• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • COVID-19 Update
  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • About Us
    SEARCH
IT Infrastructure, Network Security

Robinhood Data Breach: Hacker Tricked Customer Support Employee By Phone

Stock trading platform, Robinhood announced an attacker socially engineered an employee to gain access to customer support systems.

November 9, 2021 Alyssa Borelli Leave a Comment

Robinhood security breach
Wirestock/stock.adobe.com

Stock trading platform Robinhood announced that certain customer support systems were hacked in early November. The unauthorized party was able to gain access using social engineering through a customer support employee by phone. The hacker was able to obtain access to a list of email addresses of about five million people, and full names of a different group of two million people.

In a statement, the company reported around 310 customers’ personal information, such as name, date of birth, and zip codes were exposed with a subset of around ten customers having more extensive account details revealed, although it did not disclose what the details were.

Following the breach, the unauthorized party demanded an extortion payment. Robinhood informed law enforcement and is continuing to investigate the incident with an outsourced security firm. The company did not disclose how much the hackers demanded.

“As a Safety First company, we owe it to our customers to be transparent and act with integrity,” said Robinhood’s Chief Security Officer Caleb Sima, in a statement. “Following a diligent review, putting the entire Robinhood community on notice of this incident now is the right thing to do.”

Robinhood says it is in the process of making disclosures to those affected, and added that no social security numbers, bank account numbers, or debit card numbers were exposed. According to the company, there has been no financial loss to any customers as a result of the incident.

To avoid being a victim of an attack like this, the Cyber Security Infrastructure Security Agency (CISA) recommends being suspicious of unsolicited phone calls, visits, or email messages from individuals asking about employees or other internal information.

If an unknown individual claims to be from a legitimate organization, CISA recommends verifying his or her identity directly with the company and to never provide personal information or information about your organization, including its structure or networks, unless you are certain of a person’s authority to have the information.

Tagged With: Data Breach, extortion payment, Robinhood, social engineering

Related Content:

  • Zoom macOS Update Zoom on macOS Devices Now
  • DDoS, NETSCOUT Arbor Insight NETSCOUT Launches Arbor Insight for Enhanced DDoS Prevention
  • AWS Private 5G Amazon Launches AWS Private 5G For Connected Environments
  • Mindbody wellness tech WalkMe Mindbody Enlists WalkMe to Drive Digital Transformation

Free downloadable guide you may like:

  • Shadow ITBlueprint Series: How to Reduce Shadow IT

    The distributed work model gives employees the flexibility they demand, but it can lead to shadow IT and introduce unnecessary security risk. Research finds that this distributed work environment is leading to IT management blind spots and shadow IT.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Latest Downloads

Shadow IT
Blueprint Series: How to Reduce Shadow IT

The distributed work model gives employees the flexibility they demand, but it can lead to shadow IT and introduce unnecessary security risk. Resea...

Hybrid Work webinar
Featured Webcast: Collaboration 2.0 — Where Are We Now?

In this webinar, subject matter experts discuss the transformation of the workplace, the rise of hybrid workers, the importance of open connectivit...

guide to end user training cover
Pro Tips for Conducting End User Training

Effective trainings are the glue that can make the difference following a new technology implementation that your team has spent so much time, effo...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!
Sharp Microsoft Collaboration HQ Logo

Learn More About the
Windows Collaboration Display

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSTERMS OF USEPRIVACY POLICY

© 2022 Emerald X, LLC. All rights reserved.