Update: Wealthsimple detected a security breach on August 30, 2025, which it contained within hours. The company confirmed on September 6 that the incident stemmed from a compromised third-party software package, not from a direct attack on its own systems. The breach exposed sensitive personal information of fewer than 30,000 clients, including names, contact details, government-issued IDs, account numbers, IP addresses, dates of birth, and Social Insurance Numbers (SINs). Wealthsimple has stated that no client passwords were compromised, and no funds were accessed or stolen.
The company has notified all affected clients directly and is offering two years of free credit monitoring, dark web surveillance, and identity theft protection services. In a statement, the company said,
"All accounts remain secure, and no funds were accessed or stolen. We acted quickly and in a few hours the issue was contained."
Wealthsimple has also informed relevant government regulators and implemented enhanced data security measures.
Why it Matters: This incident highlights the significant and growing risk posed by third-party vendors in the supply chain. Even with robust internal security, organizations remain vulnerable to breaches originating from their partners. For the 30,000 affected Wealthsimple clients, the exposure of their Social Insurance Numbers and other personal data creates a serious risk of identity theft and fraud.
This breach serves as a critical reminder for all financial institutions to rigorously vet and monitor the security practices of their third-party vendors. The incident also underscores the importance of a rapid and transparent response to maintain customer trust in the face of a breach.