Conduent Data Breach Impact Explodes to 25 Million Americans, Safepay Ransomware Blamed

Conduent Breach Victim Count Surges to Over 25 Million, Affecting Nationwide Government Services

CRITICAL
February 26, 2026
March 1, 2026
6m read
Data BreachRansomwareRegulatory

Impact Scope

People Affected

Over 25 million

Affected Companies

Conduent Business ServicesBlue Cross Blue Shield of TexasBlue Cross Blue Shield of IllinoisBlue Cross Blue Shield of MontanaBlue Cross Blue Shield of New MexicoHumanaPremera Blue Cross

Industries Affected

GovernmentHealthcareTechnologyOther

Geographic Impact

United States (national)

Related Entities(initial)

Threat Actors

Safepay

Organizations

Texas Attorney General

Other

Conduent Business Services Blue Cross Blue Shield of TexasBlue Cross Blue Shield of IllinoisBlue Cross Blue Shield of MontanaBlue Cross Blue Shield of New MexicoHumanaPremera Blue Cross

Full Report(when first published)

Executive Summary

The data breach at Conduent Business Services, a major technology contractor for U.S. government agencies, has escalated into one of the largest public sector breaches on record. New information released by state regulators in February 2026 confirms that the incident has impacted over 25 million people nationwide. The breach, which took place between October 2024 and January 2025, resulted in the theft of a massive trove of sensitive data, including Social Security numbers, addresses, and medical and health insurance information. The Safepay ransomware group has claimed responsibility, boasting of stealing 8 terabytes of data. The fallout has affected millions of residents in states like Texas and Oregon and has triggered an investigation by the Texas Attorney General into Conduent and its client, Blue Cross Blue Shield of Texas.


Threat Overview

The incident was a large-scale data theft and extortion campaign, allegedly carried out by the Safepay ransomware group. The attackers maintained access to Conduent's network for nearly three months, from October 21, 2024, to January 13, 2025, allowing for a prolonged and extensive data exfiltration operation. Conduent provides critical back-office services for government programs, and the compromised data relates to functions like Medicaid claims, child support payments, and unemployment insurance. The attackers listed Conduent on their dark web leak site, a common tactic used to pressure victims into paying a ransom to prevent the public release of stolen data.


Technical Analysis

This was a ransomware and data exfiltration attack. While the initial access vector has not been disclosed, the long dwell time suggests the attackers were ableto operate undetected for a significant period. Key TTPs include:

  • T1567 - Exfiltration Over Web Service: The exfiltration of 8 terabytes of data is a massive undertaking and would require sustained, high-bandwidth C2 channels to transfer the data out of the network.
  • T1078 - Valid Accounts: Long-term persistence is often achieved by compromising and using legitimate credentials, allowing attackers to blend in with normal network traffic.
  • T1486 - Data Encrypted for Impact: Although the primary focus has been on data theft, the involvement of a group named 'Safepay ransomware' implies that data encryption was also likely part of the attack to disrupt operations and increase pressure.

Impact Assessment

The impact of this breach is catastrophic due to the scale and sensitivity of the data involved.

  • Impact on Individuals: 25 million people are now at extreme risk of identity theft, financial fraud, and highly targeted social engineering attacks. The compromised data includes a full set of PII and PHI, making it highly valuable on the dark web.
  • Impact on Government Services: The breach undermines public trust in government-administered benefit programs and the contractors that support them.
  • Impact on Conduent and its Clients: Conduent faces immense legal, regulatory, and financial repercussions. The Texas Attorney General's investigation is likely the first of many. Clients like Blue Cross Blue Shield are also facing scrutiny and potential liability. The cost of remediation, notifications, and credit monitoring for 25 million people will be astronomical.

Affected Populations:

  • Texas: 15.4 to 15.5 million residents affected.
  • Oregon: 10.5 million victims.
  • Other affected states include Wisconsin, Massachusetts, New Hampshire, and Washington.

IOCs

No specific technical Indicators of Compromise have been publicly released.


Detection & Response

  • Data Loss Prevention (DLP): Detecting an 8 TB exfiltration requires robust DLP solutions that monitor and can alert on or block large outbound data transfers, especially from databases containing PII/PHI.
  • Long-Term Log Retention: A long attacker dwell time highlights the need for extended log retention. Investigating an incident that began months prior is impossible without historical log data from endpoints, servers, and network devices.
  • Threat Hunting: Proactive threat hunting is necessary to find attackers who are operating stealthily within a network. This includes hunting for suspicious credential usage, unusual internal network connections, and signs of data staging.

