2026 Futuriom 50: Highlights →Explore

Executive Summary

In August 2025, Marquis Software Solutions, a Texas-based fintech firm serving over 700 banks and credit unions, experienced a ransomware attack. The breach was traced back to unauthorized access through its SonicWall firewall, leading to the exposure of sensitive data, including names, addresses, Social Security numbers, and financial account information of over 400,000 individuals associated with 74 financial institutions. The attackers exploited a known but unpatched vulnerability in SonicWall’s firewall software (CVE-2024-40766), allowing them to infiltrate Marquis's network and deploy ransomware. This incident underscores the critical importance of timely patch management and the potential risks associated with third-party service providers. (techradar.com)

The Marquis breach highlights the escalating trend of cyberattacks targeting supply chain vulnerabilities, emphasizing the need for organizations to scrutinize the security postures of their vendors. Additionally, it serves as a stark reminder of the consequences of delayed patching, as threat actors increasingly exploit known vulnerabilities to gain unauthorized access to sensitive data.

Why This Matters Now

The Marquis breach underscores the urgent need for organizations to prioritize timely patch management and to rigorously assess the security measures of their third-party vendors. As cyberattacks targeting supply chain vulnerabilities become more prevalent, businesses must adopt a proactive approach to safeguard sensitive data and maintain customer trust.

Attack Path Analysis

Related CVEs

MITRE ATT&CK® Techniques

Potential Compliance Exposure

Sector Implications

Sources

Frequently Asked Questions

The breach was caused by attackers exploiting an unpatched vulnerability (CVE-2024-40766) in SonicWall’s firewall software, allowing unauthorized access to Marquis's network and deployment of ransomware.

Cloud Native Security Fabric Mitigations and ControlsCNSF

Implementing Aviatrix Zero Trust CNSF could have significantly constrained the attacker's ability to move laterally, escalate privileges, and exfiltrate data within Marquis's network, thereby reducing the overall impact of the breach.

Initial Compromise

Control: Cloud Native Security Fabric (CNSF)

Mitigation: While Aviatrix Zero Trust CNSF may not have prevented the initial exploitation of the firewall vulnerability, it could have limited the attacker's ability to exploit this access to move further into the network.

Privilege Escalation

Control: Zero Trust Segmentation

Mitigation: Aviatrix Zero Trust Segmentation could have limited the attacker's ability to escalate privileges by enforcing strict access controls and minimizing trust relationships between systems.

Lateral Movement

Control: East-West Traffic Security

Mitigation: Aviatrix East-West Traffic Security could have restricted the attacker's lateral movement by monitoring and controlling internal traffic flows.

Command & Control

Control: Multicloud Visibility & Control

Mitigation: Aviatrix Multicloud Visibility & Control could have detected and disrupted command and control communications by providing comprehensive monitoring and control over network traffic.

Exfiltration

Control: Egress Security & Policy Enforcement

Mitigation: Aviatrix Egress Security & Policy Enforcement could have limited data exfiltration by controlling and monitoring outbound traffic.

Impact (Mitigations)

While Aviatrix Zero Trust CNSF may not have entirely prevented the deployment of ransomware, it could have limited the spread and impact by isolating infected systems and restricting their communication with other parts of the network.

Impact at a Glance

Affected Business Functions

  • Client Data Management
  • Compliance Reporting
  • Marketing Operations
Operational Disruption

Estimated downtime: 14 days

Financial Impact

Estimated loss: $500,000

Data Exposure

Personally Identifiable Information (PII) of customers from multiple banks and credit unions.

Recommended Actions

  • Implement Zero Trust Segmentation to restrict lateral movement within the network.
  • Enforce Egress Security & Policy Enforcement to monitor and control outbound traffic, preventing unauthorized data exfiltration.
  • Deploy Inline IPS (Suricata) to detect and prevent exploitation of known vulnerabilities.
  • Utilize Threat Detection & Anomaly Response systems to identify and respond to suspicious activities promptly.
  • Regularly update and patch all systems, including firewalls, to mitigate known vulnerabilities.

Secure the Paths Between Cloud Workloads

A cloud-native security fabric that enforces Zero Trust across workload communication—reducing attack paths, compliance risk, and operational complexity.

Cta pattren Image