Ameriprise Financial Data Breach Exposes Personal Information of 48,000 Customers

Related

Edtech Firm Instructure Discloses Cyber Incident, Probes Impact

What happened Instructure, the company behind the Canvas learning management...

Dayton Mayor Demands Accountability After License Plate Reader Data Breach

What happened Dayton, Ohio Mayor Shenise Turner-Sloss and Commissioner Darryl...

Amtrak Data Breach Exposes Millions of Customer Records

What happened A dataset attributed to Amtrak appeared online and...

UK Biobank Health Data Breach Continues as New Listings Appear on Chinese Platform

What happened Additional listings of confidential health records belonging to...

Video Service Vimeo Confirms Anodot Breach Exposed User Data

What happened Vimeo has confirmed that an unauthorized actor accessed...

Share

What happened

Ameriprise Financial has disclosed a data breach affecting nearly 48,000 individuals across the United States, following unauthorized access to stored company data and files that began on March 2, 2026. The company detected the intrusion on March 18, approximately 16 days after it began, and filed a breach notification with the Maine attorney general.

Ameriprise stated that the attacker accessed certain stored data and files containing personally identifiable information, which may include names, addresses, financial account details, and in some cases Social Security numbers or other identifiers. The company confirmed no unauthorized transactions or movement of funds occurred and that business operations were not disrupted. Outside cybersecurity experts were engaged to support the investigation, and affected individuals are being offered credit and identity monitoring.

Court filings tied to subsequent lawsuits alleged that ShinyHunters claimed responsibility for the breach and threatened to release more than 200 gigabytes of internal data. Both lawsuits were later dropped without prejudice, leaving open the possibility of refiling. Ameriprise has not publicly confirmed the ShinyHunters attribution.

Who is affected

Approximately 48,000 Ameriprise customers whose personal and financial information was stored in the accessed systems face potential exposure. The combination of financial account details and Social Security numbers, where applicable, creates elevated risk for identity theft and account fraud beyond the immediate incident window.

Why CISOs should care

A 16-day gap between initial compromise and detection at a financial services firm is a meaningful dwell time, particularly when the attacker may have had access to financial account data and Social Security numbers during that window. The ShinyHunters attribution, if accurate, is consistent with the group’s documented pattern of targeting financial and cloud CRM environments and applying extortion pressure through data leak threats.

For security leaders in financial services, the no funds moved framing that typically follows these disclosures understates the downstream risk. Stolen financial and identity data creates fraud exposure that can surface months after the initial breach, well outside the window that most breach response programs are designed to monitor.

3 practical actions

  1. Review detection and response capabilities for unauthorized data access that does not involve fund movement: The Ameriprise breach involved data access without any transaction activity, a pattern that can evade detection controls tuned primarily for financial fraud signals. Assess whether your monitoring coverage would identify unauthorized access to stored customer data files within a shorter window than the 16 days observed here.
  2. Assess the scope of ShinyHunters-related exposure if the attribution is confirmed: ShinyHunters has been linked to multiple financial and edtech breaches in recent months using consistent access patterns. If attribution to this group is confirmed, review whether shared infrastructure indicators published in connection with other ShinyHunters incidents appear in your own environment logs.
  3. Brief affected customer-facing teams on elevated phishing and impersonation risk: Breaches involving financial account details and Social Security numbers reliably generate follow-on phishing campaigns targeting the same population. Ensure customer service and fraud teams are prepared for an increase in impersonation attempts referencing the Ameriprise incident.

Also in the news today:

e1057c44fd23a2339dd83fc7bd88822e97b8b3544e012414c207939b16e0441d?s=150&d=mp&r=g
+ posts