Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity NewsBanking/Finance/Insurance

Finastra investigates data breach, security leaders discuss

By Jordyn Alger, Managing Editor
Coding on monitor

Image via Unsplash

November 25, 2024

Finastra, a financial technology firm, is investigating an alleged data breach. According to a notice distributed by the organization, Finastra’s Security Operations Center (SOC) discovered activity on an internal file transfer platform on November 7th, prompting incident response protocols. On November 8th, a malicious actor on the dark web claimed to exfiltrated data from this platform, causing Finastra to investigate. 

Finastra has stated that customer operations, systems and services have not been impacted by this incident. Currently, Finastra is in the process of determining which customers may have been affected by the breach. Below, security leaders are sharing their thoughts on the incident. 

Security leaders weigh in

Trey Ford, Chief Information Security Officer at Bugcrowd:

The first challenge in incident response is drawing the sandbox of what’s in scope, how systems and information were accessed, and what was taken. The process of inventory and impact — companies will retain outside counsel who will pull in a DFIR (data forensics/incident response) partner to drive the investigation, and will use specialized firms to inventory the data (intellectual property vs. privacy impacted data, etc.) to understand which customers, and which users were impacted. From there, the analysis is done to understand where the parties are based, and what privacy laws are impacted by the compromised data.

These investigations can take weeks to months, depending on a wide variety of variables. “Right of Boom” — the actions and responses taken after the incident happens, the first priority is recovering positive control of the environment, and preventing re-compromise or further loss of control. The scope of impact often expands during that analysis. Concurrently, impacted data will be inventoried, and the notification clock starts — timelines to notifying impacted parties and data supervisory authorities or regulators.

Mr. Piyush Pandey, CEO at Pathlock:

Analyzing stolen data from breaches like this is a complex and time-intensive process, particularly when dealing with a diverse customer base. To understand what data has been impacted, organizations need to have the ability to monitor master data and configuration changes on a continuous basis across multiple applications and data pools. A major challenge is that many of these applications and data pools are siloed and don't have a management layer that looks over all of them. Each dataset must be carefully reviewed to determine ownership, sensitivity, and impact.

  • Large volumes of data (400GB) require extensive forensic review to identify contents and affected customers.
  • Diverse customer and product lines complicate mapping data to specific entities.
  • Limited monitoring or incomplete logs can hinder root cause and impact analysis.

Data breaches involving sensitive financial data can have far-reaching implications, even for a privately held company like Finastra. One critical area of concern is the impact on cyber insurance, as breaches often lead to increased scrutiny from insurers, and may result in the significant rise of insurance premiums. The Reputational damage may be difficult to quantify but is an inherent impact of any data breach. 

  • Cyber insurance premiums may rise significantly after a breach.
  • Insurers might question coverage if security gaps, like insufficient privileged account monitoring, are identified.
  • Compliance with data privacy laws (e.g., GDPR, CCPA) could also influence future policy terms and costs.

Jason Soroko, Senior Fellow at Sectigo:

Analyzing stolen data in breaches like this is challenging because the volume and diversity of information across multiple company divisions or back office silos. It is difficult to map stolen files to specific customers and assessing the sensitivity of each piece of information. Sifting through logs and knowing what the adversary exfiltrated could take a long time. This process is complicated by varying data formats and storage locations, making it difficult to quickly determine the full impact.

Elad Luz, Head of Research at Oasis Security:

According to Finastra’s notice, the threat actor gained access to sensitive files through a vulnerable Secure File Transfer Protocol (SFTP) server. SFTP is a widely used protocol for securely accessing files remotely through encryption, with several popular software solutions supporting it.

One such solution, MOVEit by Progress Software, had a critical vulnerability that was publicly disclosed just a few months ago. MOVEit is also PCI-DSS compliant, which is required for financial institutions, making it likely that this was the software in use. Interestingly, although the vulnerability was discovered months ago, NIST has updated its severity rating.

KEYWORDS: data breach data breach notification finance cybersecurity security leaders

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordynalger

Jordyn Alger is the managing editor for Security magazine. Alger writes for topics such as physical security and cyber security and publishes online news stories about leaders in the security industry. She is also responsible for multimedia content and social media posts. Alger graduated in 2021 with a BA in English – Specialization in Writing from the University of Michigan. Image courtesy of Alger

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Police lights

Security Team Member Dies in Standoff with Dallas Police

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Computer and laptop

    1.1M Impacted by Farmers Insurance Data Breach, Security Leaders Discuss

    See More
  • Code

    Security Leaders Discuss the Marquis Data Breach

    See More
  • Green digital symbols on screen

    Security leaders discuss the National Public Data breach

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing