Customers sue Chime over alleged Iran-linked hack

Chime Financial Debuts Initial Public Offering At Nasdaq MarketSite
Chris Britt, co-founder and chief executive officer of Chime Financial, during the company's initial public offering in June 2025
Victor J. Blue/Bloomberg
  • Key insight: Chime told customers during the April 1 outage that their money and personal information were secure — directly contradicting the breach allegations now in court.
  • What's at stake: If a court finds the company suffered a breach, Chime could face exposure under state breach-notification laws and the SEC's 2023 cybersecurity-disclosure rule.
  • Supporting data: Multiple cybersecurity firms track Team 313 under different names — Void Manticore at Check Point, Storm-0842 at Microsoft, BANISHED KITTEN at CrowdStrike.

Overview bullets generated by AI with editorial review.

Processing Content

On April 1, when Chime Financial's mobile app went down for hours, the company told customers on its status page that "the money in your account and your personal information are secure."

Three proposed class actions filed in the following month say otherwise.

The lawsuits, all in the U.S. District Court for the Northern District of California, allege that pro-Iranian hacker group Team 313 breached Chime's systems on April 1 and stole Social Security numbers, dates of birth, government-issued IDs and other personal information from customers.

Chime said on its website during the incident that the threat actor did not steal any data.

Law firm Strauss Borrelli filed the first complaint two days after the outage. Two more firms followed within two weeks.

None of the three has produced evidence of a breach beyond what is already public knowledge. Chime's public statements indicate that Team 313 did not steal any customer data, but all three allege that there was a data compromise.

All three suits target the alleged breach. The complaints describe the outage as a consequence of it.

Two Chime customers, Cindy Castaneda and Lauren Goodloe, filed their lawsuit together. The two said they couldn't see their account balances during the outage, and Goodloe said she worried about a late rent payment.

Another customer suing Chime, Michael Walsh, said he received a bank alert about an attempted unauthorized credit card charge and a notice that his information had appeared on the dark web.

The fourth customer, Melissa Porter, described no specific injury beyond fear, anxiety and the time she spent monitoring her accounts.

Each complaint draws on the same public information: reporting from Newsweek and Bloomberg, a post from Team 313 and a March 2026 threat advisory from cybersecurity firm Hawkeye.

Chime has not filed a notice of a material cybersecurity incident with the SEC, as of May 4. Under a cybersecurity-disclosure rule the SEC adopted in 2023, public companies must file a current report within four business days of determining that a cybersecurity incident is material.

The fact that Chime has not filed a disclosure means either it has not determined whether the incident was material or it's decided it was not.

State breach-notification laws, including in California, require companies to notify affected individuals after they have reason to believe someone has taken unencrypted personal information without authorization. The Walsh complaint alleges that, as of its April 17 filing, Chime had not provided breach notice to customers.

Inside the April 1 outage

The outage began shortly before 1 p.m. Eastern time on April 1. The DownDetector page tracking Chime user reports spiked to 6,647 problem reports against a baseline of four, according to a screenshot reproduced in the Castaneda complaint. Customers couldn't log in, view balances or send money during the disruption.

Team 313, which calls itself "The Islamic Cyber Resistance in Iraq," posted on its leak site that it "launched a massive cyberattack targeting the servers of Chime," crashing internal servers and disabling the application and website. The post said the attack lasted an hour.

On its status page during the outage, Chime told customers that their account funds and personal information were secure, according to one of the complaints.

The Hawkeye threat advisory that the lawsuits cite describes Team 313 as a pro-Palestinian hacktivist group that multiple cybersecurity firms have linked to Iran's Ministry of Intelligence and Security.

Hawkeye published the advisory before the April 1 outage. The advisory does not mention Chime.

Multiple firms track the same group under different names. Check Point Research calls it Void Manticore. Microsoft tracks it as Storm-0842. CrowdStrike names it BANISHED KITTEN. IBM X-Force calls it the 313 Team Hacking Team.

Hawkeye describes the group's strategy as one built for influence operations rather than traditional cybercrime or espionage; Team 313 pairs technical disruption with timed public claims and amplification.

Its primary attack method is distributed denial-of-service, in which attackers flood a target with traffic to take it offline, not data theft.

The Hawkeye advisory that all three complaints cite says Team 313 is "known to exaggerate or fabricate breach claims."


For reprint and licensing requests for this article, click here.
Litigation CHIME Cyber security Fintech Data breaches Technology
MORE FROM AMERICAN BANKER
Load More