Mar 172018

RJ Marquez reports:

Frost Bank is investigating a breach after the company discovered unauthorized access to digital images stored in those customers’ commercial image archives.

The San Antonio based-bank issued a statement that said Frost detected the unauthorized access to a third-party lockbox software program earlier this week and immediately launched an investigation.

The software allowed unauthorized users to view and copy images of checks stored electronically.

Read more on KSAT.

Frost Bank’s statement:

Today, bankers at Frost Bank, a subsidiary of Cullen/Frost Bankers, Inc. (NYSE: CFR) will start briefing commercial lockbox customers about a recently discovered unauthorized access to digital images stored in those customers’ commercial image archives.

Earlier this week, Frost detected the unauthorized access to a third-party lockbox software program and immediately launched an investigation and started taking remediation actions. We have stopped the identified unauthorized access and are working with a leading cybersecurity firm. We have reported the incident to, and are cooperating with, law-enforcement authorities and our investigation is ongoing. We are contacting each of the affected commercial customers and will be working with them to support them in taking appropriate actions. The identified incident did not impact other Frost systems.

“At Frost, we care deeply about taking care of our customers and protecting their information, and we regret that this situation has occurred,” said Frost Chairman and CEO Phil Green. “We are working very hard to make things right.”

People with questions or concerns should contact their Frost banker, call Frost’s 24-hour customer service line at 800-513-7678, or refer to the FAQs on our website at

Cullen/Frost Bankers, Inc. (NYSE: CFR) is a financial holding company, headquartered in San Antonio, with $31.7 billion in assets at Dec. 31, 2017. One of the 50 largest U.S. banks, Frost provides a wide range of banking, investments and insurance services to businesses and individuals across Texas in the Austin, Corpus Christi, Dallas, Fort Worth, Houston, Permian Basin, Rio Grande Valley and San Antonio regions. Founded in 1868, Frost has helped clients with their financial needs during three centuries. Additional information is available at

Forward-Looking Statements and Factors that Could Affect Future Results

Certain statements contained in this Press Release or made by authorized officers with respect to the subject matter of this Press Release that are not statements of historical fact may constitute forward-looking statements within the meaning of the Private Securities Litigation Reform Act of 1995, notwithstanding that such statements are not specifically identified as such. Forward-looking statements involve risks and uncertainties that may cause actual results to differ materially from those in such statements.  The foregoing forward-looking statements are based on certain factors and assumptions and may prove to be incorrect. The foregoing, as well as various risk factors, are described in our filings with the Securities and Exchange Commission including in our Forms 10‑K and 10‑Q, to which reference is made. Additional factors include the final results of our investigation as well as the ultimate impact of the foregoing on our customers. Forward-looking statements speak only as of the date on which such statements are made. We do not undertake any obligation to update any forward-looking statement to reflect events or circumstances after the date on which such statement is made, or to reflect the occurrence of unanticipated events.

SOURCE Frost Bank

UPDATE:  From the City of Corpus Christi via KRIS-TV:

The City of Corpus Christi learned late Friday afternoon of unauthorized access to images of scanned documents, including checks, belonging to Frost Bank commercial customers. The City has three commercial accounts maintained by Frost Bank including EMS and utility payment processing.

“We know very little at this time about the investigation being conducted by the FBI and Secret Service regarding the Frost Bank security breach,” said Constance P. Sanchez, Finance Director. “We want our customers to monitor their bank accounts as a precaution. At this time, we do not know the extent of the breach or if any of our customers are impacted,” added Sanchez.  The following Frost Bank lock boxes are used by the City of Corpus Christi:

P.O. Box 659880, San Antonio, Texas 78265-9143

P.O. Box 659722, San Antonio, Texas 78265-9722

P.O. Box 34627, San Antonio, Texas 78265-4627

Customers having mailed payments to any of the addresses above should monitor their bank accounts closely until more information is available concerning the Frost Bank security breach. Customers who pay in-person, online or by third-party payment processors, like H-E-B or Western Union, are not affected by this breach.

As the City is made aware of additional details regarding the Frost Bank investigation, we will notify our customers.

Feb 232018

Brian Krebs reports:

Multiple customers have reported logging in to their bank accounts, only to be presented with another customer’s bank account details. Chase has acknowledged the incident, saying it was caused by an internal “glitch” Wednesday evening that did not involve any kind of hacking attempt or cyber attack.

Trish Wexler, director of communications for the retail side of JP Morgan Chase, said the incident happened Wednesday evening, for “a pretty limited number of customers” between 6:30 pm  and 9 pm ET who “sporadically during that time while logged in to could see someone else’s account details.”


Feb 222018

Riddhi Mukherjee reports:

It turns out that Punjab National Bank (PNB), which is currently reeling under the Nirav Modi fraud case, had also suffered a data breach, which affected 10,000 credit and debit card customers, reports Asia Times. The leaked data includes customer names, expiry dates of cards, personal ID numbers and CVV numbers. This data was available on a website on the dark web for at least three months, but it’s not clear if it was misused or not.

Read more on Medianama.

Feb 182018

Notice of Data Breach

On January 19, 2018, HomeTown Bank, N.A. (“HomeTown”) discovered that a skimming/shimming device had been placed on an ATM at the bank’s branch located at 4424 Seawall Blvd, Galveston, TX 77551. Upon learning of the incident, HomeTown promptly launched an investigation and notified law enforcement. HomeTown believes that this incident affected only those individuals who conducted card transactions at the subject ATM 2:00 pm on January 18, 2018 and 2:00 pm on January 19, 2018.

The device may have acquired the following of the affected individuals’ personal information that was stored on the cards used in connection with such transactions during the relevant time period: individuals’ names, card numbers, card expiration dates and personal identification numbers (PINs). HomeTown’s core banking systems were not compromised or impacted as a result of this incident.

Safeguarding the personal information of our members remains of the utmost importance to HomeTown, and the bank has already begun taking measures to help prevent this type of incident from occurring in the future.

Individuals who believe that they may have been impacted by this incident and have questions regarding this incident may contact us at 409-763-1271 ext. 3060 Monday thru Thursday from 8:30 AM to 5:00 PM CST, Friday from 8:30 AM. – 6:00 PM CST and Saturday from 9:00 AM to 12:00 PM CST .

Source: February 17, 2017.  Galveston County The Daily News.

Feb 182018

Ouch. Catalin Cimpanu reports:

In what many consider to be a monumental failure on the part of UK police, the ringleader of a notorious ATM skimming gang has escaped prosecutors and is believed to be hiding abroad, after being let out on bail.

Despite absconding UK authorities in the middle of legal procedures, the suspect’s trial continued, and a jury found the suspect —Alexandru Sovu, 39, of Romania— guilty. A Crown Court judge sentenced the man to 11 years in prison earlier this week.

Read more on BleepingComputer.

via @neirajones