over 25 million
A data breach at Conduent Business Services, LLC, a major provider of back-office services for government and corporate clients, is now being reported as potentially the largest in U.S. history. Reports from February 24, 2026, indicate the breach, which occurred between October 2024 and January 2025, affects over 25 million Americans. The Safepay ransomware group has claimed responsibility, alleging the theft of over 8 terabytes of data containing a trove of sensitive Personally Identifiable Information (PII) and Protected Health Information (PHI). Due to the immense scale, with 15.4 million affected in Texas alone, the Texas Attorney General has launched an investigation into the incident, which is being called a catastrophic failure of third-party risk management.
Conduent provides critical services like payment processing and healthcare claims management for numerous state government agencies. This position makes it a highly valuable target, as a single breach can expose the data of millions of citizens across multiple states. The Safepay ransomware group, which claimed the attack, followed a double-extortion model by exfiltrating the data before making its demands.
The stolen data is exceptionally sensitive and includes:
This is a supply chain attack with cascading consequences, where the compromise of a single contractor leads to a nationwide data security crisis.
While the specific intrusion vector has not been disclosed by Conduent, the attack pattern is characteristic of a large-scale data theft operation:
T1190 - Exploit Public-Facing Application) or a successful phishing campaign against a privileged employee (T1566 - Phishing).T1537 - Transfer Data to Cloud Account): The core of the attack was the exfiltration of a massive volume of data (8 TB). This would have required a sustained, high-bandwidth transfer over a prolonged period (October to January), suggesting the attackers maintained persistent access and were able to evade detection for months. The data was likely siphoned to attacker-controlled cloud storage.This is a data breach of historic proportions. The impact on the 25+ million affected individuals is catastrophic, exposing them to a lifetime risk of identity theft, sophisticated financial fraud, and medical identity theft. The sheer volume of data, combining PII and PHI, makes it a goldmine for cybercriminals. For Conduent, the consequences are severe: massive regulatory fines (e.g., under HIPAA), costly litigation, loss of government contracts, and irreparable reputational damage. For the various state governments that entrusted their citizens' data to Conduent, this is a major crisis of public trust and a failure of vendor oversight.
Detecting a slow, long-term data exfiltration of this magnitude is extremely challenging but not impossible.
D3-UDTA - User Data Transfer Analysis.Preventing such a catastrophic supply chain breach requires rigorous security fundamentals and vendor management.
D3-NI - Network Isolation.New figures confirm over 25 million victims nationwide, with specific impacts in Oregon (10.5M) and a precise attack dwell time from Oct 2024 to Jan 2025.
Implement DLP solutions to detect and block the unauthorized transfer of massive amounts of PII and PHI.
Segment networks to prevent attackers from moving from a less secure entry point to the crown jewel databases.
Implement comprehensive logging and auditing of network traffic and database access to detect anomalous activity.
This is a vendor management failure. Rigorous auditing of third-party suppliers like Conduent is required.
To detect a massive, slow-burn data exfiltration like the one at Conduent, User Data Transfer Analysis is the most critical detective control. Security teams must use tools like Netflow analyzers, DLP, or cloud access security brokers (CASBs) to baseline normal data transfer volumes and patterns for all systems. The exfiltration of 8 terabytes, even over four months, represents an average of over 65 gigabytes per day. This is a significant anomaly that should have triggered alerts. A UEBA platform could correlate this data transfer with the compromised account, flagging that a single user was responsible for an impossibly large amount of data egress. This is the primary method for catching large-scale data theft in progress.
A breach of this magnitude is often enabled by a flat, unsegmented network. Conduent should have implemented strict network isolation based on Zero Trust principles. The databases containing sensitive PHI and PII for millions of citizens should have been housed in a highly secured data enclave. Access to this enclave should be denied by default, with firewall rules only allowing connections from a small, specific set of application servers. Furthermore, those application servers should not have direct internet access. This containment strategy ensures that even if an attacker compromises a system on the corporate network, they cannot pivot to the sensitive data repositories, effectively containing the breach at the perimeter.
To gain access to and exfiltrate such a large dataset, the attackers would have needed highly privileged accounts. Continuous monitoring of domain accounts is essential. This includes alerting on any privilege escalation, such as an account being added to a Domain Admins group. It also involves using Database Activity Monitoring (DAM) tools to watch for anomalous queries. A DAM solution could have alerted on a single account performing SELECT * queries against entire patient or citizen tables, or an account that normally only performs reads suddenly attempting to export large datasets. This provides a crucial internal detection layer focused on the attacker's actions against the data itself.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats