Financial technology company Revolut has started informing some customers that it has been targeted in a cyberattack that resulted in their information getting compromised.
Revolut described the attack as highly targeted and said the attacker only had access to customer information for a short period of time. The company claimed the attacker did not have access to money, card details, PINs, or passwords.
Revolut said the incident impacted 0.16% of its customers, who have been warned about the increased risk of fraud resulting from the breach.
Revolut is based in the UK, but has a specialized banking license from Lithuania, which is also home of Revolut Bank UAB. The company has informed Lithuanian regulators that the incident has affected roughly 50,150 customers around the world, including approximately 20,000 in Europe.
The exposed information includes names, addresses, phone numbers, email addresses, partial payment card data, and some account details.
According to the Lithanian State Data Protection Inspectorate, Revolut said one of its databases was accessed through social engineering.
Just before the hack was disclosed, some Revolut customers reported getting obscene messages via the application’s chat feature. After the incident was announced, some users reported getting text messages pointing to a Revolut phishing website. It’s unclear if these events are related to the breach.
Related: UK Financial Regulator Admits to Data Breach
Related: Data Breach at PFC USA Impacts Patients of 650 Healthcare Providers
Related: American Airlines Says Personal Data Exposed After Email Phishing Attack
Related: IBM Security: Cost of Data Breach Hitting All-Time Highs

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- EV Charging Management System Vulnerabilities Allow Disruption, Energy Theft
- Unpatched Econolite Traffic Controller Vulnerabilities Allow Remote Hacking
- Google Fi Data Breach Reportedly Led to SIM Swapping
- Microsoft’s Verified Publisher Status Abused in Email Theft Campaign
- British Retailer JD Sports Discloses Data Breach Affecting 10 Million Customers
- Meta Awards $27,000 Bounty for 2FA Bypass Vulnerability
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
- US Reiterates $10 Million Reward Offer After Disruption of Hive Ransomware
Latest News
- HeadCrab Botnet Ensnares 1,200 Redis Servers for Cryptomining
- Cyber Insights 2023 | Supply Chain Security
- Cyber Insights 2023: Regulations
- Cyber Insights 2023: Ransomware
- Cyber Insights 2023: Quantum Computing and the Coming Cryptopocalypse
- EV Charging Management System Vulnerabilities Allow Disruption, Energy Theft
- Malicious NPM, PyPI Packages Stealing User Information
- VMware Confirms Exploit Code Released for Critical vRealize Logging Vulnerabilities
