2026 Futuriom 50: Highlights →Explore

Executive Summary

In August 2025, Marquis Software Solutions, a Texas-based fintech firm serving over 700 financial institutions, experienced a ransomware attack that compromised sensitive data of more than 780,000 individuals across at least 80 banks and credit unions. The attackers exploited a vulnerability in SonicWall's firewall backup service, gaining unauthorized access to Marquis's network and exfiltrating personal information, including names, addresses, Social Security numbers, and financial account details. This breach underscores the critical importance of securing third-party services and the potential cascading effects of supply chain vulnerabilities. The incident highlights the growing trend of cybercriminals targeting supply chain weaknesses to infiltrate organizations, emphasizing the need for comprehensive security assessments and robust vendor management practices to mitigate such risks.

Why This Matters Now

The Marquis incident underscores the escalating threat of supply chain attacks, where vulnerabilities in third-party services can lead to widespread data breaches. As organizations increasingly rely on external vendors, ensuring the security of these partners is paramount to prevent similar incidents and protect sensitive customer information.

Attack Path Analysis

Related CVEs

MITRE ATT&CK® Techniques

Potential Compliance Exposure

Sector Implications

Sources

Frequently Asked Questions

The breach was caused by attackers exploiting a vulnerability in SonicWall's firewall backup service, allowing unauthorized access to Marquis's network.

Cloud Native Security Fabric Mitigations and ControlsCNSF

Aviatrix Zero Trust CNSF is pertinent to this incident as it could have limited the attacker's ability to move laterally and exfiltrate data by enforcing strict segmentation and identity-aware policies.

Initial Compromise

Control: Cloud Native Security Fabric (CNSF)

Mitigation: The attacker's initial unauthorized access may have been constrained, reducing the likelihood of exploiting firewall configurations.

Privilege Escalation

Control: Zero Trust Segmentation

Mitigation: The attacker's ability to escalate privileges may have been limited, reducing the scope of unauthorized access.

Lateral Movement

Control: East-West Traffic Security

Mitigation: The attacker's lateral movement may have been restricted, reducing the risk of accessing sensitive data.

Command & Control

Control: Multicloud Visibility & Control

Mitigation: The attacker's ability to establish command and control channels may have been hindered, reducing persistent access.

Exfiltration

Control: Egress Security & Policy Enforcement

Mitigation: The attacker's data exfiltration efforts may have been blocked, reducing the risk of data loss.

Impact (Mitigations)

The attacker's ability to deploy ransomware may have been limited, reducing the impact on critical systems.

Impact at a Glance

Affected Business Functions

  • Customer Data Management
  • Digital Marketing Services
  • Compliance Reporting
Operational Disruption

Estimated downtime: 21 days

Financial Impact

Estimated loss: $5,000,000

Data Exposure

Personal information of customers from 74 U.S. banks, including names, addresses, phone numbers, Social Security numbers, Taxpayer Identification Numbers, and financial account information.

Recommended Actions

  • Implement Zero Trust Segmentation to enforce least privilege access and limit lateral movement.
  • Deploy East-West Traffic Security to monitor and control internal traffic, detecting unauthorized movements.
  • Utilize Egress Security & Policy Enforcement to prevent unauthorized data exfiltration.
  • Establish Multicloud Visibility & Control to detect and respond to anomalous activities across cloud environments.
  • Regularly update and patch all systems, including firewalls, to mitigate known vulnerabilities.

Secure the Paths Between Cloud Workloads

A cloud-native security fabric that enforces Zero Trust across workload communication—reducing attack paths, compliance risk, and operational complexity.

Cta pattren Image