Skip to main content

Archived Article — The Daily Perspective is no longer active. This article was published on 28 March 2026 and is preserved as part of the archive. Read the farewell | Browse archive

Technology

UK Banking App Glitch Highlights Software Testing Failures in Digital Banking

Nearly half a million Lloyds customers briefly saw others' transactions; regulators seek accountability from banks shifting online

UK Banking App Glitch Highlights Software Testing Failures in Digital Banking
Image: The Register
Key Points 3 min read
  • Lloyds app glitch on March 12 exposed transaction details to 447,000 customers; a smaller subset accessed sensitive data including National Insurance numbers
  • Defect slipped through design, testing and quality assurance phases, suggesting systemic gaps in software governance
  • Bank paid £139,000 to 3,625 customers but acknowledged the need for urgent review of how defects reach production

A botched overnight software update at Lloyds Banking Group left up to 447,000 customers briefly seeing other people's transactions in its mobile apps, with the bank now acknowledging the scale of the incident and compensating affected users. The March 12 glitch reveals a troubling pattern in modern banking: the rush to shift customers online has outpaced the rigour needed to keep their data safe.

The incident unfolded between 03:28 and 08:08 GMT. An IT change pushed overnight between March 11 and 12 introduced a software defect in the API handling transaction data; between 03:28 and 08:08 that morning, customers logging into the apps could end up seeing fragments of other people's account activity if they accessed their transaction lists at almost exactly the same moment as another user. While no one could move money or access accounts, users were able to see transaction amounts, dates, and payment references which can include personal identifiers; those who drilled into individual payments could potentially view sort codes, account numbers, and any text entered alongside a transaction, including National Insurance numbers or vehicle registration details.

The scale raised immediate concerns about how such a defect cleared multiple testing phases. As many as 447,936 customers may have been exposed to other people's transaction lists, while up to 114,182 could have seen more detailed payment information. The crossover worked both ways: some customers saw other people's transactions, while others had their own details briefly shown to strangers. Treasury Committee chair Dame Meg Hillier called the incident an "alarming breach of confidentiality," signalling that regulators view this as a governance failure, not merely a technical blip.

Lloyds responded with partial transparency. The bank has paid out just over £139,000 to around 3,625 customers as goodwill for distress and inconvenience, rather than compensation for losses. Singh says the exposure was brief and unlikely to lead to fraud, with no financial losses so far. The bank notified regulators on the morning of the incident and followed up with a formal notification to the ICO within the required 72-hour window.

Yet the bank's own admission about process failures is revealing. The root cause lay in how the updated API handled simultaneous requests, breaking data isolation between accounts. This fault should have been caught during any reasonable quality assurance process. That it wasn't points to either inadequate testing protocols or pressure to deploy updates faster than safety warrants.

The broader issue extends beyond one bank. The incident highlights the vulnerability of Britain's digital banking infrastructure, such as apps and websites, as lenders slash physical branch networks to cut costs and shift customers online. Banking depends on a single, foundational promise: your account is yours alone. When that breaks, trust fractures. Affected customers described panic and alarm when they realised they were seeing money belonging to strangers.

This is not merely a British problem. Australian banks face similar pressures to migrate customers to digital platforms while maintaining legacy systems. Financial services licensees have obligations to do all things necessary to ensure that the services covered by their license are provided efficiently, honestly and fairly and to have adequate risk management systems, which has been interpreted as requiring licensees to take steps relating to cybersecurity and cyber resilience. The Lloyds incident illustrates what happens when those obligations slip.

The Treasury Committee has demanded further updates from Lloyds within one month and again after six months. That timeline matters. Banks cannot be permitted to treat systemic testing failures as minor incidents requiring only token compensation. If digital banking is the new standard, the standards for deploying digital banking must be absolute. Software defects are inevitable, but defects that reach production because of failed governance are preventable.

The question facing regulators in the UK and Australia alike is whether the cost pressures driving banks to consolidate branches and digital services have also driven them to shortcuts in the most fundamental obligation: keeping customer data segregated and secure.

Sources (5)
Helen Cartwright
Helen Cartwright

Helen Cartwright is an AI editorial persona created by The Daily Perspective. Translating complex medical research for general readers with clinical precision and an evidence-first approach. As an AI persona, articles are generated using artificial intelligence with editorial quality controls.