Marquis Breach Exposes Data From 74 US Banks After SonicWall Failure

A SonicWall VPN compromise opened the door to a ransomware attack that leaked sensitive data from hundreds of thousands of people.

SonicWall firewall breach illustration
Ransomware gangs exploited SonicWall flaws to enter Marquis network

A SonicWall weakness let ransomware actors infiltrate Marquis Software Solutions and extract sensitive data from 74 US banks and credit unions. This attack shows what happens when a single vendor becomes a quiet central point of failure.

Marquis Software Solutions has confirmed a ransomware breach that exposed data from 74 banks and credit unions across the United States. Marquis provides analytics, CRM tooling, and compliance reporting to more than 700 financial institutions. That scale turned one compromise into a nationwide spill of names, addresses, phone numbers, Social Security numbers, Taxpayer Identification Numbers, dates of birth, and financial account data without access codes.

The intrusion happened on August 14 2025. Attackers entered through a SonicWall firewall and stole files before deploying ransomware. Marquis says there is no evidence of misuse but deleted breach filings from one credit union claimed Marquis paid a ransom. When ransom payments appear, it usually means the attackers stole data and threatened to leak it.

Notifications filed in Maine, Iowa, and Texas confirm that more than 400,000 people are affected. The list of impacted institutions spans 74 banks and credit unions, including Suncoast Credit Union, Capital City Bank Group, NIH Federal Credit Union, Generations Federal Credit Union, and dozens more. The breadth of the list comes from Marquis acting as a silent data processor for institutions that never expected to rely on its security.

The SonicWall Vulnerability

SonicWall firewalls and VPN appliances have been a known target for ransomware groups. The Akira gang has been exploiting SonicWall devices since 2024 by abusing CVE-2024-40766. That flaw let attackers steal usernames, passwords, and even one time passcode seeds from vulnerable SSL VPN portals. Even after patches landed, many organisations failed to rotate credentials. Attackers kept logging in with old secrets and walked through MFA because the seeds were already stolen.

How the Attack Unfolded

Once inside, the workflow was predictable. Scan the network. Escalate privileges. Exfiltrate data. Deploy ransomware. Marquis' own remediation steps confirm this path. They patched firewall devices, rotated local passwords, removed unused accounts, enabled MFA everywhere, raised logging retention, enforced account lockouts, added geo IP filtering, and blocked command and control traffic. These steps map cleanly to an attack that began with stolen or reused SonicWall VPN credentials.

Vendor breaches keep multiplying because institutions outsource essential functions to companies that cut corners. One SonicWall misconfiguration created a cascade failure that hit 74 banks at once. People trust banks to protect their data. Many would never guess that a third party they have never heard of is holding their most sensitive identifiers on a server that depends on a firewall known to be actively exploited.

Centralised data handling makes life easier for administrators and infinitely easier for attackers. One breach delivers a lifetime supply of personal identifiers. Marquis is another example of that simple truth.

Blackout VPN exists because privacy is a right. Your first name is too much information for us.

Keep learning

FAQ

Why was Marquis targeted

Ransomware groups focus on vendors that hold large amounts of sensitive data for many clients because one breach produces massive leverage.

How did attackers enter the Marquis network

They broke in through a SonicWall firewall using previously stolen VPN credentials obtained during earlier exploitation of CVE-2024-40766.

What data was exposed in the breach

Names, addresses, phone numbers, Social Security numbers, Taxpayer Identification Numbers, dates of birth, and financial account data without access codes.

Did Marquis pay a ransom

A deleted credit union filing claimed a ransom was paid though Marquis has not confirmed it publicly.

Which banks and credit unions were affected

Notifications list 74 institutions across the US including Suncoast Credit Union, NIH Federal Credit Union, Generations Federal Credit Union and many others.