DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Frost Bank investigating breach, contacting affected customers (Updated)

Posted on March 17, 2018 by Dissent

RJ Marquez reports:

Frost Bank is investigating a breach after the company discovered unauthorized access to digital images stored in those customers’ commercial image archives.

The San Antonio based-bank issued a statement that said Frost detected the unauthorized access to a third-party lockbox software program earlier this week and immediately launched an investigation.

The software allowed unauthorized users to view and copy images of checks stored electronically.

Read more on KSAT.

Frost Bank’s statement:

Today, bankers at Frost Bank, a subsidiary of Cullen/Frost Bankers, Inc. (NYSE: CFR) will start briefing commercial lockbox customers about a recently discovered unauthorized access to digital images stored in those customers’ commercial image archives.

Earlier this week, Frost detected the unauthorized access to a third-party lockbox software program and immediately launched an investigation and started taking remediation actions. We have stopped the identified unauthorized access and are working with a leading cybersecurity firm. We have reported the incident to, and are cooperating with, law-enforcement authorities and our investigation is ongoing. We are contacting each of the affected commercial customers and will be working with them to support them in taking appropriate actions. The identified incident did not impact other Frost systems.

“At Frost, we care deeply about taking care of our customers and protecting their information, and we regret that this situation has occurred,” said Frost Chairman and CEO Phil Green. “We are working very hard to make things right.”

People with questions or concerns should contact their Frost banker, call Frost’s 24-hour customer service line at 800-513-7678, or refer to the FAQs on our website at www.frostbank.com.

Cullen/Frost Bankers, Inc. (NYSE: CFR) is a financial holding company, headquartered in San Antonio, with $31.7 billion in assets at Dec. 31, 2017. One of the 50 largest U.S. banks, Frost provides a wide range of banking, investments and insurance services to businesses and individuals across Texas in the Austin, Corpus Christi, Dallas, Fort Worth, Houston, Permian Basin, Rio Grande Valley and San Antonio regions. Founded in 1868, Frost has helped clients with their financial needs during three centuries. Additional information is available at frostbank.com.

Forward-Looking Statements and Factors that Could Affect Future Results

Certain statements contained in this Press Release or made by authorized officers with respect to the subject matter of this Press Release that are not statements of historical fact may constitute forward-looking statements within the meaning of the Private Securities Litigation Reform Act of 1995, notwithstanding that such statements are not specifically identified as such. Forward-looking statements involve risks and uncertainties that may cause actual results to differ materially from those in such statements.  The foregoing forward-looking statements are based on certain factors and assumptions and may prove to be incorrect. The foregoing, as well as various risk factors, are described in our filings with the Securities and Exchange Commission including in our Forms 10‑K and 10‑Q, to which reference is made. Additional factors include the final results of our investigation as well as the ultimate impact of the foregoing on our customers. Forward-looking statements speak only as of the date on which such statements are made. We do not undertake any obligation to update any forward-looking statement to reflect events or circumstances after the date on which such statement is made, or to reflect the occurrence of unanticipated events.

SOURCE Frost Bank

UPDATE:  From the City of Corpus Christi via KRIS-TV:

The City of Corpus Christi learned late Friday afternoon of unauthorized access to images of scanned documents, including checks, belonging to Frost Bank commercial customers. The City has three commercial accounts maintained by Frost Bank including EMS and utility payment processing.

“We know very little at this time about the investigation being conducted by the FBI and Secret Service regarding the Frost Bank security breach,” said Constance P. Sanchez, Finance Director. “We want our customers to monitor their bank accounts as a precaution. At this time, we do not know the extent of the breach or if any of our customers are impacted,” added Sanchez.  The following Frost Bank lock boxes are used by the City of Corpus Christi:

P.O. Box 659880, San Antonio, Texas 78265-9143

P.O. Box 659722, San Antonio, Texas 78265-9722

P.O. Box 34627, San Antonio, Texas 78265-4627

Customers having mailed payments to any of the addresses above should monitor their bank accounts closely until more information is available concerning the Frost Bank security breach. Customers who pay in-person, online or by third-party payment processors, like H-E-B or Western Union, are not affected by this breach.

As the City is made aware of additional details regarding the Frost Bank investigation, we will notify our customers.


Related:

  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Toys “R” Us Canada customers notified of breach of personal information
  • Kaufman County's data breach was their second one in three weeks
  • Hacking Formula 1: Accessing Max Verstappen's passport and PII through FIA bugs
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
Category: Financial SectorHackU.S.

Post navigation

← National Lottery hacked: 10.5m players are warned to change their passwords
Atrium Hospitality Notifies Hotel Guests of Ransomware Incident →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Des Moines Man Charged with Computer Fraud
  • CrowdStrike catches insider feeding information to ScatteredLapsus$Hunters
  • Two suspected Scattered Spider hackers plead not guilty over Transport for London cyberattack
  • Attleboro investigating ‘cybersecurity incident’ impacting city’s IT systems
  • Fired techie admits sabotaging ex-employer, causing $862K in damage
  • Threat actors have reportedly launched yet another campaign involving an application connected to Salesforce
  • Russian hackers target IVF clinics across UK used by thousands of couples
  • US, allies sanction Russian bulletproof hosting services for ransomware support
  • Researchers claim ‘largest leak ever’ after uncovering WhatsApp enumeration flaw
  • Large medical lab in South Africa suffers multiple data breaches

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Cole v. Quest Diagnostics: The Third Circuit Weighs in on Pixels, Privacy, and Medical Data
  • Closing the Privacy Gap: HIPRA Targets Health Apps and Wearables
  • Researchers claim ‘largest leak ever’ after uncovering WhatsApp enumeration flaw
  • CIPL Publishes Discussion Paper Comparing U.S. State Privacy Law Definitions of Personal Data and Sensitive Data
  • India’s Digital Personal Data Protection Act 2023 brought into force

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.