10.5 million
American business services provider Conduent has confirmed a significant data breach that compromised the sensitive personal and health information of more than 10.5 million individuals. The incident now stands as the eighth-largest healthcare data breach in U.S. history. The breach involved an extended period of unauthorized access, lasting from October 2024 to January 2025. The financial fallout has already reached $25 million in direct response costs, with multiple class-action lawsuits filed against the company for allegedly failing to protect the data it managed.
While specific technical details of the intrusion vector were not disclosed, the long dwell time of nearly three months points to significant gaps in security monitoring and detection capabilities. Attackers were able to maintain persistent access and exfiltrate large volumes of data without triggering alarms. This suggests a failure in one or more of the following areas:
The attack likely involved an initial compromise followed by T1078 - Valid Accounts to maintain access and T1567 - Exfiltration Over Web Service to steal data over an extended period.
The detection of the breach occurred on January 13, 2025, nearly three months after initial access. This significant delay highlights a critical failure in security operations. Effective incident response requires robust detection capabilities.
Detection Improvement Recommendations:
D3FEND Techniques:
Immediate Actions:
Strategic Recommendations:
Implement comprehensive logging and auditing of access to sensitive data repositories to detect anomalous access patterns.
Isolate networks containing PHI to prevent lateral movement and contain breaches. A zero-trust approach would further enhance security.
Mapped D3FEND Techniques:
Enforce MFA for all access to systems handling sensitive data to protect against credential compromise.
Mapped D3FEND Techniques:
Threat actors first gained unauthorized access to Conduent's systems.
Conduent detected the suspicious activity, nearly three months after the initial intrusion.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.