banks could not directly monitor SitusAMC's internal network, SitusAMC itself could have used User Data Transfer Analysis to detect the exfiltration. This technique involves deploying Data Loss Prevention (DLP) and network monitoring tools to baseline and analyze data flows. For SitusAMC, this would mean establishing a baseline of normal data transfer patterns from their production servers. An alert should be configured to trigger if, for example, a large volume of data is transferred to an unknown external IP address, or if data is being moved out of the network using a non-standard protocol (e.g., FTP instead of a sanctioned API). This technique is crucial for detecting the final stage of a data breach—the exfiltration. By monitoring the egress points of the network for anomalous data movement, security teams can catch a breach in progress and potentially stop it before a significant amount of data is stolen.

Sources & References

Data Breach
SitusAMC (situsamc.com) November 22, 2025
SitusAMC Cyberattack May Expose Client Data of Major Banks
Phemex (phemex.com) November 22, 2025
Major Banks Alerted by SitusAMC to Potential Data Breach
Binance (binance.com) November 22, 2025

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

SitusAMCData BreachSupply Chain AttackJPMorgan ChaseCitigroupMorgan StanleyFinancial ServicesFBI

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading