11 min read
Credit Union Cybersecurity: Beyond the Basics
In August 2025, a ransomware gang breached Marquis Software Solutions through an unpatched SonicWall firewall and stole the personal data of 1.3...
8 min read
Justin Kirsch : Updated on February 27, 2026
In this article:
In June 2024, one vendor shut down 15,000 car dealerships across America. CDK Global — the software platform that ran their operations — got hit with ransomware. Dealers couldn't sell cars, process loans, or look up service records. For three weeks. That wasn't a dealership security failure. It was a supply chain failure.
Eight months later, the same pattern hit financial services. In August 2025, attackers breached Marquis Software Solutions — a compliance platform used by over 700 banks and credit unions — through a vulnerability in SonicWall's cloud backup system. Not a vulnerability in Marquis. Not in the financial institutions. In the vendor's vendor. Eighty institutions affected. Over 824,000 consumers exposed. And the breach didn't happen at any of them.
The Verizon 2025 Data Breach Investigations Report confirms this isn't an outlier. Thirty percent of confirmed breaches now involve third-party vendors — doubled year-over-year from 15 percent. The Snowflake breach cascade in 2024 followed the same pattern: 165 organizations compromised through a single platform, including Santander Bank and AT&T.
When Marquis filed a federal lawsuit against SonicWall in February 2026, the complaint laid out exactly what happened. Marquis had the firewall patched. MFA was enabled. Their security controls were in place. But SonicWall introduced a vulnerability into a system that Marquis's customers never even knew existed. That's not third-party risk. That's fourth-party risk — and almost no financial institution is managing it.
Vendor risk management is the process of identifying, assessing, and monitoring the security risks that third-party providers introduce to your environment. For financial institutions, it's a regulatory requirement, not a best practice. But most vendor risk programs stop at the first layer. The Marquis breach proves that's not enough.
Marquis Software Solutions provides marketing automation, compliance document generation, and member communication tools to community banks and credit unions. They sit in a privileged position: their software handles customer PII (personally identifiable information), account data, and regulatory communications.
Attackers gained entry through a known SonicWall firewall vulnerability, accessing Marquis systems on August 14, 2025, and deploying ransomware. Compromised data included names, Social Security numbers, dates of birth, financial account numbers, and driver's license numbers.
Eighty financial institutions confirmed affected. Over 823,000 consumers had data exposed. Individual institutions are now sending breach notification letters, offering credit monitoring services, and preparing for regulatory examination questions about their vendor risk management programs.
Among the affected: dozens of community banks and credit unions across multiple states — recognizable names in the financial services space. Individual institutions are now navigating breach notification requirements, offering credit monitoring, and fielding questions from their own examiners about vendor oversight.
Every industry has vendor relationships. Financial institutions have vendor relationships with regulatory consequences.
FFIEC (Federal Financial Institutions Examination Council), NCUA (National Credit Union Administration), and OCC (Office of the Comptroller of the Currency) examination guidance is explicit: the financial institution is responsible for managing risks introduced by third-party relationships. Your vendor's breach is your regulatory problem. The examiner won't accept "our vendor got hacked" as a sufficient answer. They'll ask what due diligence you performed before engaging the vendor, what ongoing monitoring you had in place, and what your incident response plan says about third-party breaches.
The NCUA examination process specifically evaluates how credit unions manage external dependency risk. Vendor risk management is a scored domain, not an afterthought.
When a marketing software vendor for a retail company gets breached, the exposed data might include email addresses and purchase history. When a marketing software vendor for financial institutions gets breached, the exposed data includes Social Security numbers, account numbers, and financial records. The regulatory notification requirements are different. The potential for identity theft and financial fraud is different. The reputational impact on a community institution that serves a local market is different.
Marquis serves over 700 financial institutions. A single breach at one vendor affected 80 of them simultaneously. That's concentration risk at the industry level. When your vendor serves hundreds of institutions like yours, a single security failure at that vendor creates cascading consequences across the financial services sector.
An unpatched firewall vulnerability caused the Marquis breach. This is not a sophisticated nation-state attack. It's a known vulnerability in a network appliance that didn't get patched in time.
That fact should concern every financial institution that uses Marquis or any vendor with similar infrastructure. It raises specific questions:
The FFIEC's guidance on third-party relationships provides a framework. Here's what that framework looks like in practice for IT and software vendors:
Whether or not you use Marquis Software specifically, the Marquis breach is a catalyst to evaluate your vendor risk management program:
ABT's Security Grade Assessment evaluates your Microsoft 365 configuration against a financial services security baseline. When your vendors get breached, your own security controls are the last line of defense.
