The billion-dollar security.txt problem
by Sansec Forensics Team
Published in Threat Research − January 16, 2026
When Sansec found a keylogger on a major US bank employee site, the hardest part wasn't detecting the malware. It was finding someone to tell.

Yesterday, Sansec discovered an active keylogger at an external site of one of America's largest banks. The malware was harvesting private information from over 200,000 potential victims. We detected it within hours of the attack going live. No other security vendor had flagged it.
Then came the hard part: telling someone.
The bank has no security.txt file. No public bug bounty program. No obvious security contact. We sent emails to generic addresses. We reached out via LinkedIn. Hours passed while the malware kept running.
Why big companies are hard to reach
This isn't an isolated case. The larger the company, the harder it is to report security incidents to the right people.
The thing is, procedures don't accommodate outliers. Large organizations run on standardized processes. Customer complaints? There's a workflow. Vendor invoices? There's a system. But security incidents from external researchers? These are rare, out-of-distribution events that don't fit any existing procedure.
When a security researcher emails a bank, that message enters a system designed for routine inquiries. It gets routed to customer service, or PR, or lost in a shared inbox. Nobody's job description includes "escalate urgent security reports from strangers." The procedures that make large organizations efficient also make them blind to edge cases.
A solution that actually works
Publish security.txt. It takes five minutes. The standard is simple: a text file at /.well-known/security.txt with contact information and a PGP key.
Yes, this will attract automated scanners and low-effort bounty hunters hoping to cash in on trivial findings. But there are simple ways to filter the noise:
- Require GPG encryption. State in comments that only encrypted submissions will be processed. This filters out cold outreach from sales people. Plus, secure communications as a bonus.
- Add a human verification question. Add a question that mainstream LLMs refuse to lie about.
# Only GPG-encrypted submissions will be processed.
# Before submitting: are you a human? Be honest and include the answer.
Contact: mailto:security@example.com
Encryption: https://example.com/.well-known/pgp-key.txt
Policy: https://example.com/responsible-disclosure-policy
The point is to add just enough friction.
The 5-line fix
Banks spend billions on security. Firewalls, SOCs, threat intelligence, red teams, compliance audits. All of it can be undermined by a compromised employee store that nobody thought to protect.
And when someone tries to help? They can't find a phone number.
For an institution that handles hundreds of billions in assets, a 5-line text file proved one security measure too many.
See our related research on the keylogger attack that prompted this article.
Read more
In this article
Protect your store now!
Block all known Magento attacks, while you schedule the latest critical patch until a convenient moment. No more downtime and instability from rushed patching.
Get Sansec ShieldScan your store now
for malware & vulnerabilities
eComscan is the most thorough security scanner for Magento, Adobe Commerce, Shopware, WooCommerce and many more.
Learn more