24-02-26, 04:26 AM
Mexico hsbc.com.mx (HSBC Finance Companies) Customers 1 Million
The security incident that HSBC described in its letter seems to fit the characteristics of brute-force password-guessing attempts, also known as a credentials stuffing attack. This is when hackers try usernames and password combos leaked in data breaches at other companies, hoping that some users might have reused usernames and passwords across services.
In its letter, HSBC confirmed that some of these attacks were successful and that attackers gained access to some customers details. Possibly exposed information includes full names, mailing addresses, phone numbers, email addresses, dates of birth, account numbers, account types, account balances, transaction histories, payee account information, and statement histories.
Headers: CVEREG, NUMCTO, DMSSNUM, DMADDR1, DMADDR2, DELOMU, ESTADO, DMCITY, DMZIP, LADTE1, TEL1, LADTE2, TEL2, DMNAME, RFC, LICREA
Sample: https://files.catbox.moe/a059ey.csv
Backup: https://qu.ax/zExNX.csv
contact full telegram @kingleads2026
The security incident that HSBC described in its letter seems to fit the characteristics of brute-force password-guessing attempts, also known as a credentials stuffing attack. This is when hackers try usernames and password combos leaked in data breaches at other companies, hoping that some users might have reused usernames and passwords across services.
In its letter, HSBC confirmed that some of these attacks were successful and that attackers gained access to some customers details. Possibly exposed information includes full names, mailing addresses, phone numbers, email addresses, dates of birth, account numbers, account types, account balances, transaction histories, payee account information, and statement histories.
Headers: CVEREG, NUMCTO, DMSSNUM, DMADDR1, DMADDR2, DELOMU, ESTADO, DMCITY, DMZIP, LADTE1, TEL1, LADTE2, TEL2, DMNAME, RFC, LICREA
Sample: https://files.catbox.moe/a059ey.csv
Backup: https://qu.ax/zExNX.csv
contact full telegram @kingleads2026