Mitigation

  • Data Minimization and Encryption: Store only the minimum amount of sensitive data necessary for operations. All sensitive data, both at rest and in transit, must be encrypted. This is a key principle of D3FEND's File Encryption (D3-FE).
  • Network Egress Filtering: Implement strict egress filtering rules to block outbound traffic to unauthorized destinations. While sophisticated attackers can bypass this, it raises the bar and can disrupt less advanced exfiltration methods.
  • Security Monitoring and SIEM: Implement 24/7 security monitoring with a properly configured SIEM to correlate events from across the enterprise and detect the subtle signs of a long-term intrusion.
  • Vendor Risk Management: Government agencies and other organizations must conduct rigorous security assessments of their contractors, like Conduent, to ensure they have adequate controls to protect sensitive public data.

Timeline of Events

1
October 21, 2024
The period of unauthorized access to Conduent's network begins.
2
January 13, 2025
Conduent discovers the cyber incident, ending the nearly three-month breach period.
3
January 15, 2025
The Safepay ransomware group claims responsibility for the attack on its dark web leak site.
4
February 25, 2026
Wisconsin regulators make public that the breach has affected over 25 million individuals nationwide.
5
February 26, 2026
This article was published

Article Updates

March 1, 2026

Update reveals additional affected clients like Humana and Volvo, alongside detailed MITRE ATT&CK techniques and cyber observables for detection.

MITRE ATT&CK Mitigations

Implementing strict egress filtering and monitoring can help detect and block large-scale data exfiltration attempts.

Mapped D3FEND Techniques:

Encrypting sensitive data at rest makes it unusable to an attacker even if they successfully exfiltrate it.

Mapped D3FEND Techniques:

Audit

M1047enterprise

Continuous auditing of data access logs can help identify anomalous behavior indicative of a breach in progress.

Mapped D3FEND Techniques:

Segmenting the network can prevent an attacker from moving from a less secure part of the network to the databases containing sensitive PII/PHI.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

To detect a massive data theft like the 8 TB exfiltration from Conduent, organizations must employ User Data Transfer Analysis, typically through a Data Loss Prevention (DLP) or UEBA platform. Security teams should configure policies to monitor and alert on high-volume data transfers originating from sensitive data repositories. A baseline of normal data flow should be established, and any transfer that exceeds this baseline by a significant margin (e.g., gigabytes or terabytes of data being moved to an external destination) should trigger an immediate, high-priority alert. This allows security operations to investigate and potentially block the exfiltration in real-time, which is crucial for mitigating the impact of a data breach.

While preventing exfiltration is ideal, organizations handling vast amounts of PII/PHI must plan for a scenario where data is stolen. Encrypting sensitive data at rest is a critical last line of defense. By encrypting the databases and file stores containing the 25 million individuals' records, the data remains unintelligible and useless to the Safepay group even after being exfiltrated. This requires implementing robust encryption with strong key management practices, ensuring that the encryption keys are stored separately and securely, away from the data they protect. This countermeasure renders the stolen data worthless, neutralizing the threat of public leaks and extortion.

A three-month dwell time indicates a failure to detect persistent threat actor activity. Session Duration Analysis can help detect this. Security teams should monitor the duration of user and system account sessions, particularly for privileged accounts. An attacker maintaining persistence will often have sessions that are unusually long or occur at abnormal hours. By baselining normal session lengths and times for different user roles, a UEBA or SIEM can flag a remote access session that has been active for weeks or months as a high-risk anomaly, prompting an investigation that could uncover the long-term compromise.

Sources & References(when first published)

Wisconsin Reveals Conduent Breach Affected 25 Million Americans
PYMNTS.com (pymnts.com) February 25, 2026
Conduent data breach hits at least 25M individuals
Becker's Hospital Review (beckershospitalreview.com) February 26, 2026
Conduent Says Hack Now Affects at Least 25 Million Patients
HealthcareInfoSecurity (healthcareinfosecurity.com) February 25, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

ConduentData BreachSafepayRansomwarePIIPHIGovernment Contractor

📢 Share This Article

Help others stay informed about cybersecurity threats