SitusAMC Nears Completion of Data Breach Investigation from November 2025 Incident

SitusAMC Issues Update on November 2025 Data Breach, Consumer Notifications Imminent

HIGH
February 12, 2026
4m read
Data BreachSupply Chain AttackIncident Response

Related Entities

Other

SitusAMC JPMorgan ChaseCitiMorgan Stanley

Full Report

Executive Summary

On February 12, 2026, SitusAMC, a pivotal vendor providing technology and services to the real estate finance sector, provided an update on a significant data security incident that was initially detected on November 12, 2025. The company is now in the final stages of its data review and will begin mailing notification letters to affected consumers shortly. The breach compromised corporate data, including legal and accounting records, and, critically, may have exposed sensitive personal and financial data belonging to the customers of SitusAMC's clients, which include major financial institutions like JPMorgan Chase and Citi. The incident underscores the profound third- and fourth-party risks inherent in the financial services ecosystem, where a compromise at one vendor can have widespread consequences.

Incident Timeline

  • November 12, 2025: SitusAMC detects unauthorized access to its network and initiates an investigation with third-party cybersecurity experts. Federal law enforcement is notified.
  • November 24, 2025: Initial reports emerge about the breach, highlighting the potential exposure of data from over 100 financial institutions.
  • February 12, 2026: SitusAMC issues a public update, stating the data review is nearing completion and that notifications to affected individuals are forthcoming.

Response Actions

Upon discovering the intrusion, SitusAMC took immediate action to contain the threat. The company's response included:

  • Containment: Eradicating the threat actor from its environment and securing its systems.
  • Investigation: Engaging leading cybersecurity firms to determine the scope and nature of the breach.
  • Notification: Informing federal law enforcement and maintaining direct communication with its affected clients.
  • Data Review: Conducting an expedited, comprehensive review of the compromised data to identify the specific individuals and information involved. This is a complex process given SitusAMC's role in handling loan documents from numerous financial institutions.

SitusAMC has explicitly stated that the incident did not involve ransomware.

Technical Findings

While specific technical details about the attack vector have not been publicly disclosed, the nature of the breach points to a sophisticated intrusion aimed at data exfiltration. The attackers targeted and successfully accessed corporate data, including accounting records and legal agreements, as well as client data. The lack of ransomware suggests the threat actor's primary motive was likely data theft for the purpose of espionage, future targeted attacks, or sale on the dark web.

Impact Assessment

The impact of the SitusAMC breach is a textbook example of supply chain risk. As a service provider to major banks, SitusAMC processes and stores a vast amount of highly sensitive data, including:

  • Personally Identifiable Information (PII): Social Security numbers, employment records.
  • Sensitive Financial Information: Loan details, financial account numbers.

A compromise at SitusAMC means that dozens or even hundreds of financial institutions and their millions of customers could be affected, even though the banks themselves were not directly breached. This creates a complex notification and remediation challenge. Affected individuals are at increased risk of identity theft, loan fraud, and sophisticated phishing attacks. For the financial institutions, the breach results in reputational damage, regulatory scrutiny, and potential liability, despite the fault lying with their vendor.

Lessons Learned

This incident serves as a critical reminder of the importance of third- and fourth-party risk management. Key lessons include:

  • Vendor Due Diligence: Financial institutions must conduct thorough security assessments of their critical vendors before and during engagement.
  • Contractual Obligations: Contracts with vendors must include clear clauses regarding security requirements, breach notification timelines, and liability.
  • Visibility: Organizations need visibility into their vendors' security posture (third-party risk) and their vendors' vendors (fourth-party risk).

Mitigation Recommendations

For organizations that are clients of SitusAMC or similar vendors:

  1. Review Vendor Security: Immediately re-evaluate the security posture of all critical third-party vendors. Request and review their latest security audits (e.g., SOC 2 reports) and penetration test results.
  2. Strengthen Contractual Language: Ensure that vendor contracts mandate immediate notification of security incidents and specify the level of detail required in such notifications.
  3. Data Minimization: Share only the absolute minimum amount of data necessary for a vendor to perform its function. Question and push back on any requests for excessive data.
  4. Incident Response Planning: Update incident response plans to specifically include scenarios involving a major supply chain breach. The plan should outline steps for communicating with the vendor, notifying customers, and managing regulatory reporting.

Timeline of Events

1
November 12, 2025
SitusAMC detects a security incident and begins its investigation.
2
February 12, 2026
SitusAMC announces its data review is in the final stages and consumer notifications will be sent out.
3
February 12, 2026
This article was published

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

SitusAMCData BreachSupply Chain AttackFinancial ServicesThird-Party Risk

📢 Share This Article

Help others stay informed about cybersecurity threats