Cybersecurity3 hrs ago

Fidelity Settles 2024 Data Breach Claims for $2.5 Million, Offers Up to $5K in Losses

Fidelity’s $2.5M settlement covers the 2024 breach; affected customers can claim up to $5K for losses and receive about $100 cash.

Peter Olaleru/3 min/US

Cybersecurity Editor

TweetLinkedIn
Fidelity Settles 2024 Data Breach Claims for $2.5 Million, Offers Up to $5K in Losses
Source: ClaimdepotOriginal source

Fidelity agreed to a $2.5 million settlement to resolve claims it failed to stop a 2024 data breach that exposed customers’ financial account and routing numbers. Eligible class members can receive up to $5,000 for documented losses, a roughly $100 cash payment, and two years of identity‑theft protection.

Context In August 2024 Fidelity sent breach notices to customers whose account and routing numbers were accessed between August 17 and 19. The notice stated that the information could be used for fraud or identity theft. No public details about how attackers gained entry have been released; the company said the incident was detected through internal monitoring. The breach affected an undisclosed number of Fidelity clients who hold investment, retirement or other financial accounts.

Key Facts - The settlement totals $2.5 million, with Fidelity denying wrongdoing. - Class members may claim up to $5,000 for verified monetary losses such as fraud, identity‑theft expenses, legal fees or credit‑monitoring costs. - Each participant receives a pro‑rata cash payment of about $100, which fluctuates based on the total number of valid claims filed. - California residents are eligible for an additional $50 payment under the state’s privacy law. - All claimants receive two years of identity‑theft protection and credit monitoring, backed by $1 million of fraud insurance. - Important dates: objections must be filed by June 26 2026; final approval hearing is set for July 9 2026; claim forms are due July 27 2026.

What It Means The settlement provides a concrete remedy for customers who suffered financial harm, while also highlighting the cost of insufficient safeguards for sensitive banking data. For Fidelity, the payout resolves litigation without admitting fault, but the case underscores regulatory expectations that financial institutions implement reasonable cybersecurity controls. The structured payout model—combining loss reimbursement, a flat cash award, and ongoing protection—may become a template for future class‑action resolutions in the sector.

What Defenders Should Do Although the exact attack vector remains undisclosed, defenders can reduce risk of similar credential‑based breaches by: - Enforcing multi‑factor authentication on all systems that store or transmit account numbers. - Applying the principle of least privilege and segmenting networks that handle financial data. - Monitoring for abnormal access patterns using SIEM rules aligned with MITRE ATT&CK T1078 (Valid Accounts) and T1041 (Exfiltration Over Command‑and‑Control Channel). - Keeping software up to date and applying vendor patches promptly; refer to CVE‑2024‑XXXX advisories for any relevant vulnerabilities once disclosed. - Conducting regular tabletop exercises that simulate credential theft and data exfiltration scenarios.

Watch for the July 9 2026 approval hearing and the July 27 2026 claim deadline, as they will determine the final distribution of settlement funds and signal whether additional consumer‑protection measures will be mandated.

TweetLinkedIn

More in this thread

Reader notes

Loading comments...