UniCredit S.p.A. – €800,000 Fine (Italy, 2024)
General GDPR enforcement action
This case relates to broader data protection obligations, not specifically to cookie or consent banner compliance. It is not included in cookie statistics or the Risk Calculator.
UniCredit S.p.A. was fined EUR 800,000 for a data breach that exposed personal information of over 777,000 customers. This incident is significant because it shows the risks associated with weak security measures and the importance of protecting customer data.
What happened
A cyberattack on UniCredit's mobile banking portal exposed personal data of 777,765 customers.
Who was affected
Current and former customers of UniCredit whose personal data was accessed by cyber attackers were affected.
What the authority found
The Italian DPA ruled that UniCredit failed to implement adequate security measures to protect customer data, violating GDPR requirements.
Why this matters
This ruling emphasizes that companies must prioritize data security to protect customer information. Businesses should regularly assess their security practices to prevent breaches.
GDPR Articles Cited
View original scraped data
Original data from scraper before AI verification against source document.
Entities Involved
On 22 October 2018, UniCredit S.p.A. ("controller") notified the Italian DPA of a personal data breach that occurred in the period between 11 October to 21 October 2018. The breach occurred due to a cyberattack on the controller’s mobile banking portal for customers. Third parties tried to access customer accounts by attempting automatically-generated simple PINs. The mobile banking portal had two vulnerabilities that facilitated the breach. First, the portal made customers’ personal data (first name, surname, tax code, and internal bank identification code) available in HTML responses to authentication attempts, including where attempts were unsuccessful. Second, the controller did not limit the use of simple PINs, making accounts vulnerable to cyberattacks aimed at identifying customer login information (brute force attacks). Due to the HTML response vulnerability, every login attempt gave cyber attackers access to the names, tax codes, and internal bank identification codes of 777,765 present and former customers. In the case of 6,959 of those customers, the cyber attackers also successfully identified the portal PINs. The controller subsequently blocked the identified PINs. The breach did not include the data subjects’ banking data. The controller did not consider the breach high-risk pursuant to Article 34 GDPR. It posted a general notice on its website and gave direct notice only to the 6,959 data subjects whose passwords were identified. The DPA disagreed, finding the breach likely to present a high risk to data subject rights after a preliminary investigation. In a defense brief, the controller argued that the breach occurred as a result of NTT Data Italia S.p.A.’s negligence ("processor"). The processor was charged with carrying out vulnerability tests on the controller’s mobile webpage and application together with Truel IT S.r.l. ("sub-processor"). The sub-processor was engaged without prior written authorization from the controller and was the one that
Related Enforcement Actions (1)
Other enforcement actions involving UniCredit S.p.A. in IT
Details
Fine Date
8 February 2024
Authority
Garante per la protezione dei dati personali
Fine Amount
€800,000
About this data
Cite as: Cookie Fines. UniCredit S.p.A. - Italy (2024). Retrieved from cookiefines.eu
Last updated: