Ransomware attack on Patelco Credit Union causes confusion ahead of holiday weekend

Avatar

One of the largest credit unions on the West Coast continues to struggle with its operations following a ransomware attack that began on Saturday. 

Patelco Credit Union — one of the nation’s oldest credit unions with more than $9 billion in assets — confirmed that it was hit with ransomware in a statement on Monday. In an update on Tuesday, the credit union told customers to expect intermittent outages at ATMs throughout the recovery process and pledged to reimburse those who incur late fees because of the outages.

Patelco has nearly 500,000 members and dozens of branches across California. Customers said they were unable to take out more than $500 from ATMs and could not access their Patelco accounts online. 

Hundreds of customers flooded Facebook to express confusion about the credit union’s messages, questioning why some statements made in emails and on the websites appeared to be in conflict.

“Make this make sense people!!” one Facebook user said

Currently, incoming transfers from Zelle, ACH and direct deposits as well as a scheduled Patelco account-to-Patelco account transfers or wire transfers will not be processed. But the credit union said any incoming direct deposits “will be credited to customer accounts and processed before withdrawals.” 

The credit union added that customers can access funds from their direct deposit “by writing a check, using an ATM card to get cash or make a purchase” — prompting further questions about how customer funds are being handled. 

The credit union has not publicly provided a timetable for the recovery process but local news outlets reported that CEO Erin Mendez emailed customers this week to say the “next few days – and coming weeks – may present challenges for our members.”

The credit union said it will write letters on customers’ behalf if the late payments impact their credit score. All overdraft and late payment fees for Patelco will be waived during the recovery process.

All deposits are also insured by the government-backed National Credit Union Administration (NCUA).

“On June 29, 2024, Patelco Credit Union experienced a ransomware attack. Our priority is the safe and secure restoration of our banking systems. We continue to work alongside leading third-party cybersecurity experts in support of this effort. We have also been cooperating with regulators and law enforcement,” Mendez said in a statement. 

“We don’t take lightly how severely this has impacted our members.”

The issues began on Saturday when the credit union first reported that its systems were unavailable. 

By Sunday, the credit union said it had to shut down some of its day-to-day banking systems in order to deal with the incident and “contain the impact.” All electronic transactions like transfers, direct deposit, balance inquiries and payments were unavailable. Debit and credit card transactions were limited. 

Patelco did not specify what ransomware was behind the incident or whether the hackers had contacted the credit union.

Dozens of credit unions have been attacked in recent years by ransomware gangs and hackers because of their popularity among local populations and lack of focus on cybersecurity. In 2024 alone, at least 11 credit unions reported data breaches to regulators — affecting millions of U.S. residents.

In December, more than 60 credit unions were impacted by a ransomware attack on a third-party tech provider that was so damaging the NCUA stepped in to help resolve the issue alongside several other federal agencies. 

The NCUA warned last August that it was seeing an increase in cyberattacks against credit unions, credit union service organizations and other third-party vendors supplying financial services products.

The NCUA approved new rules last year that require a federally insured credit union to notify the agency  within 72 hours of a cyberattack. The rule came into effect on September 1 and after just one month, Chairman Todd Harper said the NCUA had already received 146 incident reports — a number the organization previously only saw in an entire year.

Dan Lattimer, vice president of cybersecurity firm Semperis, said hackers are increasingly targeting small, midmarket and large financial and banking institutions “for the volume of sensitive financial information they process daily” — citing data from the International Monetary Fund suggesting that attacks on financial firms account for nearly one-fifth of all attacks, with banks being the most exposed.

CybercrimeNews
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post

The Emerging Role of AI in Open-Source Intelligence

Next Post

Cobalt Strike: International law enforcement operation tackles illegal uses of ‘Swiss army knife’ pentesting tool

Related Posts

Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days

Microsoft has addressed a total of 61 new security flaws in its software as part of its Patch Tuesday updates for May 2024, including two zero-days which have been actively exploited in the wild. Of the 61 flaws, one is rated Critical, 59 are rated Important, and one is rated Moderate in severity. This is in addition to 30 vulnerabilities&
Avatar
Read More

U.S. Dismantles World’s Largest 911 S5 Botnet, with 19 Million Infected Devices

The U.S. Department of Justice (DoJ) on Wednesday said it dismantled what it described as "likely the world's largest botnet ever," which consisted of an army of 19 million infected devices that was leased to other threat actors to commit a wide array of offenses. The botnet, which has a global footprint spanning more than 190 countries, functioned as a residential proxy service known as 911 S5.
Avatar
Read More