How a Firewall Zero-Day Turned a Vendor Breach Into a Banking-Sector Event

Marquis Software Solutions zero-day ransomware

A routine breach notification filed with the Maine Attorney General reveals an event with far-reaching consequences: a ransomware attack on Marquis Software Solutions, a third-party provider for U.S. banks and credit unions, compromised sensitive customer data from more than 70 institutions. The filing shifts the incident from an isolated vendor breach to a sector-wide exposure event for the banking industry.

The breach notice states that Marquis experienced an external system compromise on August 14, 2025, and detected it the same day. Consumer notifications were issued on November 26. While this aligns with standard disclosure requirements, the underlying facts suggest a much broader impact.

The notice lists 42,784 affected residents in Maine alone, filed on behalf of Marquis’s financial-institution customers—a clue that the true scope is national. Public reports confirm that data from more than 70 banks and credit unions was affected.

The exposed data included personal identifiers and sensitive financial information: Social Security numbers, bank account details, and more. Marquis is offering extended identity-theft protection, a step typically reserved for breaches with long-term fraud risk.

Why Regulatory Filings Reveal More Than Press Releases

When breaches emerge, companies are usually the first to speak. Their statements are crafted to manage liability, often omitting detail.

Regulatory filings work differently. Attorney general disclosures require specifics, including dates, numbers, and the exact categories of exposed data. If Social Security numbers or account credentials were compromised, that must be explicitly stated.

That’s why the Marquis filing matters. It confirms the sensitivity of the compromised data and clarifies that Marquis filed on behalf of banks and credit unions. This framing elevates the breach from a vendor-level issue to a systemic exposure across financial institutions.

For defenders and regulators, such filings often offer the clearest early picture stripped of corporate narrative.

The Anatomy of the Breach

Investigators believe attackers exploited a previously unknown vulnerability—a zero-day—in a SonicWall firewall used as an SSL-VPN gateway. At the time of the August 2025 attack, no patch existed.

Zero-days remain effective because they bypass defenses designed for known threats. When a firewall or VPN is compromised, attackers aren’t sneaking in; they’re entering through trusted infrastructure.

VPN access also shortens the path to internal systems. Once inside, ransomware operators move quickly, harvesting data before defenders can assess the breach. Often, detection comes during execution rather than at the point of entry.

That appears to have been the case here. Same-day discovery suggests that alarms were triggered after attackers had already gained access.

Supply Chain Risk in Banking

Marquis didn’t need to be large, just well-positioned. Like many financial services vendors, it aggregates customer data from dozens of institutions. That central role concentrates risk: a single breach can affect many entities at once.

That’s precisely what happened. Customers from multiple banks were caught in the same incident because their data flowed through a shared provider.

“Marquis is the most recent example of how third-party concentration poses a systemic danger to the financial services industry: a single mid-tier vendor sitting in the data flow of numerous banks can instantly create a blast radius on a national scale,” said Noelle Murata, Sr. Security Engineer, Xcape, Inc.

Attackers recognize this leverage. Shared infrastructure means more victims—and more pressure—with the same intrusion.

Long-Term Impact of Exposed Data

The data compromised in the Marquis breach doesn’t age out. Social Security numbers, dates of birth, account and card data comprise a durable identity package. Most of it cannot be reset. This kind of exposure enables synthetic identity creation, tax fraud, and long-term identity abuse, often surfacing well after the breach fades from view.

This is why regulators treat Social Security number exposures differently from password leaks, and why extended identity protection is offered. The risk window stretches years into the future.

“One vendor breach exposed 400,000 banking customers across dozens of institutions,” said Michael Bell, Founder & CEO, Suzu Labs. “[It’s] a textbook example of third-party concentration risk where banks outsource services but also outsource their attack surface to vendors with weaker security postures.”

Remediation and the Gaps It Revealed

In response, Marquis implemented multi-factor authentication (MFA) on firewall and remote-access accounts, blocked known malicious IPs, restricted access permissions, and expanded system logging. These are prudent steps that reduce future risk. They also reveal what was missing beforehand.

Several of the new controls are designed to limit how far attackers can move once inside. But they don’t explain how attackers were able to persist post-exploitation. Reactive hardening can reduce the odds of a repeat incident, but once sensitive data has been accessed and copied, no amount of post-breach control tightening changes the outcome for the people already exposed.

What Institutions Must Learn

The Marquis breach didn’t happen because banks ignored security. It happened because trust stopped at the contract boundary. Vendor risk is too often treated as a periodic exercise. But for providers embedded in live data flows, continuous validation of controls is critical.

Compliance frameworks also struggle with zero-days. When trusted perimeter devices fail, institutions need confidence that vendors can detect and contain incidents in real time. Outsourcing services doesn’t outsource responsibility. Banks remain accountable, even when the breach occurs somewhere else.

“In banking, your security is only as strong as the quiet vendor you forgot was holding the keys,” Murata said.

This Breach Was a Warning

Ransomware groups are shifting toward shared infrastructure because it scales. VPN and firewall appliances are trusted, often overlooked, and exposed to the internet. When zero-days are deployed, the blast radius can be immediate and expansive.

Regulatory disclosures like the Maine filing serve as early warnings. Each one documents a playbook that attackers are already using. The Marquis incident won’t be the last of its kind. It’s a signal of what’s ahead.

Author
  • Contributing Writer, Security Buzz
    Michael Ansaldo is a veteran technology and business journalist with experience covering cybersecurity and a range of IT topics. His work has appeared in numerous publications including Wired, Enterprise.nxt, PCWorld, Computerworld, TechHive, GreenBiz, Mac|Life, and Executive Travel.