
If there’s one sector that has outdone healthcare in information breaches and ransomware assaults, it’s finance.
Safety incidents affecting monetary establishments have gotten more and more widespread, whether or not they contain banks, fintech corporations or funding analysis companies.
The newest case includes Zacks, an American funding analysis firm. A cybercriminal claimed to have stolen 15 million buyer and consumer information, however a separate investigation later confirmed the precise quantity to be 12 million.

Illustration of a hacker at work. (Kurt “CyberGuy” Knutsson)
What you want to know
The Zacks Funding breach first got here to mild in late January 2025 when a hacker referred to as “Jurak” claimed on BreachForums that they’d gained entry to Zacks’ programs as early as June 2024.
In accordance with the hacker, they obtained area administrator privileges for Zacks’ energetic listing, a important community safety element, permitting them to steal supply code for Zacks.com and 16 different web sites, together with inner instruments, together with consumer account information. The stolen data was then put up on the market on hacker boards, with samples supplied for a small cryptocurrency fee to show authenticity, as reported by BleepingComputer.
Additional investigation confirmed the breach occurred in June 2024, exposing 12 million distinctive e mail addresses and different private information. The truth that the attacker managed to realize area admin entry suggests a extremely refined assault, doubtlessly exploiting vulnerabilities in Zacks’ community safety.
This isn’t the primary time Zacks has suffered a breach. Earlier incidents embrace a 2022 assault that compromised an older Zacks Elite product database from 1999 to 2005, as famous on Zacks’ personal breach disclosure web page.

Menace actor’s publish on BreachForums. (BleepingComputer)
THE HIDDEN COSTS OF FREE APPS: YOUR PERSONAL INFORMATION
What information bought compromised
The Zacks Funding information breach, confirmed by Have I Been Pwned (HIBP), uncovered a spread of delicate consumer data, placing these affected in danger. The leaked information consists of e mail addresses, IP addresses, names, telephone numbers, bodily addresses, usernames, and unsalted SHA-256 hashed passwords.
This sort of data will be misused for phishing, id theft, credential stuffing, harassment, SIM swapping and even bodily threats. Alarmingly, 93% of the leaked e mail addresses had already been uncovered in earlier breaches, making reused passwords a good larger drawback. The usage of unsalted SHA-256 hashes — broadly thought of outdated — solely provides to the chance, making it simpler for attackers to crack passwords and compromise accounts.
Regardless of the severity of the breach, Zacks Funding Analysis has but to launch an official assertion as of February 2025. The shortage of transparency is troubling, particularly contemplating the size of the breach and Zacks’ historical past with safety incidents.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

An individual scrolling on a telephone. (Kurt “CyberGuy” Knutsson)
FROM TIKTOK TO TROUBLE: HOW YOUR ONLINE DATA CAN BE WEAPONIZED AGAINST YOU
7 methods you possibly can defend your self after an information breach like this
1. Watch out for phishing makes an attempt and use robust antivirus software program: After an information breach, scammers usually use the stolen information to craft convincing phishing messages. These can come through e mail, textual content or telephone calls, pretending to be from trusted corporations. Be additional cautious about unsolicited messages with hyperlinks asking for private or monetary particulars, even when they reference current orders or transactions. The easiest way to safeguard your self from malicious hyperlinks is to have robust antivirus software program put in on all of your units. This safety also can provide you with a warning to phishing emails and ransomware scams, preserving your private data and digital property secure. Get my picks for the very best 2025 antivirus safety winners on your Home windows, Mac, Android and iOS units.
GET FOX BUSINESS ON THE GO BY CLICKING HERE
2. Put money into id theft safety: Given the publicity of non-public information, similar to names, addresses and order particulars, investing in id theft safety providers can present an additional layer of safety. These providers monitor your monetary accounts and credit score report for any indicators of fraudulent exercise, alerting you to potential id theft early on. They’ll additionally help you in freezing your financial institution and bank card accounts to forestall additional unauthorized use by criminals. See my ideas and finest picks on find out how to defend your self from id theft.
3. Allow two-factor authentication (2FA) on accounts: Enabling two-factor authentication provides an additional layer of safety to your on-line accounts. Even when hackers pay money for your login credentials, they received’t be capable to entry your accounts with out the second verification step, similar to a code despatched to your telephone or e mail. This straightforward step can considerably scale back the chance of unauthorized entry to delicate private data.
4. Replace your passwords: Change passwords for any accounts that will have been affected by the breach, and use distinctive, robust passwords for every account. Think about using a password supervisor. Get extra particulars about my finest expert-reviewed Password Managers of 2025 right here.
5. Take away your private information from public databases: In case your private information was uncovered on this breach, it’s essential to behave shortly to cut back your danger of id theft and scams. Whereas no service can assure the whole elimination of your information from the web, an information elimination service is mostly a good selection. They aren’t low cost — and neither is your privateness. These providers do all of the be just right for you by actively monitoring and systematically erasing your private data from a whole bunch of internet sites. It’s what provides me peace of thoughts and has confirmed to be the simplest solution to erase your private information from the web. By limiting the knowledge obtainable, you scale back the chance of scammers cross-referencing information from breaches with data they may discover on the darkish internet, making it more durable for them to focus on you. Take a look at my prime picks for information elimination providers right here.
MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC
Kurt’s key takeaways
The Zacks Funding breach highlights simply how actual the specter of cyberattacks is for monetary establishments. With tens of millions of customers affected and private information uncovered, the dangers of scams and id theft are greater than ever. The truth that Zacks hasn’t mentioned a lot in regards to the breach solely provides to the uncertainty for these impacted. As a lot of these assaults develop into extra widespread, it’s extra necessary than ever to remain on prime of your on-line safety — use distinctive passwords, regulate your accounts, and keep alert for any indicators of suspicious exercise.
CLICK HERE TO GET THE FOX NEWS APP
Ought to there be stricter laws for a way corporations disclose breaches and defend buyer information? Tell us by writing us at Cyberguy.com/Contact
For extra of my tech ideas and safety alerts, subscribe to my free CyberGuy Report Publication by heading to Cyberguy.com/Publication
Ask Kurt a query or tell us what tales you would like us to cowl.
Observe Kurt on his social channels:
Solutions to the most-asked CyberGuy questions:
New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.