FindArticles FindArticles
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
FindArticlesFindArticles
Font ResizerAa
Search
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
Follow US
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
FindArticles © 2025. All Rights Reserved.
FindArticles > News

Marquis Alerts Banks and Credit Unions of Data Breach

Gregory Zuckerman
Last updated: December 3, 2025 8:36 pm
By Gregory Zuckerman
Technology
7 Min Read
SHARE

Marquis, a U.S. provider of fintech services, is alerting dozens of banks and credit unions that their customer data was accessed after they were hit by a ransomware attack, increasing third-party risk fears in the financial sector.

Filings to state data-breach regulators indicate the attack took place on August 14 and led to the theft of sensitive personal and financial data. The company is still trying to figure out what hackers accessed, a company spokeswoman said. Officials in Texas say at least 354,000 residents are affected; a filing made with the Maine attorney general says customers of the Maine State Credit Union make up the majority of notifications in that state. The total is among the highest in all the states, and is likely to increase as other states release their disclosures.

Table of Contents
  • What data was stolen and why it matters for consumers
  • Ransomware Entry Point Linked to SonicWall Flaw
  • Notifications to customers and rising regulatory pressure
  • What customers should do right now to protect accounts
  • An ongoing third-party risk trend for financial firms
Marquis alerts banks and credit unions to data breach

Marquis, which is based in Texas and provides compliance and marketing analytics tools to financial institutions, has more than 700 banks and credit unions as customers. Because Marquis collects and processes customer records, the company holds very sensitive information that gives it great appeal to criminal groups looking for leverage and easily monetizable data.

What data was stolen and why it matters for consumers

According to notices sent by the company to state regulators, the attackers obtained names, dates of birth, mailing addresses, and financial information, including bank account, debit card, and credit card numbers, as well as Social Security numbers.

The combination of identifiers and financial information increases the threat of identity theft, account takeover, and synthetic identity fraud. Javelin Strategy & Research has put identity fraud losses in the tens of billions of dollars a year, while the financial sector is perennially among the costliest industries for breaches, according to IBM’s latest Cost of a Data Breach Report.

Even if payment cards are reissued relatively promptly, Social Security numbers and birth dates are persistent credentials for criminals, allowing long-tail fraud that can come to fruition months after an incident. That persistent risk is why regulators and banks are placing a greater focus on continuous monitoring rather than one-time remediation.

Ransomware Entry Point Linked to SonicWall Flaw

Marquis said in conversations with state investigators that this incident was the result of a zero-day exploit affecting SonicWall firewalls they used. Zero-day attacks are particularly harmful as defenders have no patch or signature at the moment of exploit, giving attackers a “head start”.

Though Marquis did not identify the attackers, security researchers believe the Akira ransomware gang was associated with mass exploitation operations against SonicWall appliances around that time. U.S. agencies including CISA and the F.B.I. have also issued warnings on those groups’ predilection for edge devices — VPNs, firewalls, email gateways — since a single misconfiguration or unpatched flaw can provide deep access to networks.

The incident underscores a trend we’re seeing more and more: rapid weaponization of bugs in perimeter gear with weeks or even days — scant hours — standing between public disclosure and exploitation. Recent offensive operations against commercially available devices from a range of vendors have served to highlight the requirement for robust change controls, network segmentation, and fast patch pipelines in respect of internet-facing systems.

A movie poster for Marquis with a dark, cave-like background. The title MARQUIS is prominently displayed in white at the top. Below it, a figure resembling a dog-headed human in period clothing is seated on the ground, holding a piece of paper. The bottom of the poster includes text in French, UN FILM RÉVOLUTIONNAIRE POUR CRÉATURES HARDCORE EN DVD LE 4 MAI 2004, along with a DVD logo and other production credits.

Notifications to customers and rising regulatory pressure

Marquis is informing affected institutions and affected individuals in accordance with state breach notification laws. Many banks are also subject to sector-specific expectations: New York Department of Financial Services’ cybersecurity rule mandates expedited reporting for certain incidents, while federal banking regulators’ third-party risk guidance demands that firms attest to reviewing vendors’ security controls and incident response readiness.

For banks and credit unions, next steps might include:

  • Review audit logs
  • Rotate credentials shared with the vendor
  • Restrict access to any systems connected to Marquis
  • Revalidate compensating controls

Boards and risk committees will be looking for evidence of segmentation, data minimization, and a logistical plan to reduce the “blast radius” when a vendor is compromised.

What customers should do right now to protect accounts

Customers of affected institutions should look for breach notifications and what categories of data were exposed. If SSNs were included, you should freeze your credit with the three major bureaus instead of a fraud alert.

  • Check bank and card accounts for unauthorized transactions
  • Turn on account alerts for withdrawals, transfers, and logins
  • Change online banking passwords, especially if reused elsewhere
  • Watch out for targeted phishing that mentions your bank; attackers frequently move from data theft to social engineering

Tax-related identity protection — such as an IRS Identity Protection PIN — can prevent fraudulent returns if SSNs were stolen. If your data was misused, file an identity theft report with the FTC and contact your bank right away.

An ongoing third-party risk trend for financial firms

The Marquis breach follows a trend seen in other massive incidents in which one vendor acts as a force multiplier. Supply-chain compromises and mass exploitation of heavily used software — as with the recent MOVEit hack, and earlier vulnerabilities in email and firewall appliances — have forced banks to rethink concentration risk, or “fourth-party” dependencies.

Financial regulators and industry groups have repeatedly warned firms to inventory critical vendors, test incident response with realistic tabletop exercises, and adopt “assume breach” architectures that restrict vendor permissions to the fewest possible. As the investigations unfold, organizations that are part of the Marquis ecosystem will be assessed by how fast they can limit exposure and firm up controls — because in today’s risk landscape, resiliency is (at least in part) measured by a clock ticking just hours and days — not weeks.

Gregory Zuckerman
ByGregory Zuckerman
Gregory Zuckerman is a veteran investigative journalist and financial writer with decades of experience covering global markets, investment strategies, and the business personalities shaping them. His writing blends deep reporting with narrative storytelling to uncover the hidden forces behind financial trends and innovations. Over the years, Gregory’s work has earned industry recognition for bringing clarity to complex financial topics, and he continues to focus on long-form journalism that explores hedge funds, private equity, and high-stakes investing.
Latest News
YouTube rolls out Expressive Captions across platforms
Amazon Alexa Plus scene jumping arrives on Fire TV
Headway Premium Is $40 in Cyber Week Deal
First Look at Samsung TriFold Makes Galaxy Z Fold 7 Shoppers Happy!
Energy Department Awards $800M To Small Reactors
Anthropic lawyers up with Wilson Sonsini ahead of 2026 IPO
Samsung Odyssey G7 40-Inch Hits 42% Off Lowest Price Ever
Anker Solix F2000 Tumbles 58% In Huge Deal
AT&T Calls Off DEI Programs in Wake of FCC Review
Garmin paywalls its Wrapped-style Connect Rundown
U.S. Receives Android In-Call Scam Protection
Spotify 2025 Wrapped Shocks Fans After 2024 Backlash
FindArticles
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
  • Corrections Policy
  • Diversity & Inclusion Statement
  • Diversity in Our Team
  • Editorial Guidelines
  • Feedback & Editorial Contact Policy
FindArticles © 2025. All Rights Reserved.