VeraBank Data Breach Affects 37K Banking Customers

Published
December 26, 2025
Updated
January 2, 2026
VeraBank Data Breach Affects 37K Banking Customers
VeraBank

Affected by the

VeraBank

data breach?

Join the Lawsuit

On Aug. 14, 2025, Marquis Software Solutions, a third-party marketing and communications vendor for VeraBank, Inc., experienced a significant ransomware attack that resulted in the unauthorized access and copying of sensitive files from its network. So far, at least 37,318 VeraBank customers have been impacted, including 36,204 residents in Texas, four in New Hampshire, and three each in Maine and Massachusetts.

The breach was discovered by Marquis on the same day, prompting an immediate investigation with the help of cybersecurity experts and notification to federal law enforcement.

The attack exploited a vulnerability in Marquis’ SonicWall firewall, allowing an unauthorized third party to access and exfiltrate data. Importantly, VeraBank’s internal systems were not compromised; the incident was limited to Marquis’ environment. Marquis’ forensic review determined that the files accessed contained personal information belonging to customers of VeraBank and other financial institutions.

The information exposed in the Marquis data breach incident includes names, addresses, phone numbers, Social Security numbers, Taxpayer Identification Numbers, financial account information (excluding security or access codes), and dates of birth. The exposure of personally identifiable information (PII) puts individuals at risk of identity theft and financial fraud.

The breach affected a large number of individuals, with the notification process extending to multiple states and involving thousands of records across Marquis’ client base.

VeraBank completed its review of the impacted data on Dec. 12, 2025, and began notifying affected individuals shortly thereafter. In December 2025, the company disclosed the data breach to the Attorney Generals' offices in Vermont, Texas, New Hampshire, Massachusetts and Maine.

VeraBank's response

In response to the breach, VeraBank has taken several steps to protect those whose information was involved. The bank is offering a complimentary 24-month subscription to credit monitoring, credit report, and credit score services through Cyberscout, a TransUnion company. These services will alert affected individuals to changes in their credit files, helping them detect potential identity theft or fraud early.

Marquis, the vendor whose systems were breached, has taken steps to secure its network and is evaluating additional technical and organizational safeguards to prevent similar incidents in the future.

If you receive a notification letter, it may be in your best interest to consider the following:

  • Enroll in the complimentary credit monitoring service as soon as possible
  • Monitor financial accounts and credit reports for unauthorized activity
  • Consider placing a security freeze or fraud alert on their credit file
  • Review the identity theft protection guide provided by VeraBank

For further information or assistance, affected individuals can contact VeraBank at 1-833-751-0388, Monday through Friday, 8 a.m. to 8 p.m. ET.

Types of INFORMATION affected
  • Names
    Names
  • Social security numbers
    Social Security Numbers
  • Dates of birth
    Dates of Birth
  • Addresses
    Addresses
  • Government IDs
    Government IDs
  • Medical Information
    Medical Info
  • Financial Info
    Financial Info
  • Affected information types not yet disclosed

Notice Letter

This browser does not support inline PDFs. Please download the PDF to view it: Download PDF

Affected Entity
VeraBank
Consumers Notification date
December 23, 2025
Date of Breach
Breach Discovered Date
August 14, 2025
Total People Affected
37318
Information Types Exposed
  • Name of individual
  • Social Security Number Information
  • Other
  • Social Security number
  • Social Security numbers or tax ID numbers
  • Financial account numbers
  • Addresses
  • Dates of birth
  • Names
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image