Key Facts: Figure Data Breach
- Date reported: February 14, 2026.
- Unauthorized access identified: February 2026.
- Target entity: Figure (figure.com).
- Source of breach: ShinyHunters (unauthorized third-party).
- Data types: Full names, home addresses, dates of birth, and phone numbers.
- Status: Confirmed; publicly reported following a declined ransom demand.
- Severity: Medium; the breach involved approximately 2.5 gigabytes of sensitive customer files and social engineering.
Protect against attacks like ShinyHunters. See how UpGuard helps.
What Happened in the Figure Data Breach?
Figure (figure.com) was the target of a data leak incident publicly reported on February 14, 2026. The security breach involved the threat actor known as ShinyHunters, who claimed responsibility for the unauthorized access after the organization reportedly declined a ransom demand.
The incident was the result of a social-engineering attack that allowed the hackers to access approximately 2.5 gigabytes of data. This breach is classified as medium severity and involved the exposure of sensitive customer files including full names, home addresses, dates of birth, and phone numbers. Such incidents typically present a risk of identity fraud and targeted phishing campaigns for the affected individuals.
Who Is Behind the Incident?
ShinyHunters is a prolific cybercriminal group known for targeting high-profile organizations to steal and leak sensitive data. Active for several years, the group often utilizes social engineering and exploits in cloud environments to gain unauthorized access. They are frequently associated with extortion attempts, where they threaten to sell or publicly release stolen data on dark web forums if a ransom is not paid. ShinyHunters has claimed responsibility for numerous large-scale breaches across various sectors, demonstrating a consistent focus on acquiring large volumes of consumer information.
Impact and Risks for Figure Customers
For customers of Figure, the exposure of personal details such as names, addresses, dates of birth, and phone numbers creates several potential risks. This information can be leveraged by malicious actors for identity theft, unauthorized account access, or sophisticated phishing schemes. Hackers may use the leaked details to craft convincing messages designed to trick individuals into revealing further sensitive data or financial credentials.
Security incidents of this nature often result in long-term risks for the affected user base. Individuals should consider enabling multi-factor authentication and monitoring their credit reports for any unusual activity. Maintaining transparency and providing support services are critical steps for the organization to help mitigate these potential outcomes.
How to Protect Against Similar Security Incidents
Get instant alerts when your data appears on the dark web
Frequently Asked Questions
What happened in the Figure security breach?
ShinyHunters claimed responsibility for a security attack on Figure (figure.com) in February 2026. The incident was first reported on February 14, 2026.
When did the Figure breach occur?
The Figure breach was publicly reported on February 14, 2026. ShinyHunters referenced the incident around that time, but the attack may have occurred earlier.
What data was exposed?
The types of data involved in the Figure incident have not been disclosed. ShinyHunters has not provided evidence of specific data categories.
Is my personal information at risk?
If you interacted with Figure, there's a possibility your personal information could be affected. Similar incidents often involve email addresses, login details, or financial records. Stay alert for updates and take precautionary measures to secure your accounts.
How can I protect myself after this data breach?
- Change your passwords and ensure they are unique
- Enable multi-factor authentication (MFA) on all accounts
- Monitor your financial statements for unauthorized transactions
- Be cautious of unsolicited emails or phone calls
- Utilize data breach monitoring services
What steps should companies take after being impacted by this breach?
Figure is expected to secure its systems, notify affected parties, and provide guidance on protective actions. Companies in this situation typically review security measures and deploy attack surface management to prevent future incidents.





.jpg)
