over 25 million
The data breach at Conduent Business Services, a major provider of business process services, has escalated into one of the most significant breaches of the decade. The number of affected individuals has surged to over 25 million Americans, a more than two-fold increase from the 10.5 million initially disclosed. The breach exposed a vast trove of sensitive personal and medical data, including Social Security numbers and health insurance information. In response to the growing scale, the Texas Attorney General has launched a major investigation, citing the incident as potentially the largest healthcare data breach in U.S. history. The event highlights the systemic risk posed by breaches at third-party service providers that handle data for numerous client organizations.
The breach occurred over a nearly three-month period, from October 21, 2024, to January 13, 2025, when the intrusion was first detected following an operational disruption. During this time, unauthorized actors maintained access to Conduent's network and exfiltrated more than eight terabytes of data. The compromised information is highly sensitive and includes a combination of Personally Identifiable Information (PII) and Protected Health Information (PHI):
The attackers' methods for gaining initial access and maintaining persistence have not been publicly disclosed, but the long dwell time suggests a sophisticated and stealthy operation. The primary goal was clearly data theft for purposes of fraud, identity theft, or sale on dark web marketplaces.
The impact of this breach is massive and far-reaching. With over 25 million victims, it represents a catastrophic failure to protect sensitive data. The consequences include:
The number of victims by state highlights the widespread nature of the breach:
Conduent detected the breach on January 13, 2025, after noticing an "operational disruption," which suggests the attackers' activity may have finally impacted system performance, possibly during the final stages of data exfiltration or as a result of deploying other malicious tools. For organizations looking to prevent similar incidents, detection strategies should focus on identifying data exfiltration early:
For individuals affected by the breach, it is crucial to take immediate steps to protect their identity:
For organizations, the lessons are clear:
Safepay ransomware group claimed responsibility for the Conduent breach, stealing physical addresses alongside other data. New technical analysis provided.
The Safepay ransomware group has claimed responsibility for the Conduent data breach, confirming a double-extortion model. In addition to names, SSNs, and medical information, physical addresses were also explicitly stolen. The new report provides a deeper technical analysis, detailing potential initial access vectors (e.g., T1190, T1566) and exfiltration methods (T1537), framing the incident as a significant supply chain attack. Mitigation strategies now include D3FEND techniques like User Data Transfer Analysis (D3-UDTA) and Network Isolation (D3-NI).

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats