J. P. Morgan Chase Bank Attack Report

Improved Essays
Organization: J.P Morgan Chase
Cyber security attack which involved J.P Morgan Chase bank is one of major attacks which took place recently. About two third of the bank’s customer details were stolen in this attack. The Bank officially announced that the data of 83 million customers was hacked out of which there were 76 million household and 7 million small business customers were involved.
Key-points of the attack
• The data comprises of the information of 83 million Customer details such as name, phone number, address and email address
• The other customer details such as account number, Social security number, User ID or Data of birth were not hacked during this attack
• The bank did not find any unusual customers related to this attack
• The bank declared the incident officially on October 1st week

Incident details

This attack initially took place in the month of June 2014 but the bank team couldn’t discover it till July 2014. There is a suspect that this attack was done by Russians and digging deeper there is also a suspect on the Russia government as well. The hackers tried to hack the databases and some of the applications which the bank employees use. They got access to the database of the customer’s details but as soon as the bank team came to know about it they prevented
…show more content…
In case of any unauthorized transaction the bank owns the complete responsibility to the customer and so the bank team is dealing very seriously on this issue. The Bank is taking very serious precautions after the attack and trying to verify each and every software module of the bank’s applications to find the loop holes. In research one of the Security Analyst is saying that even a $2 transaction amount in the statement should also be checked by the customers thoroughly as it could be an indication on attack as most number of hackers tries to check the working of card by using it in a gas

Related Documents

  • Improved Essays

    The bank account that they had that have been stated above were at institutions that have been acquired through other institutions and they were allowed an investment opportunity to purchase Company stock at a reduced rate that would allow them to sell the stock right after purchasing it and make a profit. However, the checks that were used to transfer the funds were dishonored therefore they were not able to make the investment losing out on A substantial amount of money any amount of $306,872 according to the…

    • 1047 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    RELATED CASES: None SUPPORT DOCUMENTS: Eight Pages Bank Of America Fraud Affidavit/Transaction History. On 12/09/2015, Sandra Agrait contacted the Pasco Sheriff`s Office by telephone to report fraudulent use of her Bank Of America ATM/Debit Card ending in 5457. Ms. Agrait advised she reviewed her bank account transaction history and observed two unauthorized cash withdrawals that she did not make. She said her houseguest, Timothy Midkiss took her debit card out of her wallet, used it to make the cash withdrawals and returned it to her walle without her knowledge or permission.…

    • 206 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    In May 2013 the thief asked the Board to close the previous two accounts and transfer funds from them into a single account with US Bank. He claimed using one bank account would make his reporting of financial records to the Board much easier. He continued the illegal activity and it was easier…

    • 309 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Risk: Undetected, unusual and suspicious activity Mitigation Strategies: A. All wires are reviewed monthly, and placed on a spreadsheet that is reviewed quarterly, by the BSA Committee for any suspicious activity. B. Consumer international wires are monitored by the Compliance Manager to assure that the Bank remains exempt from the Remittance Transfer Rule. C. Periodic internal/external audits are performed by third party firms. D. The Bank’s Customer Identification Program (CIP) and Customer Due Diligence (CDD) Program enables the Bank to effectively monitor, identify, and report unusual and suspicious funds transfer activities.…

    • 1287 Words
    • 6 Pages
    Great Essays
  • Superior Essays

    The first being the security of personally identifiable information. Now in this instance the company itself is not fully responsible for this release but they are indirectly responsible. The hackers are directly responsible for the dissemination of the users personal data but the company could have avoided this incident by shutting down but chose not to which directly constitutes a breach of privacy and security proposed by the company to protect the users information. The next issue is the release of users information that paid the company the fee of $19 to delete their information. The company decided not to delete the users information for some reason from their servers.…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Superior Essays

    A number of attacks were overlooked by the IT staff in there evaluation. They missed the fact that a man-in-the-middle attack was used to eavesdrop on the entire network. This is how the disgruntled employee was able to stop and altered the notification email from the auditor to the president and some other employees. They missed the fact that a rouge device was used to carry out the attack.…

