Ameriprise Financial Data Breach Exposes Personal Data of Nearly 48,000 Customers
Nearly 48,000 Ameriprise customers had personal information accessed in a March 2026 breach; the firm reports no financial theft but warns of lingering identity‑theft risk.

TL;DR
Nearly 48,000 Ameriprise Financial customers had personal information accessed in a breach that began March 2, 2026 and was detected March 18, 2026. The company says no funds were stolen and operations continued uninterrupted.
Context Ameriprise Financial disclosed the incident in a filing with the Maine attorney general. Unauthorized access to stored data and files affected individuals across the United States. The breach did not disrupt any banking or investment services.
Key Facts - Approximately 48,000 U.S. individuals had names, addresses, financial account details, and possibly Social Security numbers exposed. - The intrusion started on March 2 and was identified 16 days later on March 18. - Ameriprise confirmed the access involved stored data but resulted in no unauthorized transactions or service disruption. - Court filings showed the threat actor group ShinyHunters claimed responsibility and threatened to leak over 200 GB of internal data; those lawsuits were later dropped without prejudice. - No specific vulnerability or CVE has been publicly disclosed by Ameriprise or investigators.
What It Means Exposed personal information can be used for identity theft, credential stuffing, and targeted phishing even when no immediate financial loss occurs. Affected customers should monitor accounts for unusual activity and consider protective measures such as credit freezes. The incident highlights that data‑theft motives often precede any direct fraud, extending risk beyond the breach date.
Mitigations Organizations should enforce multi‑factor authentication on all privileged and remote access points. Review and tighten access controls to stored files, applying the principle of least privilege. Enable detailed logging of data access and configure alerts for anomalous read‑only or bulk download actions (MITRE ATT&CK T1078, T1021). Ensure timely patching of internet‑facing applications and subscribe to relevant vendor advisories. Deploy data loss prevention tools to detect and block large‑volume exfiltration attempts. Conduct regular tabletop exercises that simulate unauthorized data access scenarios. What to watch next: any further disclosures from Ameriprise regarding the attack vector, potential regulatory actions, or resurfacing of the ShinyHunters claims.
Continue reading
More in this thread
Ameriprise Data Breach Exposes Personal Data of 48,000 Customers, No Funds Taken
Peter Olaleru
142 Million Requests Knocked Offline MP's Website in DDoS Incident
Peter Olaleru
Medtronic Confirms System Compromise After ShinyHunters Claims 9 Million Records Stolen
Peter Olaleru
Conversation
Reader notes
Loading comments...