Threat Actor "akrust" Leaks Millions of Filipino Banking and KYC Records in Massive Data Breach

https://www.bitsight.com/sites/default/files/styles/16_9_xlarge/public/migration/images/AdobeStock_93365244-min-1_1.webp Manila, Philippines – Earlier this morning, Deep Web Konek discovered two data breaches involving a banking institution and a KYC Information. Our monitoring of cybercrime forums revealed that a threat actor, known as "akrust," is selling extensive personally identifiable information (PII) and financial data from the bank. Breach #1: CardBank Philippines Banking Customer Data Leak https://iili.io/3HRkUP9.png Our initial findings confirm that an extensive customer/client database from CardBank Philippines has been compromised. The attacker claims to have scraped the data from a banking admin backend, exploiting vulnerabilities before security teams removed their backdoor access. Compromised Data: Affected Customers: 3 million+ Exposed Information: 1. Username, Customer ID, and Account ID 2. Full Name (First, Middle, Last, Maiden Name) 3.Date of Birth 4. Mobile Number 5. Home Address 6. Account Type, Account Status, and Account Code 7. Full Account Number 8. Client IMEI and Device Model 9. Monthly Financial Value The threat actor is currently selling this dataset for $2.5K USD, indicating the severity of the breach and the demand for financial information in illicit markets. Breach #2: KYC Information Leak Under Verification https://iili.io/3HRkrFe.png Another data leak posted by the same threat actor involves KYC (Know Your Customer) data, which is critical for identity verification and fraud prevention. Deep Web Konek’s initial analysis suggests that the affected database belongs to a financial institution, but verification is ongoing to confirm its source. Compromised Data: Affected Individuals: 7 million+ Exposed Information: 1. Customer ID 2. Username 3. Full Name (First, Middle, Last) 4. Gender 5. Email Address 6. Birth Date 7. ID Type and ID Number (e.g., TIN, Government-issued IDs) 8. Home Address, Province, City, Postal Code, Country 9. Settlement Account Name and Number The threat actor claims to have obtained this data by scraping a third-party web application, indicating a possible security lapse in external service providers linked to financial institutions. The hacker, known as "akrust," has been actively selling stolen databases on cybercrime forums. The posts indicate that the threat actor gained access via: Banking Admin Backend Exploitation – Used to extract CardBank Philippines data. Third-Party Web App Scraping – Suspected entry point for the KYC breach. Both datasets are being sold for cryptocurrency, making it difficult to trace transactions. The hacker has also mentioned access to Apache Tomcat manager interfaces, potentially allowing further intrusions within financial networks. Upon detecting these breaches, Deep Web Konek’s Breach Notification Team immediately notified CardBank Philippines and initiated efforts to verify the KYC leak’s ownership, urging affected institutions to: 1. Verify the breach and its extent 2. Secure affected systems and patch vulnerabilities 3. Alert customers about potential fraud risks 4. Enhance cybersecurity monitoring to prevent further attacks As the situation unfolds, we will continue to monitor developments and provide updates. For affected customers, we strongly recommend monitoring financial accounts, enabling two-factor authentication (2FA), and being cautious of phishing attempts that may leverage this leaked information. Deep Web Konek will remain vigilant in uncovering cyber threats to help protect the public from digital risks.

Other contents

New Home For Deep Web Konek

New Home For Deep Web Konek

Editorial: Filipinos Only Care About Cybersecurity When Money Is on the Line

Editorial: Filipinos Only Care About Cybersecurity When Money Is on the Line

The Gentleman Ransomware Group Begins Leaking 2GO Group Data; Personal Collection Named as Next Victim

The Gentleman Ransomware Group Begins Leaking 2GO Group Data; Personal Collection Named as Next Victim

Quantum Security Group Claims Breach of DepEd Ilocos Norte and Aurora Databases, Exfiltrating Millions of Records

Quantum Security Group Claims Breach of DepEd Ilocos Norte and Aurora Databases, Exfiltrating Millions of Records

Personal Collection Reportedly Targeted by Ransomware Group “The Gentlemen”

Personal Collection Reportedly Targeted by Ransomware Group “The Gentlemen”

DPWH Website Defaced by “Quantum Security Group,” Accuses Officials of Corruption and Fake Flood Control Projects

DPWH Website Defaced by “Quantum Security Group,” Accuses Officials of Corruption and Fake Flood Control Projects

DILG’s Full Disclosure Policy Portal Allegedly Leaked: 22GB Data Exposed

DILG’s Full Disclosure Policy Portal Allegedly Leaked: 22GB Data Exposed

Ransomware Attack Hits 2GO Group Inc., Threat Actor “The Gentlemen” Claims Responsibility

Ransomware Attack Hits 2GO Group Inc., Threat Actor “The Gentlemen” Claims Responsibility

DepEd Laguna Data Breach: 7 Million Records Leaked by Threat Actors

DepEd Laguna Data Breach: 7 Million Records Leaked by Threat Actors

Threat Actors Leak DOST Region 10 Employee Database; Sensitive Personal Data Exposed

Threat Actors Leak DOST Region 10 Employee Database; Sensitive Personal Data Exposed