Rankiteo Logo
Rankiteo
Leader in Cyber Underwriting
NEWRankiteo Cyber Underwriter Desktop - Score, price, and bind from your desktop
WindowsmacOSLinux
Download
Analyze » Bancolombia » BAN1775716437

Incident Score: Analysis & Impact (BAN1775716437)

The details regarding individual company incidents & reports gives you full view from every side.

Rankiteo Score Impact Analysis

Rankiteo Incident Impact-54
Company Score Before Incident791 / 1000
Company Score After Incident737 / 1000
INCIDENT NUMBERBAN1775716437
Type of Cyber IncidentBreach
ATTACK VECTORNA
DATA EXPOSEDCustomer data
INCIDENT DATE08/04/2026
STATUSUnverified, pending independent confirmation

Key Highlights From The Incident Analysis

  • Timeline of Bancolombia's Breach and lateral movement inside company's environment.
  • Overview of affected data sets, including SSNs and PHI, and why they materially increase incident severity.
  • How Rankiteo’s incident engine converts technical details into a normalized incident score.
  • How this cyber incident impacts Bancolombia Rankiteo cyber scoring and cyber rating.
  • Rankiteo’s MITRE ATT&CK correlation analysis for this incident, with associated confidence level.

Full Incident Analysis Transcript

In this Rankiteo incident briefing, we review the Bancolombia breach identified under incident ID BAN1775716437.

The analysis begins with a detailed overview of Bancolombia's information like the linkedin page: https://www.linkedin.com/company/bancolombia, the number of followers: 1116344, the industry type: Banking and the number of employees: 20489 employees

After the initial compromise, the video explains how Rankiteo's incident engine converts technical details into a normalized incident score. The incident score before the incident was 791 and after the incident was 737 with a difference of -54 which is could be a good indicator of the severity and impact of the incident.

In the next step of the video, we will analyze in more details the incident and the impact it had on Bancolombia and their customers.

Grupo Bancolombia recently reported "Hackers Claim Breach of Major Colombian Banks, Leak Customer Data", a noteworthy cybersecurity incident.

Hackers have alleged a data breach affecting two of Colombia’s largest financial institutions, Grupo Bancolombia and Banco de Bogota, posting samples of purportedly stolen customer data on an underground forum.

The disruption is felt across the environment, and exposing Customer data, with nearly 30 records (Banco de Bogota) records at risk.

Formal response steps have not been shared publicly yet.

The case underscores how Unverified, pending independent confirmation.

Finally, we try to match the incident with the MITRE ATT&CK framework to see if there is any correlation between the incident and the MITRE ATT&CK framework.

The MITRE ATT&CK framework is a knowledge base of techniques and sub-techniques that are used to describe the tactics and procedures of cyber adversaries. It is a powerful tool for understanding the threat landscape and for developing effective defense strategies.

MITRE ATT&CK® Correlation Analysis

Rankiteo's analysis has identified several MITRE ATT&CK tactics and techniques associated with this incident, each with varying levels of confidence based on available evidence. Under the Initial Access tactic, the analysis identified Exploit Public-Facing Application (T1190) with moderate confidence (50%), supported by evidence indicating large customer bases and expanding digital services create attractive targets and Trusted Relationship (T1199) with lower confidence (40%), supported by evidence indicating limited client details such as adviser locations and insurance plans. Under the Credential Access tactic, the analysis identified Container API (T1552.007) with lower confidence (30%), supported by evidence indicating login timestamps included in leaked data and Credentials from Password Stores (T1555) with lower confidence (40%), supported by evidence indicating names, login timestamps, and client details exposed. Under the Collection tactic, the analysis identified Data from Local System (T1005) with moderate to high confidence (80%), supported by evidence indicating names, phone numbers, physical addresses, and client details compromised and Data from Information Repositories (T1213) with moderate to high confidence (70%), supported by evidence indicating pDF files containing adviser locations and insurance plans exposed. Under the Exfiltration tactic, the analysis identified Exfiltration Over C2 Channel (T1041) with moderate to high confidence (80%), supported by evidence indicating samples of purportedly stolen customer data posted on underground forum and Exfiltration Over Web Service (T1567) with moderate confidence (60%), supported by evidence indicating data breach claims made on DarkForums. Under the Impact tactic, the analysis identified Data Destruction (T1485) with lower confidence (30%), supported by evidence indicating unverified breach claims raise concerns about potential exposure and Stored Data Manipulation (T1565.001) with lower confidence (40%), supported by evidence indicating cross-referencing with other breached datasets could enable attacks. Under the Reconnaissance tactic, the analysis identified Active Scanning (T1595) with moderate confidence (50%), supported by evidence indicating large customer bases and digital services create attractive targets. These correlations help security teams understand the attack chain and develop appropriate defensive measures based on the observed tactics and techniques.

Initial Access
Exploit Public-Facing Application (50%)
Trusted Relationship (40%)
Credential Access
Container API (30%)
Credentials from Password Stores (40%)
Collection
Data from Local System (80%)
Data from Information Repositories (70%)
Exfiltration
Exfiltration Over C2 Channel (80%)
Exfiltration Over Web Service (60%)
Impact
Data Destruction (30%)
Stored Data Manipulation (40%)
Reconnaissance
Active Scanning (50%)