TradeZero Affected by Data Breach at its Vendor Tawk.To

Will Gendron
Editor in Chief
Published
September 19, 2024
Updated
December 6, 2024
TradeZero Affected by Data Breach at its Vendor Tawk.To
TradeZero
Types of INFORMATION affected
  • Names
    Names
  • Social security numbers
    Social Security Numbers
  • Dates of birth
    Dates of Birth
  • Addresses
    Addresses
  • Government IDs
    Government IDs
  • Medical Information
    Medical Info
  • Financial Info
    Financial Info

TradeZero America Inc., a New York-based online broker-dealer, recently experienced a significant data breach that has potentially affected many of its customers.

The breach occurred on July 29, 2024, and involved unauthorized access to sensitive personal information stored on a third-party vendor's platform, Tawk.To. This breach was disclosed to the California Attorney General's office, highlighting its severity.

The breach impacted 14,542 people across the country, including 1,459 individuals in Texas alone. The exposed information includes highly sensitive data such as:

  • Name
  • Social Security Number
  • Driver’s License Number
  • Government-issued ID Number (e.g., passport, state ID card)
  • Financial Information (e.g., account number, credit or debit card number)
  • Financial brokerage and/or bank account information
  • Passport Number

The breach was discovered after TradeZero noticed suspicious activity on Tawk.To's platform. Although there is no evidence of identity theft or fraud resulting from this incident, the potential exposure of such sensitive information raises concerns about the security of personal data.

TradeZero's Response

In response to the breach, TradeZero America Inc. has taken several steps to address the situation and protect its customers. The company launched an investigation to understand the nature and scope of the incident. They have also reviewed their systems to ensure their security and are notifying affected individuals.

TradeZero is offering twelve months of complimentary credit monitoring services through Cyberscout, a TransUnion company, to those impacted. This service includes alerts for changes to credit files and proactive fraud assistance.

Protecting Yourself After the Data Breach

If you believe you may have been affected by this data breach, it is crucial to remain vigilant. Here are some steps you can take:

  1. Enroll in Credit Monitoring: Take advantage of the complimentary credit monitoring services offered by TradeZero. This will help you detect any suspicious activity on your credit report.
  2. Monitor Your Accounts: Regularly review your bank and financial account statements for any unauthorized transactions.
  3. Change Your Passwords: Update your TradeZero account password and enable two-factor authentication for added security.
  4. Place a Fraud Alert or Credit Freeze: Consider placing a fraud alert or credit freeze on your credit file to prevent unauthorized access.
  5. Check Your Credit Reports: Obtain free credit reports from the three major credit bureaus to ensure there is no unusual activity.
  6. Stay Informed: Keep an eye on any communications from TradeZero regarding the breach and follow any additional recommendations they provide.

For more detailed information about the data breach, you can visit the California Attorney General's website, the Texas Attorney General's website, or the Massachusetts Attorney General's website.

Notice Letter

This browser does not support inline PDFs. Please download the PDF to view it: Download PDF

Affected Entity
TradeZero
Consumers Notification date
September 19, 2024,
Date of Breach
July 29, 2024
Breach Discovered Date
August 29, 2024
Total People Affected
14542
Information Types Exposed
  • SSN
  • Financial Account
  • Drivers Licenses
  • Name of individual
  • Social Security Number Information
  • Driver’s License number
  • Government-issued ID number (e.g. passport, state ID card)
  • Financial Information (e

Join the

TradeZero

data breach lawsuit. It's free to join. 

Join the Lawsuit
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image