Overview
- Figure says a compromised employee account allowed the download of a limited number of files.
- ShinyHunters claimed responsibility, said a ransom was refused, and posted about 2.5 GB of alleged data.
- Reporters who reviewed samples saw customers’ names, home addresses, dates of birth, and phone numbers.
- The company says it blocked the activity, engaged a forensic firm, began notifying affected individuals, and is offering complimentary credit monitoring.
- A ShinyHunters member told TechCrunch the incident is part of a broader campaign targeting Okta single sign-on customers, naming Harvard and the University of Pennsylvania.