JPMorgan Chase Data Breach

Last updated: June 29, 2025

Target Audience

Keywords

Introduction

Overview

JPMorgan Chase is the largest bank in the United States and the world's largest bank by market capitalization, with $3.9 trillion in assets. The cyberattack compromised data associated with 76 million households, 2 of 3 American households at the time of the attack. Stole names, email and postal addresses, and phone numbers from account holders.

Vulnerability Details

Attackers likely acquired original credentials from an employee who registered an account on the Corporate Challenge website. JPMorgan failed to implement two-factor authentication on the network server where the attackers logged in, which allowed the attackers to use the stolen credentials to log in. Once inside, the attackers gained access to 90 further network servers. The attack did not involve the use of any kind of zero-day. FBI first suspected a sophisticated adversary, such as the Russian government, but by mid-October had ruled them out as a suspect. Four individuals were indicted on 23 federal counts in relation to the attack on JPMorgan and similar attacks on other institutions. The attackers used the stolen account information to operate a stock price manipulation scheme and illegal gambling websites to make millions in profit. The defendants planned on starting their own brokerage business, using the stolen information to give them a leg up against competitors. In October 2015, the Senate Banking Committee asked federal banking regulators to create a process for mitigating attacks like this against the financial sector.

Learning Objectives

  • Explain data security and privacy
  • Describe security and privacy violations in the JPMorgan data breach
  • List common protection mechanisms for data security and privacy

Download

  • Includes a PDF case study adapted from a real-world cyber breach
  • Guided questions for student engagement
  • Instructor materials including context and background
  • All content packaged in a downloadable ZIP file

Remote Terminal

Terminal Description

Module Questions

What happened in the JPMorgan Chase data breach of 2014?
What are two effective security mechanisms that could guard against vulnerabilities like those exploited in the JPMorgan breach?
If you were a hacker, how would you launch a similar attack on another financial institution?
What are some ways to perform privilege escalation in financial networks?
How can vulnerability scanning be performed in a financial institution's network?
As the CTO of JPMorgan Chase, what measures would you implement to enhance the security of financial transaction systems?
How should financial institutions balance the need for third-party integrations with maintaining data security standards?
If you were responsible for mitigating the misuse of stolen data, what steps would you take?
What IT weaknesses paved the way for the JPMorgan Chase hackers?
As the CIO of JPMorgan Chase, how would you improve IT security?