Lloyds App Glitch Exposed 450K Customers' Transactions to Other Users
API defect in Lloyds, Halifax, and Bank of Scotland apps let users view strangers' transactions including account numbers and NI numbers. Bank paying compensation.
Nearly 450,000 Lloyds Banking Group customers had their transaction data exposed to other app users after a software update broke account isolation. The incident, which occurred on March 12, 2026, saw detailed payment information—including account numbers, sort codes, and in some cases National Insurance numbers—visible to the wrong people.
Lloyds disclosed the scope to Parliament's Treasury Committee on March 27, 2026, revealing that the five-hour window affected customers across its Lloyds, Halifax, and Bank of Scotland mobile apps.
What Happened
A software update deployed overnight on March 11-12 introduced an API defect that broke account isolation. When two users accessed transaction lists simultaneously, the system could return the wrong customer's data. The vulnerability existed between 03:28 and 08:08 GMT on March 12.
During that window, 1.67 million of the bank's 21.5 million mobile app users logged in. Of those, up to 447,936 were exposed to potential viewing of their transaction data by others. Roughly 114,182 users actually clicked into transactions that allowed them to see sensitive information belonging to someone else.
The exposed data included:
- Transaction amounts and dates
- Payee information and payment references
- Sort codes and account numbers
- Text fields that sometimes contained National Insurance numbers or vehicle registration details
No unauthorized transactions occurred, and Lloyds says the risk of financial fraud from the exposure is low. But the incident underscores how a seemingly minor software regression can cascade into a significant data protection failure.
The Compensation Response
Lloyds has distributed £139,000 in goodwill payments to approximately 3,625 customers for distress and inconvenience. The bank told regulators it would consider additional claims if financial harm emerges later.
The compensation amounts are modest, but the bank notified the Information Commissioner's Office within the required 72-hour window. Whether the ICO pursues further action remains to be seen—under UK GDPR, the regulator can levy fines up to £17.5 million or 4% of global turnover for serious data protection failures.
Why This Matters
Banking apps have become the primary way millions of people interact with their finances. When API flaws expose customer data, the trust damage extends beyond the immediate incident. Users who saw someone else's transactions now know the system can fail. Users whose data was exposed may never know who saw it.
This wasn't a sophisticated attack exploiting a zero-day vulnerability—it was a broken software update that apparently wasn't caught in testing. The fix took under five hours once identified, suggesting the root cause wasn't complex. The question is why testing didn't catch a regression that affected core account isolation.
For financial institutions, the incident is a reminder that security isn't just about defending against external threats. Internal software quality directly affects data protection outcomes. Account isolation is a foundational security control, and any code path that touches it should have rigorous automated testing.
What Affected Customers Should Do
If you used Lloyds, Halifax, or Bank of Scotland mobile apps between 03:28 and 08:08 GMT on March 12, 2026:
- Review your transactions — Check for any unauthorized activity, though Lloyds says none has been identified
- Monitor your accounts — Watch for unusual communications claiming to know transaction details that could indicate social engineering attempts
- Consider a compensation claim — If you experienced distress or have evidence of harm, contact Lloyds directly
- Be wary of phishing — Attackers often exploit publicized breaches with targeted phishing campaigns impersonating affected organizations
The incident adds to a pattern of UK banking technical failures drawing regulatory scrutiny. Organizations handling financial data should assume that any exposure—regardless of whether it results in immediate fraud—carries reputational and regulatory consequences.
Related Articles
Mercor Breach Exposes 4TB of AI Training Data After LiteLLM Attack
AI startup Mercor confirms breach via LiteLLM supply chain attack. Lapsus$ claims 4TB stolen including candidate data, source code, and API keys. Meta pauses contracts.
Apr 10, 2026ShinyHunters Breach Anodot, Steal Data From Snowflake Customers
ShinyHunters compromised SaaS analytics provider Anodot, using stolen authentication tokens to access and exfiltrate data from dozens of Snowflake customers.
Apr 10, 2026LAPD Records Exposed in City Attorney Breach: 337K Files Leaked
World Leaks gang dumps 7TB of sensitive police data including personnel files and Internal Affairs investigations after breaching LA City Attorney's Office.
Apr 9, 2026Bitcoin Depot Discloses $3.6M Bitcoin Theft in SEC Filing
Attackers stole 50.9 BTC from company wallets after obtaining settlement account credentials. Second security incident for the crypto ATM operator since 2023.
Apr 9, 2026