Figure Technology Confirms Customer Data Breach After Social Engineering Attack

TheNewsCryptoPublicado a 2026-02-14Actualizado a 2026-02-14

Resumen

Figure Technology, a blockchain-based lending firm, has confirmed a data breach resulting from a social engineering attack. Hackers tricked an employee into providing access, leading to the theft of approximately 2.5 GB of customer data, including names, addresses, birth dates, and phone numbers. The group ShinyHunters claimed responsibility and released the data after the company refused to pay a ransom. No financial information or passwords were confirmed to be compromised. The company has launched an investigation, notified affected customers, and is offering free credit monitoring. Cybersecurity experts emphasize that such attacks target human vulnerabilities rather than technical flaws.

Figure Technology, a publicly traded blockchain-based lender company, has confirmed that hackers gained access to customer information by tricking an employee through a social engineering scheme. As per the report from TechCrunch, attackers claimed that they had released 2.5 gigabytes of stolen data after the company refused to pay a ransom.

How did the hack happen?

One of the staff members was manipulated by an outside actor, which allowed the attacker to download the files using the employee’s legitimate account. According to the company, the suspicious activity was blocked quickly, and forensic investigations have been launched. A report from TechCrunch said that the stolen files may include full names, home addresses, dates of birth, and phone numbers. Still, there is no confirmation that the passwords or financial assets were accessed.

The cybercrime group ShinyHunters claims responsibility, and one alleged member said that the breach is part of the wider campaign targeting organizations that use the identity and login provider Okta. The group alleged that it had released about 2.5 GB of data after the company refused the ransom demands. The company says that it is now notifying affected individuals and offering free credit monitoring with strong internal security controls.

Expert’s Advice

Cybersecurity experts warn that social engineering attacks don’t break the software; instead, they trick humans, and criminals may pretend to be IT staff and send fake approval requests with some urgent messages to pressure the victims. Once the access is granted, they operate as legitimate users. Right now, investigators are still working to confirm which file has been stolen and how many people are affected. So further updates are expected once the forensic review is complete.

Highlighted Crypto News:

KuCoin Institutional Premiere 2026 Highlights Long-Term Growth and Market Resilience

TagsCrypto ScamCryptocurrency

Preguntas relacionadas

QWhat type of attack did Figure Technology experience that led to the customer data breach?

AFigure Technology experienced a social engineering attack where hackers tricked an employee to gain access to customer information.

QWhich cybercrime group claimed responsibility for the attack on Figure Technology?

AThe cybercrime group ShinyHunters claimed responsibility for the attack.

QWhat specific customer information was potentially exposed in the data breach according to the TechCrunch report?

AAccording to the TechCrunch report, the stolen files may include full names, home addresses, dates of birth, and phone numbers.

QWhat action did the attackers take after the company refused to pay the ransom?

AAfter the company refused to pay the ransom, the attackers claimed to have released about 2.5 gigabytes of stolen data.

QWhat is the company doing to assist the affected individuals following the breach?

AThe company is notifying affected individuals and offering them free credit monitoring.

Lecturas Relacionadas

a16z: After AI Grants Humans Superpowers, Where Do We Go From Here?

A new paper titled "The Minimal Economics of AGI" explores the economic implications of AI automation, particularly as AI agents evolve from tools into collaborative partners capable of long-horizon tasks. The authors, Christian Catalini and Eddy Lazzarin, argue that the core economic divide will be between automation (tasks that can be measured and automated) and verification (tasks requiring human oversight, judgment, and contextual understanding). Key themes include: - The "coder’s curse": top experts training AI systems may inadvertently automate their own roles over time. - Three future human roles: directors (setting intent), verifiers (domain experts ensuring quality), and meaning-makers (creating cultural and social value). - Cryptocurrency and blockchain are positioned as critical for identity, provenance, and trust in a world flooded with AI-generated content. - Two potential economic outcomes: a "hollow economy" with systemic risk from under-verification, or an "augmented economy" where AI amplifies human potential and reduces costs for education, healthcare, and innovation. - The importance of small, agile teams leveraging AI for outsized impact, with crypto infrastructure enabling coordination at scale. The authors emphasize that AI acts as a force multiplier, granting individuals "superpowers," and urge a focus on verification, adaptability, and ambitious experimentation.

marsbitHace 45 min(s)

a16z: After AI Grants Humans Superpowers, Where Do We Go From Here?

marsbitHace 45 min(s)

MVC Market View Express (3.9-3.15)

Recent tensions in the Middle East have heightened market sensitivity to geopolitical risks, particularly concerning Iran. The assessment is that the U.S. is unlikely to deploy ground troops, while Iran may use external pressure to legitimize internal political restructuring. A 20% rise in oil prices could trigger a U.S. policy response, keeping the situation broadly manageable. Geopolitical premiums will continue to influence market sentiment until oil falls below $100 per barrel. Long-term trends, especially in commodities and precious metals, remain upward, with new capital being deployed opportunistically on dips. Three key themes are emphasized: 1. Commodities and Resources: Geopolitical risks and the restructuring of the credit system support elevated gold prices. Exposure to gold mining equities is being increased. Copper is viewed as a medium- to long-term allocation, benefiting from future liquidity expansion. 2. Digital Assets: Bitcoin has recently outperformed equities but lacks a clear trend reversal signal. A cautious stance is maintained, prioritizing drawdown control while awaiting confirmation of a turning point in U.S. dollar liquidity. 3. AI and Technology: Current valuations of AI leaders appear full, with limited short-term upside consensus. Future performance will heavily depend on changes in global liquidity conditions. Overall, the strategy remains centered on the themes of “traditional credit system restructuring” and “East-facing allocation,” with a focus on RMB-denominated resource assets to balance certainty and upside potential.

marsbitHace 1 hora(s)

MVC Market View Express (3.9-3.15)

marsbitHace 1 hora(s)

Trading

Spot
Futuros
活动图片