Barclays Bank probes 'client data sold to rogue City traders' breach

'Initial investigations' suggest 'data from 2008 or earlier'


Barclays Bank has launched an investigation following a reported security breach involving thousands of confidential customer files.

The Mail on Sunday took delivery of a memory stick containing personal details of 2,000 Barclays customers from a whistleblower. The files reportedly contained passport and national insurance details, as well as financial data, health and insurance information.

The whistleblower alleges that the information was sold to "rogue City traders" and served as a target list for boiler room-style high pressure investment sales operations.

Those listed apparently completed psychometric tests to determine their attitude to risk and this formed a key component of the leaked information.

The leaked information allegedly represents a sample of a dossier containing a total of 27,000 records. Whether or not there is more information beyond the 2,000 leaked files remains unconfirmed.

Each individual dossier is 20 pages long and said to be worth £50 on the black market. Reporters at the Mail on Sunday contacted victims of the breach, whose angry reaction features prominently in the paper's story.

The data dates from 2008 and is said to have come from clients of Barclays Financial Planning, a financial advice division of the bank which closed in 2011.

A Barclays spokeswoman told El Reg that it had reported the incident to financial regulators at the FCA and data privacy watchdogs at the Information Commissioner's Office (ICO). The matter has also been reported to the police.

Barclays is in the process of checking whether the information contained in the file is genuine before contacting affected customers, as an official statement from the bank explains.

We are grateful to the Mail on Sunday for bringing this to our attention and we contacted the Information Commissioner and other regulators on Friday as soon as we were made aware.

Our initial investigations suggest this is isolated to customers linked to our Barclays Financial Planning business which we ceased operating as a service in 2011. Based on what we have seen, this appears to be data from 2008 or earlier.

We will take all necessary steps to contact and advise those customers as soon as possible so that they can also ensure the safety of their personal data.

Protecting our customers' data is a top priority and we take this issue extremely seriously. This appears to be criminal action and we will co-operate with the authorities on pursuing the perpetrator.

We would like to reassure all of our customers that we have taken every practical measure to ensure that personal and financial details remain as safe and secure as possible.

An ICO spokesperson said:

It's crucial that people's personal information is properly looked after. We'll be working with the Mail on Sunday this week to get further details of what has happened here, as well as working with the police.

®


Other stories you might like

  • Prisons transcribe private phone calls with inmates using speech-to-text AI

    Plus: A drug designed by machine learning algorithms to treat liver disease reaches human clinical trials and more

    In brief Prisons around the US are installing AI speech-to-text models to automatically transcribe conversations with inmates during their phone calls.

    A series of contracts and emails from eight different states revealed how Verus, an AI application developed by LEO Technologies and based on a speech-to-text system offered by Amazon, was used to eavesdrop on prisoners’ phone calls.

    In a sales pitch, LEO’s CEO James Sexton told officials working for a jail in Cook County, Illinois, that one of its customers in Calhoun County, Alabama, uses the software to protect prisons from getting sued, according to an investigation by the Thomson Reuters Foundation.

    Continue reading
  • Battlefield 2042: Please don't be the death knell of the franchise, please don't be the death knell of the franchise

    Another terrible launch, but DICE is already working on improvements

    The RPG Greetings, traveller, and welcome back to The Register Plays Games, our monthly gaming column. Since the last edition on New World, we hit level cap and the "endgame". Around this time, item duping exploits became rife and every attempt Amazon Games made to fix it just broke something else. The post-level 60 "watermark" system for gear drops is also infuriating and tedious, but not something we were able to address in the column. So bear these things in mind if you were ever tempted. On that note, it's time to look at another newly released shit show – Battlefield 2042.

    I wanted to love Battlefield 2042, I really did. After the bum note of the first-person shooter (FPS) franchise's return to Second World War theatres with Battlefield V (2018), I stupidly assumed the next entry from EA-owned Swedish developer DICE would be a return to form. I was wrong.

    The multiplayer military FPS market is dominated by two forces: Activision's Call of Duty (COD) series and EA's Battlefield. Fans of each franchise are loyal to the point of zealotry with little crossover between player bases. Here's where I stand: COD jumped the shark with Modern Warfare 2 in 2009. It's flip-flopped from WW2 to present-day combat and back again, tried sci-fi, and even the Battle Royale trend with the free-to-play Call of Duty: Warzone (2020), which has been thoroughly ruined by hackers and developer inaction.

    Continue reading
  • American diplomats' iPhones reportedly compromised by NSO Group intrusion software

    Reuters claims nine State Department employees outside the US had their devices hacked

    The Apple iPhones of at least nine US State Department officials were compromised by an unidentified entity using NSO Group's Pegasus spyware, according to a report published Friday by Reuters.

    NSO Group in an email to The Register said it has blocked an unnamed customers' access to its system upon receiving an inquiry about the incident but has yet to confirm whether its software was involved.

    "Once the inquiry was received, and before any investigation under our compliance policy, we have decided to immediately terminate relevant customers’ access to the system, due to the severity of the allegations," an NSO spokesperson told The Register in an email. "To this point, we haven’t received any information nor the phone numbers, nor any indication that NSO’s tools were used in this case."

    Continue reading

Biting the hand that feeds IT © 1998–2021