Financial technology company Revolut has started informing some customers that it has been targeted in a cyberattack that resulted in their information getting compromised.
Revolut described the attack as highly targeted and said the attacker only had access to customer information for a short period of time. The company claimed the attacker did not have access to money, card details, PINs, or passwords.
Revolut said the incident impacted 0.16% of its customers, who have been warned about the increased risk of fraud resulting from the breach.
Revolut is based in the UK, but has a specialized banking license from Lithuania, which is also home of Revolut Bank UAB. The company has informed Lithuanian regulators that the incident has affected roughly 50,150 customers around the world, including approximately 20,000 in Europe.
The exposed information includes names, addresses, phone numbers, email addresses, partial payment card data, and some account details.
According to the Lithanian State Data Protection Inspectorate, Revolut said one of its databases was accessed through social engineering.
Just before the hack was disclosed, some Revolut customers reported getting obscene messages via the application’s chat feature. After the incident was announced, some users reported getting text messages pointing to a Revolut phishing website. It’s unclear if these events are related to the breach.
Related: UK Financial Regulator Admits to Data Breach
Related: Data Breach at PFC USA Impacts Patients of 650 Healthcare Providers
Related: American Airlines Says Personal Data Exposed After Email Phishing Attack
Related: IBM Security: Cost of Data Breach Hitting All-Time Highs

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- High-Severity Vulnerabilities Found in WellinTech Industrial Data Historian
- CISA Expands Cybersecurity Committee, Updates Baseline Security Goals
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- Organizations Notified of Remotely Exploitable Vulnerabilities in Aveva HMI, SCADA Products
- Waterfall Security, TXOne Networks Launch New OT Security Appliances
- Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm
- New York Man Arrested for Running BreachForums Cybercrime Website
- Exploitation of Recent Fortinet Zero-Day Linked to Chinese Cyberspies
Latest News
- Backslash Snags $8M Seed Financing for AppSec Tech
- ‘Badsecrets’ Open Source Tool Detects Secrets in Many Web Frameworks
- High-Severity Vulnerabilities Found in WellinTech Industrial Data Historian
- Chrome 111 Update Patches High-Severity Vulnerabilities
- BreachForums Shut Down Over Law Enforcement Takeover Concerns
- CISA Expands Cybersecurity Committee, Updates Baseline Security Goals
- Malware Trends: What’s Old Is Still New
- Burnout in Cybersecurity – Can It Be Prevented?
