Secure verifications for every industry
We provide templated identity verification workflows for common industries and can further design tailored workflows for your specific business.

March 2026 has not been kind to centralized identity storage. In the span of two weeks, more than five billion records were exposed across a half-dozen separate breach events. Different companies, different attack vectors, same underlying cause: all the data in one place.
This is a breakdown of what happened, why the pattern keeps repeating, and what actually changes it. If you manage KYC, AML, or data infrastructure at a fintech, the answer matters for your institution directly.
What happened this week:
Read through this week’s headlines and something becomes obvious: the breaches are not random. Every single one traces back to an organization that collected identity data and kept it in a single, reconstructable pool.
An identity verification provider that serves banks and fintechs left roughly 1 billion records in an unprotected database. Names, addresses, dates of birth, national IDs, phone numbers. 203 million of them tied to US residents. No encryption, no authentication — the database was publicly readable.
The uncomfortable part: IDMerit’s whole business was trust. They were the company other companies hired to verify identity. And they stored the output of that process in a single database that anyone with the URL could read. IDMerit disputes that their own systems were compromised, pointing to a partner environment — but the records were real, and they were exposed.
Aura sells identity theft protection. A phishing attack on one employee gave attackers access to 900,000 records — mostly names and email addresses from a marketing tool tied to a company Aura acquired in 2021, along with fewer than 20,000 active customers.
The lesson is not that Aura had unusually bad security. It is about what happens when a single successful attack translates directly into mass data access. The architecture created that outcome, not just the attacker. When all the data is in one place, one compromised account is enough.
What connects all of them: In each case, complete PII existed in one recoverable location. Ransomware, credential compromise, misconfigured database, phishing — the attack method varies. The enabler does not. Decentralized identity storage changes the math: if reconstructing any record requires fragments held across independent nodes, there is no single database worth attacking.
A breach used to be expensive in remediation costs and PR damage. In 2026, it also comes with a separate bill from regulators — and that bill is getting larger.
Cumulative GDPR penalties have now crossed €6.2 billion. Daily breach notifications across the EU broke 400 per day for the first time. Recent fines worth noting: TikTok (€530M for data transfers to China), Free Mobile (€42M following a breach), Intesa Sanpaolo (€17.6M).
Companies storing PII centrally face two separate cost events from a single breach: the incident itself, then the regulatory action. Both are measured in tens of millions for anything at scale. The consequences of weak KYC and data controls extend well beyond the initial headline.
The $450,000 FINRA penalty on Stash Capital is not notable for its size. What matters is the framing. FINRA cited both AML program weaknesses and identity-theft control failures in the same action. Regulators are treating these as a connected system, not separate boxes to check. For fintechs still managing KYC and AML as siloed budget lines, that framing should prompt a conversation.
A federal judge struck down FinCEN’s AML reporting rule for non-financed residential real estate transactions. Industry groups are calling it a win. The more useful read: compliance requirements can change faster than your infrastructure can adapt. Static compliance setups get caught flat-footed when rules shift. Adaptive ones do not.
Public hearings on draft Customer Due Diligence standards were scheduled for March 24. Full Regulatory Technical Standards are due July 10, 2026. The AMLA Single Rulebook, replacing 27 separate national AML frameworks, takes effect in 2027. Fintechs serving EU customers that have not started now will be scrambling in 18 months. The difference between standard CDD and Enhanced Due Diligence is becoming harder to ignore as the Single Rulebook approaches.
Data breaches are bad enough when attackers steal real identity records. The 2026 threat surface adds a second layer: attackers manufacturing fake ones.
SpyCloud’s 2026 Identity Exposure Report focuses on something most KYC teams are not thinking about: stolen machine credentials. API keys, session tokens, browser cookies. The attack surface is no longer limited to user PII. The technical identities flowing between KYC providers, compliance APIs, and partner platforms are themselves targets — and most organizations have zero visibility into their exposure there.
AI-generated synthetic identities and deepfake impersonations are now accessible at the cost of a subscription. Traditional document verification cannot reliably catch them. The “verification gap” — the window between onboarding and fraud detection — accounts for an estimated 70% of losses. Liveness checks and continuous monitoring are table stakes now, not premium features. This is directly relevant to how deepfakes are beating standard KYC flows.
More attackers are logging in than breaking in. They buy working credentials on underground markets and authenticate as the user. No exploit needed. Against this, strong identity verification at onboarding is the most cost-effective defense in the stack. A stolen password is much less useful when the account behind it requires liveness-verified, document-matched identity.
Romania hosted EU-wide EUDI Wallet interoperability tests on March 17–18. Multiple member states and wallet providers participated in cross-border credential exchange in a live environment. The technical infrastructure is working. Every EU member state must deploy a compliant wallet by December 31, 2026.
The EUDI Wallet’s core design principles — user-controlled data, selective disclosure, and no central repository — are the same principles that decentralized identity architecture has been built on. The EU is now making them law. Fintechs that built on those principles early are compliant by default. Those built on centralized collections will need to rebuild their data flows.
Digital rights groups have raised concerns that the draft implementing rules could, in practice, weaken privacy protections. Worth watching. But the direction of travel is clear: the EU wants identity to stay with users, not accumulate in provider databases. If your KYC vendor’s model depends on the latter, that tension is only going to grow. Understanding how decentralized KYC works in practice is no longer optional reading.
The pattern across this week’s events is clear. The question is whether it changes anything at your institution. Here is where to start.
We provide templated identity verification workflows for common industries and can further design tailored workflows for your specific business.