Get Your Security GradeThe Marquis Software breach occurred in August 2025 when attackers exploited an unpatched SonicWall firewall vulnerability to deploy ransomware. Marquis provides marketing and compliance software to over 700 financial institutions. The breach exposed data on 823,548 consumers across 80 banks and credit unions, including Social Security numbers, account numbers, and dates of birth.
Vendor risk management for financial institutions is the process of identifying, assessing, and monitoring risks introduced by third-party service providers. FFIEC, NCUA, and OCC guidance requires financial institutions to perform due diligence before engaging vendors, maintain ongoing monitoring, and hold vendors accountable for protecting customer data. The institution remains responsible for vendor failures.
Financial institutions should require SOC 2 Type II attestation, documented vulnerability management programs with patching service-level agreements (SLAs), incident response plans with notification timelines, data encryption details for at rest and in transit, and contractual provisions for breach notification, right to audit, and liability. Annual review of these materials is a regulatory expectation.
Financial institutions bear regulatory responsibility for protecting customer data regardless of where that data is stored or processed. When a vendor is breached, the institution must manage customer notifications, regulatory reporting, and remediation. Examiners evaluate whether the institution performed adequate vendor due diligence and had appropriate contractual protections in place.
The Marquis breach reinforces examiner focus on third-party risk management during NCUA and FFIEC examinations. Examiners will likely increase scrutiny of vendor due diligence programs, especially for vendors that handle customer PII. Institutions should expect detailed questions about vendor security assessments, ongoing monitoring practices, and incident response plans covering third-party breach scenarios.
Financial institutions should configure Conditional Access policies that restrict third-party vendor access to specific applications and data, enforce multi-factor authentication for all external connections, and block legacy authentication protocols that vendors may use for integrations. Data Loss Prevention (DLP) rules should monitor and restrict the flow of customer personally identifiable information to vendor systems, flagging unusual data export patterns. Sensitivity labels on documents containing customer data prevent unauthorized sharing even if a vendor's environment is compromised. DMARC email authentication prevents attackers from spoofing your domain during vendor breach response communications.
The following tables define the regulatory frameworks and technical terms referenced throughout this article.
| Term | Full Name | What It Means |
|---|---|---|
| FFIEC | Federal Financial Institutions Examination Council | The interagency body that writes the IT and vendor management examination standards used by NCUA, OCC, and FDIC examiners. |
| NCUA | National Credit Union Administration | The federal regulator that charters and examines federally insured credit unions. |
| OCC | Office of the Comptroller of the Currency | The federal regulator that charters and examines national banks and federal savings associations. |
| FTC Safeguards Rule | Federal Trade Commission Standards for Safeguarding Customer Information | The updated FTC regulation requiring non-bank financial institutions (including mortgage companies) to implement comprehensive information security programs, including vendor risk management. |
| Term | Definition |
|---|---|
| Conditional Access | Microsoft Entra ID policies that enforce login requirements — such as multi-factor authentication, device compliance, and location restrictions — before granting access to Microsoft 365 resources. |
| CVE | Common Vulnerabilities and Exposures — a standardized catalog of publicly disclosed security vulnerabilities, each assigned a unique identifier used across the cybersecurity industry. |
| DLP (Data Loss Prevention) | Microsoft Purview rules that detect and block sharing of sensitive data — such as Social Security numbers, account numbers, and loan data — outside the organization. |
| DMARC | Domain-based Message Authentication, Reporting, and Conformance — an email authentication standard that prevents attackers from spoofing your organization's email domain. |
| PII | Personally Identifiable Information — data that can identify an individual, including Social Security numbers, dates of birth, account numbers, and financial records. |
| SLA | Service-Level Agreement — a contractual commitment specifying the level of service a vendor must provide, including response times, uptime guarantees, and remediation timelines. |
| SOC 2 Type II | An independent audit verifying that a service provider's security controls are designed properly and operating effectively over a sustained period (typically 6-12 months). |
11 min read
In August 2025, a ransomware gang breached Marquis Software Solutions through an unpatched SonicWall firewall and stole the personal data of 1.3...
9 min read
In this article: What the FFIEC Cybersecurity Assessment Actually Measures Why "Baseline" Maturity Is a Red Flag Five Mistakes Community Banks...
9 min read
In this article: Why Community Banks Need Specialized IT FFIEC, GLBA, and OCC: The Regulatory Stack What Your Managed IT Provider Must Deliver ...