The Polish government has officially confirmed a large-scale data breach at SuperGrosz, an online loan platform operated by AIQLABS. Announced on November 2, 2025, by Poland's Deputy Prime Minister, the incident is described as "very serious" and involves the theft of extensive personal and financial data. Compromised information includes highly sensitive identifiers like national PESEL numbers, ID card series, bank account numbers, and employment details. The breach poses a significant and immediate threat of identity theft and financial fraud to SuperGrosz customers. National cybersecurity agencies have initiated a full investigation, and the government is actively advising citizens on protective measures.
The breach at SuperGrosz represents a critical failure in the protection of customer data within the financial services sector. The stolen data is a treasure trove for criminals, encompassing everything needed to perpetrate identity theft: full names, PESEL numbers, ID card details, addresses, phone numbers, bank accounts, and even personal details like marital status and employer contacts. The Polish government's swift and high-level response, involving CSIRT KNF (financial sector CERT) and CSIRT NASK (national research network CERT), underscores the severity of the incident. The government has urged affected individuals to use the mObywatel mobile app to block their PESEL number, a unique feature of the Polish system designed to combat identity fraud.
The source articles do not specify the attack vector, but breaches of this nature at financial service platforms typically follow common patterns. The most probable TTPs include:
T1190 - Exploit Public-Facing Application. This could involve common web flaws like SQL injection, remote code execution, or insecure direct object references (IDOR).T1005 - Data from Local System if the database was on a compromised server or T1213 - Data from Information Repositories if they accessed a dedicated database server.T1048 - Exfiltration Over Alternative Protocol to evade detection by standard network monitoring tools.The breadth of the compromised data, from financial details to Facebook identifiers, suggests the attackers gained access to a primary, poorly-segmented customer database, highlighting a potential lack of data minimization and internal security controls.
No specific IOCs were provided in the source articles.
Security teams at similar financial institutions should hunt for:
| Type | Value | Description |
|---|---|---|
| log_source | Web Application Firewall (WAF) Logs | Look for patterns of SQL injection (' OR 1=1--), path traversal (../../), or other common web attack signatures. |
| log_source | Database Access Logs | Monitor for unusual queries, especially SELECT * from large customer tables, or access from non-standard application service accounts. |
| network_traffic_pattern | Database Backup Exfiltration | Alert on large, sustained outbound data flows from database servers to unknown external destinations, especially if compressed (.zip, .gz). |
| process_name | mysqldump, sqlcmd |
Monitor for execution of database dump utilities on web servers or other non-database systems. |
D3-DA - Dynamic Analysis of database transactions.D3-FE - File Encryption and D3-DENCR - Disk Encryption. Even if attackers breach the system, encrypted data is useless without the decryption keys.Implementing a Web Application Firewall (WAF) and secure coding practices to prevent exploitation of web vulnerabilities.
Encrypting sensitive data like PESEL numbers at rest in the database to render it useless if stolen.
SuperGrosz must conduct a thorough security review of its web application's configuration, focusing on secure coding practices to prevent injection flaws. This involves enforcing parameterized queries (prepared statements) for all database interactions to eliminate SQL injection risks. All user-supplied input must be strictly validated on the server-side against an allowlist of expected formats and characters. This hardening process directly mitigates the most likely initial access vector for this type of financial data breach and is a foundational control for any public-facing application handling sensitive data.
The platform must implement strong, column-level encryption for all highly sensitive data within its databases, especially for fields containing PESEL numbers, ID card details, and bank account numbers. This serves as a critical compensating control. In the event of a breach where attackers successfully exfiltrate the database files, the most sensitive information remains protected and unusable without access to the corresponding decryption keys. Key management becomes paramount; encryption keys must be stored separately from the data, for example in a dedicated Hardware Security Module (HSM), with tightly controlled access.
A properly configured Web Application Firewall (WAF) should be deployed in front of the SuperGrosz web application. The WAF should be configured in blocking mode with up-to-date rulesets to filter and block common web attack patterns, such as SQL injection, cross-site scripting (XSS), and path traversal attempts. This provides a crucial layer of defense by preventing malicious requests from ever reaching the application server, significantly reducing the attack surface and protecting against the exploitation of both known and some unknown vulnerabilities.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats