Data leak

Citigroup Direct Web Application Breach β€” 360K Accounts

πŸ“… 2011-04-01
Primary Source β†—

Incident Details

In May 2011 (discovered internally, disclosed June 2011), hackers breached Citigroup’s online banking portal by exploiting a straightforward insecure direct object reference (IDOR) vulnerability β€” also described as a basic URL manipulation attack. The bank’s website used customer account numbers as a component in the URL for account pages, and the attackers discovered they could cycle through account numbers by modifying the URL to view other customers’ account information. By automating this enumeration, they accessed account data for approximately 360,000 North American credit card customers. Exposed data included names, account numbers, email addresses, and transaction history. Citigroup discovered the breach in early May 2011 but waited until June 9 to disclose it. The delay drew criticism from regulators and consumer advocates. The attackers reportedly stole approximately $2.7 million from accounts before being stopped. The breach is notable for its technical simplicity β€” a basic OWASP Top 10 class vulnerability β€” in a major financial institution, and for Citi’s disclosure delay despite a known regulatory obligation to promptly notify. The FBI investigated and multiple arrests were made.

Technical Details

Initial Attack Vector
Direct web application attack β€” hackers exploited an insecure direct object reference (IDOR) vulnerability in Citi's online banking portal by manipulating account numbers embedded in the site URL, allowing them to access other customers' account pages without authorization

Timeline

  1. 2011-04-01 Breach occurred
  2. 2011-06-09 Publicly disclosed
  3. 2011-06-09 Customers notified