Figure Data Breach Exposes Nearly 1 Million Accounts in Social Engineering Attack

Feb 19, 2026

Hackers have stolen sensitive personal information tied to nearly one million customer accounts after breaching the systems of Figure Technology Solutions, a U.S.-based blockchain-native financial technology company.

The incident, which was publicly disclosed in mid-February 2026, highlights how social engineering remains one of the most effective tactics for attackers targeting corporate networks — even within heavily regulated and security-focused industries like fintech.

Key Facts

Detail

Information

Company Affected

Figure Technology Solutions

Industry

Fintech / Blockchain Lending

Estimated Accounts Impacted

~967,000 – 1 million+

Type of Attack

Data breach via social engineering

Data Compromised

Names, email addresses, phone numbers, physical addresses, dates of birth

Threat Actor

Claim by hacking group ShinyHunters

Date of Public Disclosure

February 2026

Incident Origin

Breach dating back to January 2026

Public Data Posted

~2.5 GB of compressed files on dark web

Additional Risks

Identity theft, targeted social engineering

What Happened?

According to security reports, attackers used social engineering tactics to trick a Figure employee and gain access to internal systems. Once inside, the compromise allowed them to exfiltrate a “limited number of files” containing sensitive customer personal information.

Despite not immediately disclosing the scope, third-party breach notification service Have I Been Pwned later revealed that data from 967,200 unique accounts was exposed in the incident, including contact information and dates of birth.

The hacking group ShinyHunters claimed responsibility by listing the stolen data on its dark web leak site — a common tactic used to pressure companies into paying ransoms or to publicly showcase stolen records.

What Type of Data Was Exposed?

While exact file details have not been confirmed by Figure itself, breach analysis indicates that the attackers accessed and leaked sensitive personal data that could be used in fraud, identity theft, or further social engineering attacks:

  • Full names

  • Email addresses

  • Phone numbers

  • Physical addresses

  • Dates of birth

No indication has been made publicly that financial account numbers, passwords, or direct login credentials were accessed or disclosed.

Risk Profile & Attack Vectors

This incident is part of a continuing trend where attackers leverage social engineering and single-sign-on weaknesses to infiltrate enterprise environments. Techniques such as phishing calls, fake support portals, or credential harvesting on phishing domains are often successful where strong employee training and multi-factor authentication (MFA) are absent or misconfigured.

Once access is gained to one account — particularly one linked to administrative privileges or SSO — attackers can move laterally throughout the environment and access connected data stores.

What This Means for Affected Customers

Individuals potentially impacted by this breach face several cyber risks:

  • Identity theft & impersonation: Personal identifiers like birth dates and addresses make phishing and identity fraud more effective.

  • Targeted scams: Attackers can craft convincing credential phishing or voice-based social engineering campaigns (vishing).

  • Credential stuffing attacks: Though passwords weren’t reported stolen, attackers may attempt to try credentials elsewhere if tied to email addresses.

Affected users should closely monitor financial accounts, enable multi-factor authentication on all services where possible, and consider credit monitoring or identity theft protection services.

Recommended Mitigations

For Individuals:

  • Enable MFA on all online accounts

  • Monitor credit reports & bank statements

  • Be wary of unsolicited calls / emails claiming to be from financial institutions

For Organizations:

  • Conduct regular social engineering training & simulations

  • Enforce robust MFA, especially on SSO and remote access systems

  • Implement continuous monitoring and anomaly detection

  • Review incident response and breach disclosure protocols

Final Thoughts

This breach at Figure underscores two enduring truths in cybersecurity:

  1. Human factors continue to be the weakest link — attackers frequently exploit social behavior more than technical flaws.

  2. Data exposure carries long-term risk — even if financial credentials aren’t stolen, personal data can fuel downstream fraud schemes.

Strengthened training, vigilant monitoring, and layered defenses are critical to safeguarding sensitive information in today’s threat landscape.

Disclaimer: ClearPhish maintains a strict policy of not participating in the theft, distribution, or handling of stolen data or files. The platform does not engage in exfiltration, downloading, hosting, or reposting any illegally obtained information. Any responsibility or legal inquiries regarding the data should be directed solely at the responsible cybercriminals or attackers, as ClearPhish is not involved in these activities. We encourage parties affected by any breach to seek resolution through legal channels directly with the attackers responsible for such incidents.

Latest News

FBI Confirms Hack of Director Patel’s Personal Email Inbox

FBI Confirms Hack of Director Patel’s Personal Email Inbox

FBI Confirms Hack of Director Patel’s Personal Email Inbox

FBI Confirms Hack of Director Patel’s Personal Email Inbox

FBI Confirms Hack of Director Patel’s Personal Email Inbox

Apr 1, 2026

Microsoft Pulls Windows 11 KB5079391 Update After 0x80073712 Installation Errors

Microsoft Pulls Windows 11 KB5079391 Update After 0x80073712 Installation Errors

Microsoft Pulls Windows 11 KB5079391 Update After 0x80073712 Installation Errors

Microsoft Pulls Windows 11 KB5079391 Update After 0x80073712 Installation Errors

Microsoft Pulls Windows 11 KB5079391 Update After 0x80073712 Installation Errors

Mar 31, 2026

HackerOne Employee Data Breach via Navia Hack Exposes Sensitive Information

HackerOne Employee Data Breach via Navia Hack Exposes Sensitive Information

HackerOne Employee Data Breach via Navia Hack Exposes Sensitive Information

HackerOne Employee Data Breach via Navia Hack Exposes Sensitive Information

HackerOne Employee Data Breach via Navia Hack Exposes Sensitive Information

Mar 26, 2026

Firefox Introduces Free Built-In VPN with 50GB Monthly Limit

Firefox Introduces Free Built-In VPN with 50GB Monthly Limit

Firefox Introduces Free Built-In VPN with 50GB Monthly Limit

Firefox Introduces Free Built-In VPN with 50GB Monthly Limit

Firefox Introduces Free Built-In VPN with 50GB Monthly Limit

Mar 26, 2026

Microsoft Azure Monitor Alerts Abused in Callback Phishing Campaigns

Microsoft Azure Monitor Alerts Abused in Callback Phishing Campaigns

Microsoft Azure Monitor Alerts Abused in Callback Phishing Campaigns

Microsoft Azure Monitor Alerts Abused in Callback Phishing Campaigns

Microsoft Azure Monitor Alerts Abused in Callback Phishing Campaigns

Mar 23, 2026

Trivy GitHub Actions Supply Chain Attack: Infostealer Compromises CI/CD Pipelines

Trivy GitHub Actions Supply Chain Attack: Infostealer Compromises CI/CD Pipelines

Trivy GitHub Actions Supply Chain Attack: Infostealer Compromises CI/CD Pipelines

Trivy GitHub Actions Supply Chain Attack: Infostealer Compromises CI/CD Pipelines

Trivy GitHub Actions Supply Chain Attack: Infostealer Compromises CI/CD Pipelines

Mar 23, 2026

Get updates in your inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Get updates in your

inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.