Data leak
JPMorgan Chase Breach β 83 Million Accounts (Russia-Linked)
Primary Source βIncident Details
In June 2014, a sophisticated hacking group breached JPMorgan Chase’s network and maintained access until it was discovered approximately in August 2014. The attackers accessed data on approximately 76 million households and 7 million small businesses (83 million total account holders), making it one of the largest financial institution breaches on record. Exposed data included contact information β names, addresses, phone numbers, email addresses β but notably did not include Social Security numbers, account numbers, passwords, or financial information. JPMorgan reported no evidence of fraud resulting directly from the breach. The initial entry point was a single server that had not been upgraded to two-factor authentication, despite a bank-wide security initiative to do so. The attack was attributed by U.S. law enforcement to a group of Russian-speaking individuals: Gery Shalon, Joshua Samuel Aaron, and Ziv Orenstein, who were indicted in 2015 on charges including computer fraud. The breach was alleged to be part of a broader criminal operation involving market manipulation β the attackers used stolen contact information to run pump-and-dump stock schemes and operate illegal online casinos and payment processors. The case illustrated that sophisticated nation-state-quality tools could be wielded by financially motivated criminals and that a single misconfigured server could expose an entire enterprise network.
Technical Details
- Initial Attack Vector
- Attackers exploited a missed security upgrade on a single JPMorgan server β a bank employee had forgotten to enable two-factor authentication on one web application server β allowing the attackers to obtain a root-level list of applications and servers, then pivot to over 90 bank servers
Timeline
- 2014-06-01 Breach occurred
- 2014-10-02 Publicly disclosed
- 2014-10-02 Customers notified