Citizens Bank Hit With Two Federal Lawsuits After Everest Ransomware Attack

Share
Minimalist white line art of a marble bank building with a large white gavel leaning against the front pillars, on a solid hunter green background.

Following our initial report on the Everest ransomware group's claims, Citizens Financial Group now faces a dual-front battle as federal litigation arrives in Rhode Island.

PROVIDENCE, RI — The legal fallout from the Everest ransomware group’s alleged breach of Citizens Bank has accelerated with the filing of two separate federal class action lawsuits in the US District Court for the District of Rhode Island. The litigation, filed on April 23, 2026, follows a "data incident via a third-party vendor" that the bank confirmed earlier this week.

The plaintiffs, Betty Lackey and Pamela Caffrey, represent a potentially massive class of customers whose names, Social Security numbers (SSNs), dates of birth, and financial account details were allegedly exposed. While Everest claims to have exfiltrated 3.4 million records, Citizens maintains that the vast majority of the data involved was "masked test data" rather than live production records.


Breach Audit: Litigation Timeline

The speed of these filings — arriving just days after the initial threat actor claim — underscores a new reality in risk management: the litigation window has closed to near-zero.

Incident to Litigation Timeline (April 2026)
Date Event Details
April 20 Everest ransomware group lists Citizens Bank on its dark web leak site.
April 21 Citizens confirms an incident involving a third-party vendor environment.
April 23 Two federal class actions filed by Jules D’Allessandro and Peter Wasylyk.

Allegations of Negligence

The 34-page and 40-page complaints allege that Citizens failed to implement industry-standard security measures, specifically citing a lack of multi-factor authentication (MFA) and IP-based restrictions on the vendor’s database. Counsel for the plaintiffs argue that the bank breached its fiduciary duty by allowing sensitive PII to remain vulnerable in a non-production environment.

Citizens has pushed back, stating that "operations continue as normal" and that there is no evidence of a compromise within their core internal network. However, the legal focus remains on vendor vulnerability management, a pattern we have seen in other recent systemic fragility incidents.


The CyberSignal Analysis

Signal 01 — The "Masked Data" Defense

Citizens' primary defense rests on the claim that the stolen data was "masked." In data governance terms, if the masking was insufficient or reversible, the bank still faces full liability. The lawsuits will likely force a discovery process to determine if the "test data" was actually pseudonymized production data — a frequent oversight in financial DevOps cycles.

Signal 02 — The Escalation of Vendor Liability

This case highlights the growing trend of "vendor-leaping," where threat actors bypass a bank’s hardened perimeter by targeting softer third-party partners. For CISOs, this means cyber essentials must be enforced not just on partners, but specifically on the testing and staging environments those partners use.


Sources

Type Source
Legal Report GoLocalProv: Class Action Details
Threat Intel DeXpose: Everest Ransomware Claim
Industry News Morningstar: Legal Investigations
Original Cover The CyberSignal: Initial Coverage
Archive ClassAction.org: Case Context

Read more