AppleInsider is supported by its audience and can earn commissions as an Amazon Associate and Affiliate on qualifying purchases. These affiliate partnerships do not affect our editorial content.
On Monday, Block, Inc., a financial services and digital payments company, filed a report saying the company suffered a data breach when a former Cash App employee accessed customer data without authorization.
The breach occurred on December 10, 2021, when the former employee looked up and downloaded customer reports from the company’s database.
Block, the parent company of Cash App, filed a filing with the U.S. Securities and Exchange Commission on April 4, publicly acknowledging the infringement.
The company did not say how many customers were affected by the breach, but told TechCrunch it was in contact with 8.2 million current and former users about the incident.
The reports contain the full names of the clients and the account numbers of the brokers. In addition, some clients had exposed the value of their brokerage portfolio, their holdings and stock trading activities in one day.
According to Block, no personally identifiable information other than names was used. Usernames, passwords, Social Security numbers, home addresses, and payment information would likely not be made public.
The company also stated that other Cash App-related products and features outside of the United States were not affected.
Block notes that immediately after discovering the breach, the company launched an internal investigation. In addition, the company seeks the assistance of appropriate regulatory and law enforcement agencies.
Formerly known as Square, Block is known for its Square Reader platform. However, the company has many other ventures, including Tidal, a music streaming service, Spiral, the company’s cryptocurrency arm, and Cash App.
This post More than 8 million customers affected by data breach in Cash App
was original published at “https://appleinsider.com/articles/22/04/05/over-8-million-customers-affected-in-cash-app-data-breach?utm_medium=rss”