Threat Actor "akrust" Leaks Millions of Filipino Banking and KYC Records in Massive Data Breach

https://www.bitsight.com/sites/default/files/styles/16_9_xlarge/public/migration/images/AdobeStock_93365244-min-1_1.webp Manila, Philippines – Earlier this morning, Deep Web Konek discovered two data breaches involving a banking institution and a KYC Information. Our monitoring of cybercrime forums revealed that a threat actor, known as "akrust," is selling extensive personally identifiable information (PII) and financial data from the bank. Breach #1: CardBank Philippines Banking Customer Data Leak https://iili.io/3HRkUP9.png Our initial findings confirm that an extensive customer/client database from CardBank Philippines has been compromised. The attacker claims to have scraped the data from a banking admin backend, exploiting vulnerabilities before security teams removed their backdoor access. Compromised Data: Affected Customers: 3 million+ Exposed Information: 1. Username, Customer ID, and Account ID 2. Full Name (First, Middle, Last, Maiden Name) 3.Date of Birth 4. Mobile Number 5. Home Address 6. Account Type, Account Status, and Account Code 7. Full Account Number 8. Client IMEI and Device Model 9. Monthly Financial Value The threat actor is currently selling this dataset for $2.5K USD, indicating the severity of the breach and the demand for financial information in illicit markets. Breach #2: KYC Information Leak Under Verification https://iili.io/3HRkrFe.png Another data leak posted by the same threat actor involves KYC (Know Your Customer) data, which is critical for identity verification and fraud prevention. Deep Web Konek’s initial analysis suggests that the affected database belongs to a financial institution, but verification is ongoing to confirm its source. Compromised Data: Affected Individuals: 7 million+ Exposed Information: 1. Customer ID 2. Username 3. Full Name (First, Middle, Last) 4. Gender 5. Email Address 6. Birth Date 7. ID Type and ID Number (e.g., TIN, Government-issued IDs) 8. Home Address, Province, City, Postal Code, Country 9. Settlement Account Name and Number The threat actor claims to have obtained this data by scraping a third-party web application, indicating a possible security lapse in external service providers linked to financial institutions. The hacker, known as "akrust," has been actively selling stolen databases on cybercrime forums. The posts indicate that the threat actor gained access via: Banking Admin Backend Exploitation – Used to extract CardBank Philippines data. Third-Party Web App Scraping – Suspected entry point for the KYC breach. Both datasets are being sold for cryptocurrency, making it difficult to trace transactions. The hacker has also mentioned access to Apache Tomcat manager interfaces, potentially allowing further intrusions within financial networks. Upon detecting these breaches, Deep Web Konek’s Breach Notification Team immediately notified CardBank Philippines and initiated efforts to verify the KYC leak’s ownership, urging affected institutions to: 1. Verify the breach and its extent 2. Secure affected systems and patch vulnerabilities 3. Alert customers about potential fraud risks 4. Enhance cybersecurity monitoring to prevent further attacks As the situation unfolds, we will continue to monitor developments and provide updates. For affected customers, we strongly recommend monitoring financial accounts, enabling two-factor authentication (2FA), and being cautious of phishing attempts that may leverage this leaked information. Deep Web Konek will remain vigilant in uncovering cyber threats to help protect the public from digital risks.

Other contents

New Home For Deep Web Konek

New Home For Deep Web Konek

Multiple Fast Food Chains, Government Entities Potentially Exposed in Large-Scale Supply Chain Breach

Multiple Fast Food Chains, Government Entities Potentially Exposed in Large-Scale Supply Chain Breach

Initial Review of DPWH Ransomware Attack Confirms Exposure of Internal Communications

Initial Review of DPWH Ransomware Attack Confirms Exposure of Internal Communications

Fast Logistics Data Breach Exposes Employee Records and Internal Files

Fast Logistics Data Breach Exposes Employee Records and Internal Files

Jollibee Internal Portal Breach Exposes Thousands of Corporate Files

Jollibee Internal Portal Breach Exposes Thousands of Corporate Files

Unseen and Unchecked: It’s What We Refuse to See

Unseen and Unchecked: It’s What We Refuse to See

Dangerous Drugs Board Allegedly Breached, Sensitive Drug and Rehabilitation Records Exposed Online

Dangerous Drugs Board Allegedly Breached, Sensitive Drug and Rehabilitation Records Exposed Online

Data Breach Hits Home Health Care, Sensitive Records Exposed

Data Breach Hits Home Health Care, Sensitive Records Exposed

Department of Public Works and Highways Reportedly Targeted by Bashe Ransomware (APT73) in Suspected Data Breach

Department of Public Works and Highways Reportedly Targeted by Bashe Ransomware (APT73) in Suspected Data Breach

Professional Regulation Commission Records Allegedly Exposed in Online Data Leak

Professional Regulation Commission Records Allegedly Exposed in Online Data Leak