Total Tests:

UBS confirms employee data leak after ransomware attack on supplier

SiliconANGLE
By Duncan Riley for SiliconANGLE
Thursday, June 19, 2025

Chain IQ has also confirmed the attack but did not disclose exactly what data was stolen or which clients were affected. That matters, given that Chain IQ’s client list reportedly includes Swiss Life Holding AG, AXA S.A., FedEx Corp., IBM Corp., Swisscom AG, KPMG International Ltd. and Pictet Group SA, among others. Of the company’s clients, only Pictet has confirmed so far that it has also been affected.

While all the details of the breach are yet to be disclosed, that UBS data was stolen raises broader concerns than just another targeted company. Dr. Ilia Kolochenko, chief executive officer of application security company ImmuniWeb SA and adjunct professor of cybersecurity at Capitol Technology University in Maryland, telling SiliconANGLE via email that “based on the publicly available data, this data breach may have a disastrous and long-lasting impact on the Swiss banking industry – given that UBS is the largest financial institution of the country.”

Kolochenko added that the information of bank employees can be exploited in sophisticated scams, fraud and phishing attacks impersonating bank employees and stealing sensitive data or even funds of its clients. “The wide availability of generative AI tools, capable of impeccably impersonating voices and even videos, may certainly amplify the consequences of the data breach,” he said. “Worse, some of the stolen data may be exploited to blackmail bank employees or even facilitate money laundering via sophisticated social engineering operations.”

“The Chain IQ breach underscores the persistent and growing risk of third-party exposure in today’s interconnected enterprise ecosystem,” added Ensar Seker, chief information security officer at extended threat intelligence SOCRadar Cyber Intelligence Inc. “When suppliers hold sensitive operational or financial data, even in the absence of client personally identifiable information, they become a highly attractive target for threat actors seeking leverage, intelligence, or access pathways into high-value organizations.” Read Full Article


Ask a Question