Former Cash App employee accessed 8 million customer data

Block (formerly Square) notifies 8.2 million users of a data breach after it emerged that a former Cash App employee accessed customer information last year after being fired.

The leak became known from documents filed by Block with the US Securities and Exchange Commission, as required by law. It is reported that the violation occurred as early as December 10, 2021 after a former employee uploaded Cash App internal reports after the dismissal.

Although this employee had regular access to the reports as part of his past job duties, in this case, access to the reports was obtained without permission and after his work ended.the documents say.

The leaked documents contained the full names of Cash App customers, as well as their brokerage account numbers associated with investing in Cash App. Additional information was also provided for some clients, including portfolio value, holdings, and trading activity for one trading day.

The reports did not include usernames or passwords, social security numbers, dates of birth, payment card information, addresses, bank account information, or any other personal information. They also did not include security codes, passcodes, or passwords used to access Cash App accounts. Other Cash App products and features (other than stock transactions) and non-US customers were not affected.
Block officials assured the media that following the discovery of the leak, the Company and its outside legal counsel launched an investigation with the help of a leading forensic firm. Cash App Investing is now contacting approximately 8.2 million current and former customers to provide them with information about this incident and share resources with them to answer their questions. The Company also notified the relevant regulatory authorities and law enforcement agencies.

Let me remind you that we also said that Red Cross asks hackers not to “leak” personal data of 515,000 people online, and also that 38 Million User Records Leaked Due to Misconfiguration of Microsoft Power Apps.

User Review
0 (0 votes)
Comments Rating 0 (0 reviews)

Daniel Zimmermann

Daniel Zimmermann has been writing on security and malware subjects for many years and has been working in the security industry for over 10 years. Daniel was educated at the Saarland University in Saarbrücken, Germany and currently lives in New York.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *


This site uses Akismet to reduce spam. Learn how your comment data is processed.

Back to top button