    • 1877 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    Target Breach Case Study

    • 675 Words
    • 3 Pages

    After they noticed it worked and it went through they uploaded it to majority of Target’s POS systems. During November 27th to December 15th 2013, the attackers used the malware to steal data on about 40 million debit and credit cards, 70 million addresses, phone numbers, and other pieces of personal information. This is one of the busiest times of the year with two major holidays and so many people are shopping…

    • 675 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Pros And Cons Of Anthem

    • 167 Words
    • 1 Pages

    I found your document informative and well-written. I learned a lot about this situation, which is my first time hearing about it. It’s quite concerning because I used to be insured through Anthem, so it’s likely that the hackers accessed my health personal information. In your document, you mentioned that hackers are becoming more sophisticated as technology advances, so do you believe, through your research or your personal belief, that security breaches would cease to exist even if organizations implement strong security measures?…

    • 167 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    According to a report by USA Today’s Elizabeth Weise, an astounding 43% of businesses had been hacked in 2014 and they don’t seem to be slowing down (Weise, 2014). It is important to expand further on the Target store breach of 2013.…

    • 946 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Wells Fargo Bank has been manipulating the financial reporting and data since 2013. This behavior led the bank to pay $185 million in penalties. Further, the Government agencies are trying to protect the consumers as much as they can. In fact, financial statements, ratio analysis, and financial reporting present some strengths and limitations. Consequently, to protect themselves against corporate frauds, investors must diversify their portfolios with foreign issuers.…

    • 99 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    The Wells Fargo fraudulent account case started forming during September 8th of 2016. Wells Faro Bank was accused by the Consumer Financial Protection Bureau, the Office of the Comptroller of the Currency and the Los Angeles City Attorney. The firms claimed that Wells Fargo during 2011 and 2016 created additional fraudulent bank accounts for pre-existing customers. Signing up over 2 million customers for new credit cards and fees that they were unaware of. The fraud allegedly resulted from our company’s sales program where sales associates and managers were urged to provide different products into each of their client’s profile.…

    • 373 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    It is important to know and identify when and how the breach occurred in order to accurately determine who was affected in the breach. Once the breach has been validated, the company needs to assign a manager who will handle the incident and have a response team ready in order to mitigate the problem. This team should handle all actions such as legal, IT, finance, risk management, and even media relations (Privacy Technical Assistance Center, 2012). If the authorities or law enforcement needs to be involved in the breach, then the team will determine whether they need to be contacted for further investigation. Once all the necessary information has been recovered, it is to determine whether the parties involved should be notified and what needs to be done in order to accommodate the persons involved, such as free credit report for a year.…

    • 796 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The armed robbery could have been a terrorist act as they want to send a message to the government, banks and law enforcement or could have been an attempt to get more funding to further their terrorist acts, perhaps…

    • 692 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Jpmorgan Chase Case Study

    • 1518 Words
    • 7 Pages

    Due to which these banks fail later in the coming years. If they timely take notice of the regulations than they save themselves as well as the economy with worst crisis. The bank understands the situation and by the help of the fortes balance sheet they successfully managed in the crisis days and the financial crisis days. To compete with the financial crisis the firm has to be large and multinational so that they successfully compete with the worst economic conditions. The JPMorgan’s is the multinational bank that they are operating in two different countries that are United States and Canada.…

    • 1518 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    I conclude that the overall results of the total data records breached means that if more than one organization has all our sensitive information such as our full names, social security numbers, date of birth, credit card numbers, and etc. then we are more likely have a higher risk of getting exposed more than once if the organization’s database is maliciously attacked. To continually increase awareness in data breach protection best practices will help Businesses and other organizations to lower the risk and minimize the impact of data breach in the future as technology continues…

    • 952 Words
    • 4 Pages
    Improved Essays