Names, addresses, phone numbers, account balances, may have been exposed.

SunTrust Bank said a former employee may have stolen names, addresses, phone numbers, and account balances of some 1. million of its clients. 

The employee tried to download the client contact information six- to eight weeks ago in an attempt to provide the to a criminal from outside the organization, Reuters reports.

SunTrust CEO William Rogers in an earnings call said there was no indication of fraudulant activity using the client information, and it appears the data had not been sent outside the bank.

The bank is now offering identity protection services to all of its customers for the “potential data ,” according to a press announcement from SunTrust. 

“The became aware of potential theft by a former employee of information from some of its contact lists. Although the investigation is ongoing, SunTrust is proactively notifying approximately 1.5 million clients that certain information, such as name, address, phone number and certain account balances may have been exposed,” the bank said in a press statement. “The contact lists did not include personally identifying information, such as social number, account number, PIN, User ID, password, or driver’s license information. SunTrust is also working with outside and coordinating with law enforcement.”

Read more here  and here.

Interop ITX 2018  -  7Bc4ea0bb7 059e 4ef6 a860 71a7f500d0da 7D InteropITX18 Logo HorizDates Color383 - SunTrust Ex-Employee May Have Stolen Data on 1.5 …

Join Dark Reading LIVE for two summits at Interop ITX. Learn from the industry’s most knowledgeable IT security experts. Check out the security track here. Register with Promo Code DR200 and save $200.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

More Insights

Source link

No tags for this post.


Please enter your comment!
Please enter your name here