February 2026 Security Issues Related to the Korean & Global Financial Sector

February 2026 Security Issues Related to the Korean & Global Financial Sector

This report comprehensively covers actual cyber threats and related security issues targeting financial institutions in South Korea and abroad.

It includes analysis of malware and phishing cases distributed targeting the financial sector, presents the Top 10 major malware targeting the financial sector, and provides statistics on the industry sectors of South Korean accounts leaked via Telegram. It also details cases of phishing emails distributed targeting the financial sector.

Furthermore, it analyzes major financial threats and cases originating from the dark web. It investigates threats and actual cases of credit card data leaks, as well as threats and incidents of database leaks at financial institutions. It also analyzes ransomware intrusion threats targeting the financial sector, damage cases resulting from infections, and various cyberattack threats against financial institutions along with actual damage cases.

 

[Statistical Data Summary]

  • Malware distribution statistics targeting the financial sector

[Figure 1] Statistics on Malware Distribution Targeting the Financial Sector
  • Statistics on the industrial sectors of accounts in South Korea leaked via Telegram

[Figure 2] Statistics on the Industry Sectors of Accounts Leaked in South Korea via Telegram

 

[Summary of Key Deep and Dark Web Issues Related to the Financial Sector]

 

  • Case of Damage from the Sale of Access Credentials

Affected company: Chinese Financial Institutions

Access credentials for firewall and network administrator panels of Chinese financial institutions are being sold on the cybercrime forum BreachForums.

The threat actor (miyako) claims this access provides administrator privileges, enabling direct control over the internal network, including root-level remote code execution (RCE) and shell access on Linux-based firewall devices.

The threat actor (miyako) is known as an Initial Access Broker (IAB) dealing in initial penetration rights. They are promoting the ability to seize control of core infrastructure equipment for a relatively low price of $300, while also having a confirmed history of repeatedly selling access credentials to other companies’ firewalls.

Such leaks of administrator privileges on network perimeter devices can directly lead to full internal network takeover, financial data theft, additional ransomware deployment, and supply chain propagation attacks. This is assessed as a high-risk situation where exposure of a single account alone can escalate into an enterprise-wide breach.

 

[Figure 3] Posts on BreachForums related to the sale of access rights to victimized companies

 

  • Database Leak Case

Affected company: w***s.com

A post claiming a large-scale data breach against W***s, Inc., a California-based mortgage broker, appeared on the cybercrime forum DarkForums.

W***s is a company that processes mortgage applications across multiple states through its proprietary loan processing platform.

The threat actor (FulcrumSec) claims to have stolen over 19,000 mortgage application documents, including development/operational environments, internal source code, and loan integration configuration data. They stated that highly sensitive information such as Social Security Numbers (SSNs), driver’s licenses, tax returns, bank account details, and income/debt information was included. Evidence indicates that detailed information was publicly disclosed in the form of some samples. The threat actor also claimed possession of technical materials related to financial infrastructure, including MongoDB credentials, internal loan program configurations, and interest rate engine source code. The sample data link provided at the time of the announcement (Feb 18, 2026) is currently inaccessible.

Considering the threat actor’s (FulcrumSec) past activities and reputation, the claims carry a certain level of credibility. However, the actual scope of the leak and the integrity of the data require further verification. Given the nature of mortgage application data, the risk of secondary financial fraud and identity theft is high, necessitating continuous monitoring.
 

[Figure 4] Posts on DarkForums related to the sale of victim company data

 

 

 

  • Ransomware Infection Victim Cases

Ransomware groups such as CL0P, DragonForce, and Qilin have compromised numerous financial-related companies and publicly exposed victims on their dedicated leak sites (DLS). This report focuses solely on the top three most affected financial companies, selected based on corporate recognition and revenue scale, from among the many ransomware compromise cases this month.

 

Ransomware: Qilin

Affected company: t***e.com

The ransomware group Qilin has posted T***s as a victim.

However, approximately 12 hours after the posting, the leak page displayed a “Forbidden (#403) – Blog not active” error screen and was confirmed to be inaccessible.

This suggests the group may have temporarily deactivated the post, changed internal settings, or implemented access control measures. Additionally, some ransomware groups deactivate or delete posts after receiving ransom payments from victims. Therefore, the possibility that a ransom payment was made cannot be ruled out in this case. However, as there is currently no clear evidence to support this, this possibility should only be considered a hypothesis.
The actual release of data or plans for additional uploads also remain unclear. Therefore, continuous monitoring is necessary regarding the page’s reactivation status and potential secondary distribution.

 

[Figure 5] Victim companies posted on Qilin ransomware group DLS

 

 

MD5

02e33ac182acde8ce5c04fb2da933181
1f8715d769b879769fa4c65a2c9a9467
1ff8f539b8743cf828e9cdcfe279f5c9
315558591aa1bc116c75979c1eadae29
55f0b29b65d2c29bdaf88c0305a80fc1